Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 6.52%
  • Veröffentlicht 20.09.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:22:36

A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and ...

  • EPSS 9.48%
  • Veröffentlicht 20.09.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:45

paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a simila...

  • EPSS 0.18%
  • Veröffentlicht 20.09.2023 13:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:41

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This iss...

  • EPSS 0.25%
  • Veröffentlicht 20.09.2023 13:15:11
  • Zuletzt bearbeitet 02.12.2025 21:15:51

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-p...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 15.09.2023 21:15:11
  • Zuletzt bearbeitet 21.11.2024 08:21:53

Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides...

  • EPSS 4.83%
  • Veröffentlicht 15.09.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:18:54

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RF...

Exploit
  • EPSS 1.38%
  • Veröffentlicht 15.09.2023 19:15:08
  • Zuletzt bearbeitet 27.05.2025 21:20:37

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Se...

  • EPSS 0.27%
  • Veröffentlicht 12.09.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:36:14

Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)

  • EPSS 0.27%
  • Veröffentlicht 12.09.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:36:14

Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)

  • EPSS 0.27%
  • Veröffentlicht 12.09.2023 21:15:08
  • Zuletzt bearbeitet 21.11.2024 08:36:13

Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)