Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.45%
  • Veröffentlicht 20.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:04

trim_whitespace in lexer.l in libConfuse v3.2.1 has an out-of-bounds read.

Exploit
  • EPSS 1.62%
  • Veröffentlicht 19.07.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:01

Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).

Warnung Exploit
  • EPSS 94.39%
  • Veröffentlicht 19.07.2018 17:29:00
  • Zuletzt bearbeitet 07.11.2025 19:18:37

A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability...

  • EPSS 1.92%
  • Veröffentlicht 19.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:31:59

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting ...

  • EPSS 20.01%
  • Veröffentlicht 19.07.2018 13:29:00
  • Zuletzt bearbeitet 03.12.2025 21:15:48

A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format input...

  • EPSS 0.82%
  • Veröffentlicht 19.07.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:58

libavformat/movenc.c in FFmpeg 3.2 and 4.0.2 allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted audio file when converting to the MOV audio format.

  • EPSS 1.72%
  • Veröffentlicht 19.07.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:51

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.

Exploit
  • EPSS 1.09%
  • Veröffentlicht 19.07.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:51

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.

  • EPSS 1.34%
  • Veröffentlicht 19.07.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:51

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.

  • EPSS 1.34%
  • Veröffentlicht 19.07.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:51

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.