Debian

Debian Linux

9142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.11%
  • Veröffentlicht 18.05.2022 11:15:15
  • Zuletzt bearbeitet 21.11.2024 07:03:39

compile in regexp.c in Artifex MuJS through 1.2.0 results in stack consumption because of unlimited recursion, a different issue than CVE-2019-11413.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 18.05.2022 11:15:15
  • Zuletzt bearbeitet 21.11.2024 07:03:39

In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.

  • EPSS 0.04%
  • Veröffentlicht 17.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 07:03:10

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters a...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 17.05.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:20

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.

  • EPSS 0.36%
  • Veröffentlicht 16.05.2022 21:15:07
  • Zuletzt bearbeitet 25.03.2025 19:39:30

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occu...

  • EPSS 0.09%
  • Veröffentlicht 16.05.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:41:14

A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate the...

  • EPSS 0.04%
  • Veröffentlicht 12.05.2022 17:15:09
  • Zuletzt bearbeitet 05.05.2025 17:17:40

Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Exploit
  • EPSS 2.66%
  • Veröffentlicht 12.05.2022 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:41:10

Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2.

  • EPSS 68.72%
  • Veröffentlicht 12.05.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:59:54

The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct....

Exploit
  • EPSS 0.02%
  • Veröffentlicht 12.05.2022 05:15:06
  • Zuletzt bearbeitet 21.11.2024 07:02:59

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.