Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.82%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

  • EPSS 2.71%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:00:31

An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.

  • EPSS 1.73%
  • Veröffentlicht 08.06.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:25

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" optio...

Exploit
  • EPSS 16.03%
  • Veröffentlicht 07.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:24

In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.

  • EPSS 0.93%
  • Veröffentlicht 05.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:23

The Eclipse Mosquitto broker up to version 1.4.15 does not reject strings that are not valid UTF-8. A malicious client could cause other clients that do reject invalid UTF-8 strings to disconnect themselves from the broker by sending a topic string w...

  • EPSS 1.45%
  • Veröffentlicht 05.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:23

In Eclipse Mosquitto 1.4.15 and earlier, a Memory Leak vulnerability was found within the Mosquitto Broker. Unauthenticated clients can send crafted CONNECT packets which could cause a denial of service in the Mosquitto Broker.

  • EPSS 0.31%
  • Veröffentlicht 05.06.2018 13:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. T...

Exploit
  • EPSS 0.57%
  • Veröffentlicht 05.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:56

The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other im...

  • EPSS 0.8%
  • Veröffentlicht 04.06.2018 21:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identif...

  • EPSS 0.96%
  • Veröffentlicht 04.06.2018 21:29:00
  • Zuletzt bearbeitet 12.05.2025 17:37:16

In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in...