Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.71%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:07

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in the freexl::destroy_cell function.

Exploit
  • EPSS 0.77%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:07

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:07

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a memcpy call of the parse_SST function.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:08

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in the parse_unicode_string function.

Exploit
  • EPSS 0.71%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:08

An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in the function read_mini_biff_next_record.

  • EPSS 1.79%
  • Veröffentlicht 23.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:08

An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function allows command injection via a $(command) approach in the gplot rootname argument. This issue exists because of an incomplete fix for CVE-2018-3836.

  • EPSS 0.04%
  • Veröffentlicht 23.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:08

util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.

Exploit
  • EPSS 65.24%
  • Veröffentlicht 22.02.2018 00:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:56

A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats...

Exploit
  • EPSS 54.63%
  • Veröffentlicht 22.02.2018 00:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:56

An issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. res_pjsip allows remote authenticated users to crash Asterisk (segmentation fault) by sending a number of S...

  • EPSS 1.15%
  • Veröffentlicht 21.02.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:32:46

The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is ...