Debian

Debian Linux

9142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 67.84%
  • Veröffentlicht 09.03.2016 23:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed...

  • EPSS 69.96%
  • Veröffentlicht 09.03.2016 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establis...

  • EPSS 30.74%
  • Veröffentlicht 03.03.2016 20:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit stri...

  • EPSS 0.46%
  • Veröffentlicht 03.03.2016 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discov...

Medienbericht
  • EPSS 21.84%
  • Veröffentlicht 03.03.2016 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other imp...

  • EPSS 0.26%
  • Veröffentlicht 25.02.2016 01:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, wh...

  • EPSS 10.32%
  • Veröffentlicht 25.02.2016 01:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restric...

  • EPSS 0.62%
  • Veröffentlicht 25.02.2016 01:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote aut...

  • EPSS 8.05%
  • Veröffentlicht 25.02.2016 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protec...

  • EPSS 39.28%
  • Veröffentlicht 25.02.2016 01:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to ...