Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 07.09.2021 14:15:11
  • Zuletzt bearbeitet 02.12.2025 22:16:04

In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges.

  • EPSS 0.16%
  • Veröffentlicht 07.09.2021 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:12:10

NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.

  • EPSS 0.98%
  • Veröffentlicht 05.09.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:17

WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.

Exploit
  • EPSS 0.31%
  • Veröffentlicht 03.09.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:18:50

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO...

  • EPSS 0.34%
  • Veröffentlicht 03.09.2021 02:15:06
  • Zuletzt bearbeitet 21.11.2024 06:24:14

The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.

  • EPSS 0.03%
  • Veröffentlicht 03.09.2021 01:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:14

A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.

  • EPSS 0.31%
  • Veröffentlicht 01.09.2021 15:15:12
  • Zuletzt bearbeitet 03.11.2025 20:15:49

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must...

  • EPSS 0.04%
  • Veröffentlicht 01.09.2021 15:15:11
  • Zuletzt bearbeitet 03.11.2025 20:15:49

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a write-what-where condition vulnerability caused during the application's memory allocation process. This may cause the memory management functions to become mismatched resulting in local a...

  • EPSS 0.31%
  • Veröffentlicht 01.09.2021 15:15:11
  • Zuletzt bearbeitet 03.11.2025 20:15:49

XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Integer Overflow vulnerability potentially resulting in application-level denial of service in the context of the current user. Exploitation requires user interaction in that a victim mus...

  • EPSS 0.72%
  • Veröffentlicht 01.09.2021 15:15:11
  • Zuletzt bearbeitet 03.11.2025 20:15:49

XMP Toolkit version 2020.1 (and earlier) is affected by a Buffer Underflow vulnerability which could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must ope...