Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.57%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

  • EPSS 0.26%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, ...

  • EPSS 0.91%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

  • EPSS 0.29%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

  • EPSS 0.22%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames f...

  • EPSS 0.19%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to repl...

  • EPSS 0.38%
  • Veröffentlicht 17.10.2017 02:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

  • EPSS 0.63%
  • Veröffentlicht 16.10.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

  • EPSS 12.88%
  • Veröffentlicht 16.10.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an ...