Debian

Debian Linux

9947 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.87%
  • Veröffentlicht 13.06.2023 18:15:22
  • Zuletzt bearbeitet 05.05.2025 16:15:44

Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 16.59%
  • Veröffentlicht 13.06.2023 18:15:22
  • Zuletzt bearbeitet 05.05.2025 16:15:44

Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Warnung
  • EPSS 2.72%
  • Veröffentlicht 13.06.2023 17:15:14
  • Zuletzt bearbeitet 28.10.2025 13:46:56

A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.

  • EPSS 0.01%
  • Veröffentlicht 09.06.2023 20:15:10
  • Zuletzt bearbeitet 11.03.2025 15:15:38

A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.

Exploit
  • EPSS 0.63%
  • Veröffentlicht 08.06.2023 03:15:08
  • Zuletzt bearbeitet 09.06.2025 15:15:29

D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with...

Exploit
  • EPSS 1.51%
  • Veröffentlicht 07.06.2023 03:15:09
  • Zuletzt bearbeitet 03.11.2025 22:16:03

Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wire...

Exploit
  • EPSS 1.12%
  • Veröffentlicht 07.06.2023 03:15:09
  • Zuletzt bearbeitet 03.11.2025 22:16:03

Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process runn...

Exploit
  • EPSS 1.15%
  • Veröffentlicht 06.06.2023 20:15:13
  • Zuletzt bearbeitet 02.12.2025 21:15:51

A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 06.06.2023 20:15:12
  • Zuletzt bearbeitet 21.11.2024 07:58:54

A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 06.06.2023 12:15:09
  • Zuletzt bearbeitet 08.01.2025 17:15:12

There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.