Debian

Debian Linux

9142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 93.38%
  • Veröffentlicht 28.02.2023 20:15:10
  • Zuletzt bearbeitet 11.03.2025 15:15:38

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.

  • EPSS 0.01%
  • Veröffentlicht 25.02.2023 04:15:10
  • Zuletzt bearbeitet 25.06.2025 20:54:48

In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.

  • EPSS 0.1%
  • Veröffentlicht 23.02.2023 20:15:14
  • Zuletzt bearbeitet 17.03.2025 19:15:19

An untrusted search path vulnerability exists in Node.js. <19.6.1, <18.14.1, <16.19.1, and <14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 23.02.2023 20:15:13
  • Zuletzt bearbeitet 12.03.2025 19:15:36

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms...

  • EPSS 0.53%
  • Veröffentlicht 22.02.2023 07:15:10
  • Zuletzt bearbeitet 18.03.2025 17:15:42

The mono package before 6.8.0.105+dfsg-3.3 for Debian allows arbitrary code execution because the application/x-ms-dos-executable MIME type is associated with an un-sandboxed Mono CLR interpreter.

Exploit
  • EPSS 0.3%
  • Veröffentlicht 21.02.2023 16:15:11
  • Zuletzt bearbeitet 17.03.2025 17:15:15

Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.

  • EPSS 0.31%
  • Veröffentlicht 20.02.2023 23:15:12
  • Zuletzt bearbeitet 18.03.2025 16:15:14

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may u...

  • EPSS 47.68%
  • Veröffentlicht 20.02.2023 16:15:10
  • Zuletzt bearbeitet 13.02.2025 17:16:09

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limi...

Exploit
  • EPSS 1.2%
  • Veröffentlicht 15.02.2023 18:15:11
  • Zuletzt bearbeitet 19.03.2025 18:15:18

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a s...

  • EPSS 14.7%
  • Veröffentlicht 15.02.2023 01:15:10
  • Zuletzt bearbeitet 18.03.2025 20:15:18

An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory...