Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.5%
  • Published 15.11.2021 04:15:06
  • Last modified 21.11.2024 06:29:31

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

Exploit
  • EPSS 1.21%
  • Published 13.11.2021 09:15:06
  • Last modified 17.01.2025 20:15:26

json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Exploit
  • EPSS 0.04%
  • Published 12.11.2021 23:15:08
  • Last modified 21.11.2024 06:25:50

BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory l...

  • EPSS 0.14%
  • Published 12.11.2021 21:15:07
  • Last modified 21.11.2024 06:29:05

In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.

  • EPSS 0.14%
  • Published 12.11.2021 21:15:07
  • Last modified 21.11.2024 06:29:06

In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.

  • EPSS 0.56%
  • Published 11.11.2021 22:15:08
  • Last modified 21.11.2024 06:22:45

If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.

  • EPSS 0.55%
  • Published 11.11.2021 22:15:08
  • Last modified 21.11.2024 06:22:45

OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).

  • EPSS 1.54%
  • Published 11.11.2021 22:15:07
  • Last modified 21.11.2024 06:22:45

OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. rsync://example.org/repo/../../etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could all...

  • EPSS 0.29%
  • Published 11.11.2021 22:15:07
  • Last modified 21.11.2024 06:22:45

OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.

  • EPSS 0.74%
  • Published 11.11.2021 22:15:07
  • Last modified 21.11.2024 06:22:45

OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before ...