Debian

Debian Linux

9947 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Exploit
  • EPSS 52.63%
  • Veröffentlicht 03.10.2023 18:15:10
  • Zuletzt bearbeitet 13.02.2026 21:25:07

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launch...

  • EPSS 1.46%
  • Veröffentlicht 30.09.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 08:25:59

VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.

  • EPSS 1.89%
  • Veröffentlicht 29.09.2023 20:15:09
  • Zuletzt bearbeitet 23.04.2025 17:31:40

Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_...

  • EPSS 1.22%
  • Veröffentlicht 28.09.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:41:15

Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: H...

  • EPSS 0.22%
  • Veröffentlicht 28.09.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:41:15

Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Warnung Exploit
  • EPSS 4.78%
  • Veröffentlicht 28.09.2023 16:15:10
  • Zuletzt bearbeitet 24.10.2025 14:07:24

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0%
  • Veröffentlicht 28.09.2023 14:15:21
  • Zuletzt bearbeitet 21.11.2024 08:23:06

A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash...

  • EPSS 0.06%
  • Veröffentlicht 27.09.2023 15:19:43
  • Zuletzt bearbeitet 11.12.2025 15:37:45

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free....

  • EPSS 0.24%
  • Veröffentlicht 27.09.2023 15:19:42
  • Zuletzt bearbeitet 21.11.2024 08:41:13

A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115...

  • EPSS 0.26%
  • Veröffentlicht 27.09.2023 15:19:42
  • Zuletzt bearbeitet 21.11.2024 08:41:13

During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and...