Debian

Debian Linux

9943 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.79%
  • Veröffentlicht 15.01.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with k...

  • EPSS 0.04%
  • Veröffentlicht 15.01.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which ...

  • EPSS 0.05%
  • Veröffentlicht 29.12.2008 15:24:23
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap over...

  • EPSS 0.06%
  • Veröffentlicht 22.12.2008 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attemp...

  • EPSS 6.17%
  • Veröffentlicht 17.12.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via ve...

  • EPSS 0.52%
  • Veröffentlicht 17.12.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-contr...

  • EPSS 0.22%
  • Veröffentlicht 17.12.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL th...

  • EPSS 2.18%
  • Veröffentlicht 17.12.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent ...

  • EPSS 1.02%
  • Veröffentlicht 17.12.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms s...

  • EPSS 1.02%
  • Veröffentlicht 17.12.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to a...