Debian

Debian Linux

9213 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Published 26.12.2018 18:29:00
  • Last modified 21.11.2024 04:01:34

GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archive...

Exploit
  • EPSS 1.19%
  • Published 26.12.2018 04:29:00
  • Last modified 21.11.2024 04:01:34

XRef::getEntry in XRef.cc in Poppler 0.72.0 mishandles unallocated XRef entries, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser...

Exploit
  • EPSS 0.37%
  • Published 26.12.2018 03:29:00
  • Last modified 21.11.2024 04:01:32

In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

  • EPSS 2.5%
  • Published 24.12.2018 13:29:00
  • Last modified 21.11.2024 04:01:28

c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.

Exploit
  • EPSS 0.59%
  • Published 24.12.2018 05:29:01
  • Last modified 21.11.2024 04:01:27

GNU Libextractor through 1.8 has an out-of-bounds read vulnerability in the function history_extract() in plugins/ole2_extractor.c, related to EXTRACTOR_common_convert_to_utf8 in common/convert.c.

Exploit
  • EPSS 0.6%
  • Published 24.12.2018 05:29:01
  • Last modified 21.11.2024 04:01:28

GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c.

Exploit
  • EPSS 1.27%
  • Published 23.12.2018 23:29:00
  • Last modified 21.11.2024 04:01:25

Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used...

Exploit
  • EPSS 0.5%
  • Published 22.12.2018 15:29:00
  • Last modified 21.11.2024 04:01:19

An invalid memory address dereference was discovered in the sbr_process_channel function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to deni...

Exploit
  • EPSS 17.56%
  • Published 21.12.2018 21:29:00
  • Last modified 21.11.2024 04:01:17

SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by l...

Exploit
  • EPSS 1.36%
  • Published 20.12.2018 23:29:00
  • Last modified 21.11.2024 03:57:23

In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscri...