Debian

Debian Linux

9142 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.39%
  • Published 05.12.2022 22:15:10
  • Last modified 24.04.2025 14:15:32

A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, i...

Exploit
  • EPSS 4.58%
  • Published 05.12.2022 22:15:10
  • Last modified 24.04.2025 14:15:32

The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.

  • EPSS 0.64%
  • Published 05.12.2022 22:15:10
  • Last modified 24.04.2025 14:15:38

A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid befor...

  • EPSS 0.3%
  • Published 04.12.2022 03:15:09
  • Last modified 24.04.2025 16:15:23

AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.

  • EPSS 0.19%
  • Published 03.12.2022 15:15:09
  • Last modified 24.04.2025 16:15:18

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. T...

  • EPSS 0.27%
  • Published 30.11.2022 06:15:11
  • Last modified 24.04.2025 19:15:44

g810-led 0.4.2, a LED configuration tool for Logitech Gx10 keyboards, contained a udev rule to make supported device nodes world-readable and writable, allowing any process on the system to read traffic from keyboards, including sensitive data.

Exploit
  • EPSS 0.16%
  • Published 28.11.2022 21:15:10
  • Last modified 21.11.2024 07:29:16

Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Dispos...

  • EPSS 0.04%
  • Published 28.11.2022 06:15:10
  • Last modified 28.04.2025 19:15:46

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may u...

  • EPSS 0.33%
  • Published 27.11.2022 04:15:10
  • Last modified 29.04.2025 14:15:30

An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.

Exploit
  • EPSS 3.12%
  • Published 26.11.2022 22:15:10
  • Last modified 29.04.2025 14:15:20

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attack...