Debian

Debian Linux

9140 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 28.01.2025 17:15:25
  • Last modified 06.08.2025 19:25:13

An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.

  • EPSS 0.04%
  • Published 21.01.2025 21:15:15
  • Last modified 18.06.2025 19:07:57

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u431-perf, 11.0.25, 17.0.13, 21.0.5, 23.0.1; Ora...

  • EPSS 0.18%
  • Published 21.01.2025 21:15:13
  • Last modified 09.04.2025 16:06:52

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with net...

  • EPSS 0.3%
  • Published 14.01.2025 19:15:32
  • Last modified 03.10.2025 13:16:13

An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented...

Exploit
  • EPSS 63.81%
  • Published 06.01.2025 22:15:09
  • Last modified 05.09.2025 14:20:13

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, a...

  • EPSS 0.98%
  • Published 12.12.2024 02:03:32
  • Last modified 19.04.2025 01:15:44

GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variabl...

Exploit
  • EPSS 16.72%
  • Published 09.12.2024 10:15:05
  • Last modified 15.07.2025 16:35:39

Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. ...

Exploit
  • EPSS 0.29%
  • Published 19.11.2024 18:15:19
  • Last modified 26.08.2025 17:36:44

Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or b...

  • EPSS 0.2%
  • Published 14.11.2024 13:15:04
  • Last modified 20.02.2025 15:41:14

Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. Th...

Warning
  • EPSS 17.25%
  • Published 12.11.2024 20:15:14
  • Last modified 26.08.2025 02:37:14

Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The ...