Debian

Debian Linux

9142 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.16%
  • Published 08.12.2014 11:59:03
  • Last modified 12.04.2025 10:46:40

nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual...

Exploit
  • EPSS 4.31%
  • Published 05.12.2014 16:59:11
  • Last modified 12.04.2025 10:46:40

default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.

Exploit
  • EPSS 1.41%
  • Published 05.12.2014 16:59:00
  • Last modified 12.04.2025 10:46:40

iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to ...

Exploit
  • EPSS 1.9%
  • Published 03.12.2014 21:59:03
  • Last modified 12.04.2025 10:46:40

Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.

  • EPSS 1.47%
  • Published 03.12.2014 18:59:00
  • Last modified 12.04.2025 10:46:40

OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.

Exploit
  • EPSS 2.62%
  • Published 02.12.2014 16:59:08
  • Last modified 12.04.2025 10:46:40

The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buf...

Exploit
  • EPSS 1.34%
  • Published 02.12.2014 16:59:05
  • Last modified 12.04.2025 10:46:40

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

  • EPSS 7.75%
  • Published 01.12.2014 15:59:11
  • Last modified 12.04.2025 10:46:40

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer...

  • EPSS 0.13%
  • Published 01.12.2014 15:59:09
  • Last modified 12.04.2025 10:46:40

The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) v...

  • EPSS 0.09%
  • Published 01.12.2014 15:59:08
  • Last modified 12.04.2025 10:46:40

The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of register...