Debian

Debian Linux

9947 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 24.07.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 08:17:13

Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character ...

Exploit
  • EPSS 43.61%
  • Veröffentlicht 22.07.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:13:58

A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../et...

  • EPSS 0.01%
  • Veröffentlicht 21.07.2023 21:15:11
  • Zuletzt bearbeitet 13.02.2025 17:16:57

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementin...

  • EPSS 0.02%
  • Veröffentlicht 21.07.2023 21:15:11
  • Zuletzt bearbeitet 13.02.2025 17:16:57

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The ...

  • EPSS 0.01%
  • Veröffentlicht 21.07.2023 21:15:11
  • Zuletzt bearbeitet 13.02.2025 17:16:58

An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is update...

  • EPSS 0.04%
  • Veröffentlicht 21.07.2023 21:15:11
  • Zuletzt bearbeitet 13.02.2025 17:16:58

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing ...

  • EPSS 1.25%
  • Veröffentlicht 20.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:00:22

An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable ...

  • EPSS 15.9%
  • Veröffentlicht 20.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:07:44

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that c...

  • EPSS 21.17%
  • Veröffentlicht 20.07.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:07:44

A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be an...

  • EPSS 2.39%
  • Veröffentlicht 20.07.2023 15:15:11
  • Zuletzt bearbeitet 06.12.2024 11:15:05

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attack...