Debian

Debian Linux

9141 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 32.37%
  • Veröffentlicht 11.08.2023 06:15:10
  • Zuletzt bearbeitet 13.02.2025 17:16:59

In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 11.08.2023 06:15:09
  • Zuletzt bearbeitet 13.02.2025 17:16:59

In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unle...

  • EPSS 0.01%
  • Veröffentlicht 11.08.2023 03:15:18
  • Zuletzt bearbeitet 21.11.2024 07:47:04

Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.

  • EPSS 0.03%
  • Veröffentlicht 11.08.2023 03:15:16
  • Zuletzt bearbeitet 21.11.2024 07:30:23

Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

  • EPSS 0.02%
  • Veröffentlicht 11.08.2023 03:15:15
  • Zuletzt bearbeitet 21.11.2024 07:23:52

Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • EPSS 0.03%
  • Veröffentlicht 11.08.2023 03:15:14
  • Zuletzt bearbeitet 21.11.2024 07:22:19

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Exploit
  • EPSS 0.73%
  • Veröffentlicht 11.08.2023 03:15:14
  • Zuletzt bearbeitet 21.11.2024 07:22:21

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.09%
  • Veröffentlicht 11.08.2023 03:15:13
  • Zuletzt bearbeitet 21.11.2024 07:15:43

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.

  • EPSS 0.09%
  • Veröffentlicht 11.08.2023 03:15:12
  • Zuletzt bearbeitet 21.11.2024 07:12:50

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.

  • EPSS 0.03%
  • Veröffentlicht 11.08.2023 03:15:11
  • Zuletzt bearbeitet 21.11.2024 06:56:04

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.