Debian

Debian Linux

9947 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.7%
  • Veröffentlicht 27.09.2023 15:19:42
  • Zuletzt bearbeitet 01.05.2025 18:15:52

Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vu...

  • EPSS 1.22%
  • Veröffentlicht 27.09.2023 15:19:26
  • Zuletzt bearbeitet 21.11.2024 08:20:30

The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.

Exploit
  • EPSS 0.01%
  • Veröffentlicht 25.09.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 08:23:06

An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 25.09.2023 16:15:14
  • Zuletzt bearbeitet 13.02.2025 17:16:57

Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a m...

  • EPSS 0.01%
  • Veröffentlicht 22.09.2023 14:15:45
  • Zuletzt bearbeitet 04.11.2025 20:16:29

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...

Warnung
  • EPSS 76.51%
  • Veröffentlicht 22.09.2023 06:15:10
  • Zuletzt bearbeitet 31.10.2025 14:38:41

Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 21.09.2023 23:15:12
  • Zuletzt bearbeitet 04.11.2025 17:15:41

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in...

Warnung
  • EPSS 24.89%
  • Veröffentlicht 21.09.2023 19:15:11
  • Zuletzt bearbeitet 05.11.2025 19:17:52

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS bef...

  • EPSS 7.01%
  • Veröffentlicht 20.09.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:22:36

A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and ...

  • EPSS 6.4%
  • Veröffentlicht 20.09.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:45

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a simila...