Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 11.10.2023 23:15:10
  • Zuletzt bearbeitet 21.11.2024 08:41:52

Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

  • EPSS 0.03%
  • Veröffentlicht 11.10.2023 12:15:11
  • Zuletzt bearbeitet 23.04.2025 17:16:39

Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authen...

  • EPSS 59.48%
  • Veröffentlicht 10.10.2023 19:15:09
  • Zuletzt bearbeitet 07.08.2025 11:15:27

Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially c...

  • EPSS 0.69%
  • Veröffentlicht 10.10.2023 18:15:18
  • Zuletzt bearbeitet 07.08.2025 11:15:27

Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could ...

Exploit
  • EPSS 1.42%
  • Veröffentlicht 10.10.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:09:47

Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their ...

Warnung Medienbericht Exploit
  • EPSS 94.4%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 12.05.2026 15:10:32

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Exploit
  • EPSS 80.3%
  • Veröffentlicht 09.10.2023 22:15:12
  • Zuletzt bearbeitet 21.11.2024 08:24:31

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpag...

Exploit
  • EPSS 11.03%
  • Veröffentlicht 09.10.2023 05:15:09
  • Zuletzt bearbeitet 21.11.2024 08:26:49

An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages re...

  • EPSS 0.12%
  • Veröffentlicht 09.10.2023 05:15:09
  • Zuletzt bearbeitet 21.11.2024 08:26:49

An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID bel...

  • EPSS 0.18%
  • Veröffentlicht 06.10.2023 16:15:13
  • Zuletzt bearbeitet 04.11.2025 20:16:36

A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a ...