Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 11.05%
  • Veröffentlicht 06.01.2021 21:15:14
  • Zuletzt bearbeitet 21.11.2024 05:38:39

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This c...

  • EPSS 0.09%
  • Veröffentlicht 05.01.2021 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:54

There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability.

  • EPSS 0.1%
  • Veröffentlicht 05.01.2021 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:55

A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encoding functionality, causing an out-of-bounds read. The highest threat from this vulnerability is system ...

  • EPSS 0.78%
  • Veröffentlicht 05.01.2021 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:55

A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0. This flaw allows an attacker to provide crafted input to openjpeg during conversion and encoding, causing an out-of-bounds write. The highest threat from this vulnerabili...

  • EPSS 0.09%
  • Veröffentlicht 05.01.2021 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:55

There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw ...

  • EPSS 0.1%
  • Veröffentlicht 05.01.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:21:54

There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to...

  • EPSS 0.58%
  • Veröffentlicht 05.01.2021 05:15:10
  • Zuletzt bearbeitet 21.11.2024 05:28:50

mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.

  • EPSS 0.63%
  • Veröffentlicht 04.01.2021 18:15:13
  • Zuletzt bearbeitet 09.06.2025 16:15:30

The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.

  • EPSS 0.63%
  • Veröffentlicht 04.01.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:43

An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).

  • EPSS 6.85%
  • Veröffentlicht 04.01.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:17:50

Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.