Debian

Debian Linux

9142 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 93.38%
  • Published 28.02.2023 20:15:10
  • Last modified 11.03.2025 15:15:38

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.

  • EPSS 0.01%
  • Published 25.02.2023 04:15:10
  • Last modified 25.06.2025 20:54:48

In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • EPSS 0.1%
  • Published 23.02.2023 20:15:14
  • Last modified 17.03.2025 19:15:19

An untrusted search path vulnerability exists in Node.js. <19.6.1, <18.14.1, <16.19.1, and <14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.

Exploit
  • EPSS 0.06%
  • Published 23.02.2023 20:15:13
  • Last modified 12.03.2025 19:15:36

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms...

  • EPSS 0.53%
  • Published 22.02.2023 07:15:10
  • Last modified 18.03.2025 17:15:42

The mono package before 6.8.0.105+dfsg-3.3 for Debian allows arbitrary code execution because the application/x-ms-dos-executable MIME type is associated with an un-sandboxed Mono CLR interpreter.

Exploit
  • EPSS 0.3%
  • Published 21.02.2023 16:15:11
  • Last modified 17.03.2025 17:15:15

Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.

  • EPSS 0.31%
  • Published 20.02.2023 23:15:12
  • Last modified 18.03.2025 16:15:14

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may u...

  • EPSS 47.68%
  • Published 20.02.2023 16:15:10
  • Last modified 13.02.2025 17:16:09

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limi...

Exploit
  • EPSS 1.2%
  • Published 15.02.2023 18:15:11
  • Last modified 19.03.2025 18:15:18

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a s...

  • EPSS 14.7%
  • Published 15.02.2023 01:15:10
  • Last modified 18.03.2025 20:15:18

An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory...