Debian

Debian Linux

9142 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Published 31.01.2022 08:15:07
  • Last modified 21.11.2024 06:31:54

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without serv...

Exploit
  • EPSS 0.14%
  • Published 31.01.2022 05:15:08
  • Last modified 21.11.2024 06:49:52

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

Exploit
  • EPSS 0.19%
  • Published 30.01.2022 15:15:07
  • Last modified 21.11.2024 06:38:33

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

Exploit
  • EPSS 0.18%
  • Published 30.01.2022 15:15:07
  • Last modified 21.11.2024 06:38:34

Use After Free in GitHub repository vim/vim prior to 8.2.

  • EPSS 0.3%
  • Published 28.01.2022 22:15:15
  • Last modified 21.11.2024 06:37:02

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlik...

Exploit
  • EPSS 0.08%
  • Published 28.01.2022 22:15:15
  • Last modified 21.11.2024 06:38:31

Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.

Exploit
  • EPSS 0.08%
  • Published 28.01.2022 16:15:07
  • Last modified 21.11.2024 06:47:58

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

Exploit
  • EPSS 0.09%
  • Published 28.01.2022 16:15:07
  • Last modified 21.11.2024 06:47:59

An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.

Exploit
  • EPSS 0.08%
  • Published 28.01.2022 16:15:07
  • Last modified 21.11.2024 06:47:59

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

  • EPSS 0.23%
  • Published 27.01.2022 13:15:08
  • Last modified 21.11.2024 06:48:08

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privi...