Debian

Debian Linux

9213 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 25.03.2019 19:29:01
  • Last modified 21.11.2024 04:42:46

The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.

  • EPSS 9.92%
  • Published 25.03.2019 18:29:01
  • Last modified 21.11.2024 04:42:44

A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bound...

Exploit
  • EPSS 0.65%
  • Published 25.03.2019 00:29:05
  • Last modified 21.11.2024 04:18:13

An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case.

Exploit
  • EPSS 1.11%
  • Published 24.03.2019 00:29:00
  • Last modified 21.11.2024 04:52:40

In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.

Exploit
  • EPSS 0.94%
  • Published 23.03.2019 18:29:02
  • Last modified 21.11.2024 04:52:39

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call...

  • EPSS 0.33%
  • Published 23.03.2019 15:29:00
  • Last modified 21.11.2024 04:52:38

A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.

  • EPSS 0.22%
  • Published 22.03.2019 08:29:00
  • Last modified 21.11.2024 04:52:35

rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.

  • EPSS 9.6%
  • Published 21.03.2019 21:29:00
  • Last modified 21.11.2024 04:42:43

An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system wh...

  • EPSS 1.68%
  • Published 21.03.2019 21:29:00
  • Last modified 21.11.2024 04:42:43

An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client mem...

Exploit
  • EPSS 1.32%
  • Published 21.03.2019 18:29:00
  • Last modified 21.11.2024 04:52:32

PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.