Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.52%
  • Veröffentlicht 21.08.2018 01:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:08

The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in ...

  • EPSS 1.22%
  • Veröffentlicht 20.08.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 03:39:58

Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerabil...

  • EPSS 0.4%
  • Veröffentlicht 20.08.2018 19:31:34
  • Zuletzt bearbeitet 21.11.2024 03:40:17

zutils version prior to version 1.8-pre2 contains a Buffer Overflow vulnerability in zcat that can result in Potential denial of service or arbitrary code execution. This attack appear to be exploitable via the victim openning a crafted compressed fi...

Exploit
  • EPSS 1.61%
  • Veröffentlicht 20.08.2018 19:31:31
  • Zuletzt bearbeitet 21.11.2024 03:40:16

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be explo...

  • EPSS 0.07%
  • Veröffentlicht 20.08.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:08

arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.

  • EPSS 0.04%
  • Veröffentlicht 20.08.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:05

The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.

  • EPSS 0.64%
  • Veröffentlicht 18.08.2018 02:29:01
  • Zuletzt bearbeitet 21.11.2024 03:50:56

In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 18.08.2018 02:29:01
  • Zuletzt bearbeitet 21.11.2024 03:50:56

In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS.

Exploit
  • EPSS 90.36%
  • Veröffentlicht 17.08.2018 19:29:00
  • Zuletzt bearbeitet 17.12.2025 22:15:54

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-...

  • EPSS 0.18%
  • Veröffentlicht 17.08.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:52

An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in s...