Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.18%
  • Published 16.09.2021 21:15:07
  • Last modified 21.11.2024 05:12:39

fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.

Exploit
  • EPSS 0.09%
  • Published 16.09.2021 21:15:07
  • Last modified 21.11.2024 05:12:39

fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c.

Exploit
  • EPSS 0.12%
  • Published 16.09.2021 21:15:07
  • Last modified 21.11.2024 05:12:40

fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.

Exploit
  • EPSS 0.12%
  • Published 16.09.2021 21:15:07
  • Last modified 21.11.2024 05:12:40

fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.

  • EPSS 9.88%
  • Published 16.09.2021 15:15:07
  • Last modified 21.11.2024 06:11:13

Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.

  • EPSS 4.96%
  • Published 16.09.2021 15:15:07
  • Last modified 01.05.2025 15:40:05

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

  • EPSS 42.79%
  • Published 16.09.2021 15:15:07
  • Last modified 01.05.2025 15:39:40

ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.

Warning
  • EPSS 94.43%
  • Published 16.09.2021 15:15:07
  • Last modified 16.05.2025 15:27:13

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

  • EPSS 0.06%
  • Published 16.09.2021 15:15:07
  • Last modified 21.11.2024 06:25:24

Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an in...

Exploit
  • EPSS 0.12%
  • Published 15.09.2021 13:15:08
  • Last modified 21.11.2024 06:22:27

vim is vulnerable to Use After Free