Debian

Debian Linux

9150 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.29%
  • Published 07.02.2020 15:15:11
  • Last modified 21.11.2024 04:29:07

Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons

  • EPSS 1.81%
  • Published 06.02.2020 17:15:14
  • Last modified 21.11.2024 05:39:07

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

Exploit
  • EPSS 4.51%
  • Published 06.02.2020 14:15:10
  • Last modified 21.11.2024 03:02:01

MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XM...

  • EPSS 0.08%
  • Published 06.02.2020 01:15:10
  • Last modified 21.11.2024 05:39:10

There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.

Exploit
  • EPSS 0.04%
  • Published 06.02.2020 01:15:10
  • Last modified 21.11.2024 05:39:11

There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.

Exploit
  • EPSS 0.09%
  • Published 06.02.2020 01:15:10
  • Last modified 21.11.2024 05:39:11

There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.

  • EPSS 0.57%
  • Published 05.02.2020 14:15:11
  • Last modified 21.11.2024 05:33:40

It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especial...

  • EPSS 0.12%
  • Published 05.02.2020 14:15:11
  • Last modified 21.11.2024 05:39:09

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

  • EPSS 0.14%
  • Published 05.02.2020 14:15:11
  • Last modified 21.11.2024 05:39:09

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

  • EPSS 20.52%
  • Published 04.02.2020 21:15:10
  • Last modified 21.11.2024 04:23:02

An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.