Debian

Debian Linux

9141 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 22.09.2023 14:15:45
  • Zuletzt bearbeitet 18.06.2025 15:15:22

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...

Warnung
  • EPSS 75.03%
  • Veröffentlicht 22.09.2023 06:15:10
  • Zuletzt bearbeitet 20.12.2024 17:40:26

Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 21.09.2023 23:15:12
  • Zuletzt bearbeitet 23.04.2025 17:16:44

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in...

Warnung
  • EPSS 12.7%
  • Veröffentlicht 21.09.2023 19:15:11
  • Zuletzt bearbeitet 29.11.2024 14:43:20

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS bef...

  • EPSS 7.7%
  • Veröffentlicht 20.09.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:22:36

A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and ...

  • EPSS 6.4%
  • Veröffentlicht 20.09.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:45

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a simila...

  • EPSS 0.19%
  • Veröffentlicht 20.09.2023 13:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:41

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This iss...

  • EPSS 0.29%
  • Veröffentlicht 20.09.2023 13:15:11
  • Zuletzt bearbeitet 21.11.2024 08:17:03

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-p...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 15.09.2023 21:15:11
  • Zuletzt bearbeitet 21.11.2024 08:21:53

Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides...

  • EPSS 4.83%
  • Veröffentlicht 15.09.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:18:54

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RF...