CRITICAL |
CVE-2021-22945 |
curl: use-after-free and double-free in MQTT sending |
curl |
7.74.0-1.3+deb11u1 |
|
CRITICAL |
CVE-2022-1664 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ... |
dpkg |
1.20.9 |
1.20.10 |
CRITICAL |
CVE-2022-1664 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ... |
dpkg-dev |
1.20.9 |
1.20.10 |
CRITICAL |
CVE-2021-30473 |
aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that i ... |
libaom0 |
1.0.0.errata1-3 |
|
CRITICAL |
CVE-2021-30474 |
aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use ... |
libaom0 |
1.0.0.errata1-3 |
|
CRITICAL |
CVE-2021-30475 |
aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buf ... |
libaom0 |
1.0.0.errata1-3 |
|
CRITICAL |
CVE-2021-43400 |
bluez: use-after-free in gatt-database.c |
libbluetooth-dev |
5.55-3.1 |
|
CRITICAL |
CVE-2021-43400 |
bluez: use-after-free in gatt-database.c |
libbluetooth3 |
5.55-3.1 |
|
CRITICAL |
CVE-2021-22945 |
curl: use-after-free and double-free in MQTT sending |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
CRITICAL |
CVE-2021-22945 |
curl: use-after-free and double-free in MQTT sending |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
CRITICAL |
CVE-2021-22945 |
curl: use-after-free and double-free in MQTT sending |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
CRITICAL |
CVE-2019-8457 |
sqlite: heap out-of-bound read in function rtreenode() |
libdb5.3 |
5.3.28+dfsg1-0.8 |
|
CRITICAL |
CVE-2019-8457 |
sqlite: heap out-of-bound read in function rtreenode() |
libdb5.3-dev |
5.3.28+dfsg1-0.8 |
|
CRITICAL |
CVE-2022-1253 |
Heap-based Buffer Overflow in GitHub repository strukturag/libde265 pr ... |
libde265-0 |
1.0.8-1 |
|
CRITICAL |
CVE-2022-1664 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ... |
libdpkg-perl |
1.20.9 |
1.20.10 |
CRITICAL |
CVE-2022-27404 |
FreeType: Buffer Overflow |
libfreetype-dev |
2.10.4+dfsg-1 |
|
CRITICAL |
CVE-2022-27404 |
FreeType: Buffer Overflow |
libfreetype6 |
2.10.4+dfsg-1 |
|
CRITICAL |
CVE-2022-27404 |
FreeType: Buffer Overflow |
libfreetype6-dev |
2.10.4+dfsg-1 |
|
CRITICAL |
CVE-2022-29155 |
openldap: OpenLDAP SQL injection |
libldap-2.4-2 |
2.4.57+dfsg-3 |
2.4.57+dfsg-3+deb11u1 |
CRITICAL |
CVE-2022-1586 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c |
libpcre2-16-0 |
10.36-2 |
|
CRITICAL |
CVE-2022-1587 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c |
libpcre2-16-0 |
10.36-2 |
|
CRITICAL |
CVE-2022-1586 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c |
libpcre2-32-0 |
10.36-2 |
|
CRITICAL |
CVE-2022-1587 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c |
libpcre2-32-0 |
10.36-2 |
|
CRITICAL |
CVE-2022-1586 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c |
libpcre2-8-0 |
10.36-2 |
|
CRITICAL |
CVE-2022-1587 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c |
libpcre2-8-0 |
10.36-2 |
|
CRITICAL |
CVE-2022-1586 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c |
libpcre2-dev |
10.36-2 |
|
CRITICAL |
CVE-2022-1587 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c |
libpcre2-dev |
10.36-2 |
|
CRITICAL |
CVE-2022-1586 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c |
libpcre2-posix2 |
10.36-2 |
|
CRITICAL |
CVE-2022-1587 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c |
libpcre2-posix2 |
10.36-2 |
|
CRITICAL |
CVE-2015-20107 |
python(mailcap): findmatch() function does not sanitise the second argument |
libpython3.9-minimal |
3.9.2-1 |
|
CRITICAL |
CVE-2021-29921 |
python-ipaddress: Improper input validation of octal strings |
libpython3.9-minimal |
3.9.2-1 |
|
CRITICAL |
CVE-2015-20107 |
python(mailcap): findmatch() function does not sanitise the second argument |
libpython3.9-stdlib |
3.9.2-1 |
|
CRITICAL |
CVE-2021-29921 |
python-ipaddress: Improper input validation of octal strings |
libpython3.9-stdlib |
3.9.2-1 |
|
CRITICAL |
CVE-2022-1292 |
openssl: c_rehash script allows command injection |
libssl-dev |
1.1.1n-0+deb11u1 |
1.1.1n-0+deb11u2 |
CRITICAL |
CVE-2022-1292 |
openssl: c_rehash script allows command injection |
libssl1.1 |
1.1.1n-0+deb11u1 |
1.1.1n-0+deb11u2 |
CRITICAL |
CVE-2022-1292 |
openssl: c_rehash script allows command injection |
openssl |
1.1.1n-0+deb11u1 |
1.1.1n-0+deb11u2 |
CRITICAL |
CVE-2015-20107 |
python(mailcap): findmatch() function does not sanitise the second argument |
python3.9 |
3.9.2-1 |
|
CRITICAL |
CVE-2021-29921 |
python-ipaddress: Improper input validation of octal strings |
python3.9 |
3.9.2-1 |
|
CRITICAL |
CVE-2015-20107 |
python(mailcap): findmatch() function does not sanitise the second argument |
python3.9-minimal |
3.9.2-1 |
|
CRITICAL |
CVE-2021-29921 |
python-ipaddress: Improper input validation of octal strings |
python3.9-minimal |
3.9.2-1 |
|
CRITICAL |
CVE-2021-35042 |
django: potential SQL injection via unsanitized QuerySet.order_by() input |
Django |
3.1.7 |
3.1.13, 3.2.5 |
CRITICAL |
CVE-2022-24065 |
The package cookiecutter before 2.1.1 are vulnerable to Command Inject ... |
cookiecutter |
1.7.3 |
2.1.1 |
HIGH |
CVE-2022-1304 |
e2fsprogs: out-of-bounds read/write via crafted filesystem |
comerr-dev |
1.46.2-2 |
|
HIGH |
CVE-2021-22946 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols |
curl |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-22576 |
curl: OAUTH2 bearer bypass in connection re-use |
curl |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27775 |
curl: bad local IPv6 connection reuse |
curl |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27781 |
curl: CERTINFO never-ending busy-loop |
curl |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27782 |
curl: TLS and SSH connection too eager reuse |
curl |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-1304 |
e2fsprogs: out-of-bounds read/write via crafted filesystem |
e2fsprogs |
1.46.2-2 |
|
HIGH |
CVE-2021-44648 |
gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data |
gir1.2-gdkpixbuf-2.0 |
2.42.2+dfsg-1 |
|
HIGH |
CVE-2022-24765 |
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree |
git |
1:2.30.2-1 |
|
HIGH |
CVE-2022-24765 |
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree |
git-man |
1:2.30.2-1 |
|
HIGH |
CVE-2022-1271 |
gzip: arbitrary-file-write vulnerability |
gzip |
1.10-4 |
1.10-4+deb11u1 |
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2020-36131 |
AOM v2.0.1 was discovered to contain a stack buffer overflow via the c ... |
libaom0 |
1.0.0.errata1-3 |
|
HIGH |
CVE-2020-36133 |
AOM v2.0.1 was discovered to contain a global buffer overflow via the ... |
libaom0 |
1.0.0.errata1-3 |
|
HIGH |
CVE-2020-26556 |
kernel: malleable commitment Bluetooth Mesh Provisioning |
libbluetooth-dev |
5.55-3.1 |
|
HIGH |
CVE-2020-26557 |
kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM |
libbluetooth-dev |
5.55-3.1 |
|
HIGH |
CVE-2020-26559 |
kernel: Authvalue leak in Bluetooth Mesh Provisioning |
libbluetooth-dev |
5.55-3.1 |
|
HIGH |
CVE-2020-26560 |
kernel: impersonation attack in Bluetooth Mesh Provisioning |
libbluetooth-dev |
5.55-3.1 |
|
HIGH |
CVE-2022-0204 |
bluez: heap-based buffer overflow in the implementation of the gatt protocol |
libbluetooth-dev |
5.55-3.1 |
|
HIGH |
CVE-2020-26556 |
kernel: malleable commitment Bluetooth Mesh Provisioning |
libbluetooth3 |
5.55-3.1 |
|
HIGH |
CVE-2020-26557 |
kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM |
libbluetooth3 |
5.55-3.1 |
|
HIGH |
CVE-2020-26559 |
kernel: Authvalue leak in Bluetooth Mesh Provisioning |
libbluetooth3 |
5.55-3.1 |
|
HIGH |
CVE-2020-26560 |
kernel: impersonation attack in Bluetooth Mesh Provisioning |
libbluetooth3 |
5.55-3.1 |
|
HIGH |
CVE-2022-0204 |
bluez: heap-based buffer overflow in the implementation of the gatt protocol |
libbluetooth3 |
5.55-3.1 |
|
HIGH |
CVE-2021-3999 |
glibc: Off-by-one buffer overflow/underflow in getcwd() |
libc-bin |
2.31-13+deb11u3 |
|
HIGH |
CVE-2021-3999 |
glibc: Off-by-one buffer overflow/underflow in getcwd() |
libc-dev-bin |
2.31-13+deb11u3 |
|
HIGH |
CVE-2021-3999 |
glibc: Off-by-one buffer overflow/underflow in getcwd() |
libc6 |
2.31-13+deb11u3 |
|
HIGH |
CVE-2021-3999 |
glibc: Off-by-one buffer overflow/underflow in getcwd() |
libc6-dev |
2.31-13+deb11u3 |
|
HIGH |
CVE-2022-1304 |
e2fsprogs: out-of-bounds read/write via crafted filesystem |
libcom-err2 |
1.46.2-2 |
|
HIGH |
CVE-2021-22946 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-22576 |
curl: OAUTH2 bearer bypass in connection re-use |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27775 |
curl: bad local IPv6 connection reuse |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27781 |
curl: CERTINFO never-ending busy-loop |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27782 |
curl: TLS and SSH connection too eager reuse |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2021-22946 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-22576 |
curl: OAUTH2 bearer bypass in connection re-use |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27775 |
curl: bad local IPv6 connection reuse |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27781 |
curl: CERTINFO never-ending busy-loop |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27782 |
curl: TLS and SSH connection too eager reuse |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2021-22946 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-22576 |
curl: OAUTH2 bearer bypass in connection re-use |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27775 |
curl: bad local IPv6 connection reuse |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27781 |
curl: CERTINFO never-ending busy-loop |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2022-27782 |
curl: TLS and SSH connection too eager reuse |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
HIGH |
CVE-2020-21598 |
libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unw ... |
libde265-0 |
1.0.8-1 |
|
HIGH |
CVE-2021-36409 |
There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ... |
libde265-0 |
1.0.8-1 |
|
HIGH |
CVE-2022-1304 |
e2fsprogs: out-of-bounds read/write via crafted filesystem |
libext2fs2 |
1.46.2-2 |
|
HIGH |
CVE-2022-27405 |
FreeType: Segementation Fault |
libfreetype-dev |
2.10.4+dfsg-1 |
|
HIGH |
CVE-2022-27406 |
Freetype: Segmentation violation |
libfreetype-dev |
2.10.4+dfsg-1 |
|
HIGH |
CVE-2022-27405 |
FreeType: Segementation Fault |
libfreetype6 |
2.10.4+dfsg-1 |
|
HIGH |
CVE-2022-27406 |
Freetype: Segmentation violation |
libfreetype6 |
2.10.4+dfsg-1 |
|
HIGH |
CVE-2022-27405 |
FreeType: Segementation Fault |
libfreetype6-dev |
2.10.4+dfsg-1 |
|
HIGH |
CVE-2022-27406 |
Freetype: Segmentation violation |
libfreetype6-dev |
2.10.4+dfsg-1 |
|
HIGH |
CVE-2022-25308 |
fribidi: Stack based buffer overflow |
libfribidi0 |
1.0.8-2 |
|
HIGH |
CVE-2021-33560 |
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channe |
libgcrypt20 |
1.8.7-6 |
|
HIGH |
CVE-2021-44648 |
gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data |
libgdk-pixbuf-2.0-0 |
2.42.2+dfsg-1 |
|
HIGH |
CVE-2021-44648 |
gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data |
libgdk-pixbuf-2.0-dev |
2.42.2+dfsg-1 |
|
HIGH |
CVE-2021-44648 |
gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data |
libgdk-pixbuf2.0-bin |
2.42.2+dfsg-1 |
|
HIGH |
CVE-2021-44648 |
gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data |
libgdk-pixbuf2.0-common |
2.42.2+dfsg-1 |
|
HIGH |
CVE-2020-23109 |
Buffer overflow vulnerability in function convert_colorspace in heif_c ... |
libheif1 |
1.11.0-1 |
|
HIGH |
CVE-2022-1271 |
gzip: arbitrary-file-write vulnerability |
liblzma-dev |
5.2.5-2 |
5.2.5-2.1~deb11u1 |
HIGH |
CVE-2022-1271 |
gzip: arbitrary-file-write vulnerability |
liblzma5 |
5.2.5-2 |
5.2.5-2.1~deb11u1 |
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20309 |
ImagemMagick: Division by zero in WaveImage() of MagickCore/visual-effects.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20312 |
ImageMagick: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-20313 |
ImageMagick: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signatur |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-1114 |
ImageMagick: heap-use-after-free in RelinquishDCMInfo of dcm.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2022-28463 |
ImageMagick: heap-buffer-overflow in PushLongPixel() of quantum-private.h |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
HIGH |
CVE-2021-46669 |
mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27376 |
mariadb: assertion failure in Item_args::walk_arg |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27377 |
mariadb: use-after-poison when complex conversion is involved in blob |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27378 |
mariadb: server crash in create_tmp_table::finalize |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27379 |
mariadb: server crash in component arg_comparator::compare_real_fixed |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27380 |
mariadb: server crash at my_decimal::operator= |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27381 |
mariadb: server crash at Field::set_default via specially crafted SQL statements |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27382 |
mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27383 |
mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27384 |
mariadb: crash via component Item_subselect::init_expr_cache_tracker |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27385 |
mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27386 |
mariadb: server crashes in query_arena::set_query_arena upon SELECT from view |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27387 |
mariadb: assertion failures in decimal_bin_size |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27444 |
mariadb: crash when using HAVING with NOT EXIST predicate in an equality |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27445 |
mariadb: assertion failure in compare_order_elements |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27446 |
mariadb: crash when using HAVING with IS NULL predicate in an equality |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27447 |
mariadb: use-after-poison in Binary_string::free_buffer |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27448 |
mariadb: crash in multi-update and implicit grouping |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27449 |
mariadb: assertion failure in sql/item_func.cc |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27451 |
mariadb: crash via window function in expression in ORDER BY |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27452 |
mariadb: assertion failure in sql/item_cmpfunc.cc |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27455 |
mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27456 |
mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27457 |
mariadb: incorrect key in "dup value" error after long unique |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27458 |
mariadb: use-after-poison in Binary_string::free_buffer |
libmariadb-dev |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2021-46669 |
mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27376 |
mariadb: assertion failure in Item_args::walk_arg |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27377 |
mariadb: use-after-poison when complex conversion is involved in blob |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27378 |
mariadb: server crash in create_tmp_table::finalize |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27379 |
mariadb: server crash in component arg_comparator::compare_real_fixed |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27380 |
mariadb: server crash at my_decimal::operator= |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27381 |
mariadb: server crash at Field::set_default via specially crafted SQL statements |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27382 |
mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27383 |
mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27384 |
mariadb: crash via component Item_subselect::init_expr_cache_tracker |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27385 |
mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27386 |
mariadb: server crashes in query_arena::set_query_arena upon SELECT from view |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27387 |
mariadb: assertion failures in decimal_bin_size |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27444 |
mariadb: crash when using HAVING with NOT EXIST predicate in an equality |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27445 |
mariadb: assertion failure in compare_order_elements |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27446 |
mariadb: crash when using HAVING with IS NULL predicate in an equality |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27447 |
mariadb: use-after-poison in Binary_string::free_buffer |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27448 |
mariadb: crash in multi-update and implicit grouping |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27449 |
mariadb: assertion failure in sql/item_func.cc |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27451 |
mariadb: crash via window function in expression in ORDER BY |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27452 |
mariadb: assertion failure in sql/item_cmpfunc.cc |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27455 |
mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27456 |
mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27457 |
mariadb: incorrect key in "dup value" error after long unique |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27458 |
mariadb: use-after-poison in Binary_string::free_buffer |
libmariadb-dev-compat |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2021-46669 |
mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27376 |
mariadb: assertion failure in Item_args::walk_arg |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27377 |
mariadb: use-after-poison when complex conversion is involved in blob |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27378 |
mariadb: server crash in create_tmp_table::finalize |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27379 |
mariadb: server crash in component arg_comparator::compare_real_fixed |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27380 |
mariadb: server crash at my_decimal::operator= |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27381 |
mariadb: server crash at Field::set_default via specially crafted SQL statements |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27382 |
mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27383 |
mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27384 |
mariadb: crash via component Item_subselect::init_expr_cache_tracker |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27385 |
mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27386 |
mariadb: server crashes in query_arena::set_query_arena upon SELECT from view |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27387 |
mariadb: assertion failures in decimal_bin_size |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27444 |
mariadb: crash when using HAVING with NOT EXIST predicate in an equality |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27445 |
mariadb: assertion failure in compare_order_elements |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27446 |
mariadb: crash when using HAVING with IS NULL predicate in an equality |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27447 |
mariadb: use-after-poison in Binary_string::free_buffer |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27448 |
mariadb: crash in multi-update and implicit grouping |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27449 |
mariadb: assertion failure in sql/item_func.cc |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27451 |
mariadb: crash via window function in expression in ORDER BY |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27452 |
mariadb: assertion failure in sql/item_cmpfunc.cc |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27455 |
mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27456 |
mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27457 |
mariadb: incorrect key in "dup value" error after long unique |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27458 |
mariadb: use-after-poison in Binary_string::free_buffer |
libmariadb3 |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
libncurses-dev |
6.2+20201114-2 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
libncurses5-dev |
6.2+20201114-2 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
libncurses6 |
6.2+20201114-2 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
libncursesw5-dev |
6.2+20201114-2 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
libncursesw6 |
6.2+20201114-2 |
|
HIGH |
CVE-2021-3575 |
openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution |
libopenjp2-7 |
2.4.0-3 |
|
HIGH |
CVE-2021-3575 |
openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution |
libopenjp2-7-dev |
2.4.0-3 |
|
HIGH |
CVE-2020-16156 |
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files |
libperl5.32 |
5.32.1-4+deb11u2 |
|
HIGH |
CVE-2022-1552 |
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox |
libpq-dev |
13.5-0+deb11u1 |
13.7-0+deb11u1 |
HIGH |
CVE-2022-1552 |
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox |
libpq5 |
13.5-0+deb11u1 |
13.7-0+deb11u1 |
HIGH |
CVE-2021-3737 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response |
libpython3.9-minimal |
3.9.2-1 |
|
HIGH |
CVE-2022-0391 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs |
libpython3.9-minimal |
3.9.2-1 |
|
HIGH |
CVE-2021-3737 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response |
libpython3.9-stdlib |
3.9.2-1 |
|
HIGH |
CVE-2022-0391 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs |
libpython3.9-stdlib |
3.9.2-1 |
|
HIGH |
CVE-2022-1304 |
e2fsprogs: out-of-bounds read/write via crafted filesystem |
libss2 |
1.46.2-2 |
|
HIGH |
CVE-2022-24070 |
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption |
libsvn1 |
1.14.1-3 |
1.14.1-3+deb11u1 |
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
libtinfo6 |
6.2+20201114-2 |
|
HIGH |
CVE-2013-7445 |
kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2019-19378 |
kernel: out-of-bounds write in index_rbio_pages in fs/btrfs/raid56.c |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2019-19449 |
kernel: mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_ |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2019-19814 |
kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2020-12362 |
kernel: Integer overflow in Intel(R) Graphics Drivers |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2021-3847 |
kernel: low-privileged user privileges escalation |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2021-3864 |
kernel: descendant's dumpable setting with certain SUID binaries |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2021-39686 |
kernel: race condition in the Android binder driver could lead to incorrect security checks |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2021-4197 |
kernel: cgroup: Use open-time creds and namespace for migration perm checks |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2021-4204 |
kernel: improper input validation may lead to privilege escalation |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2022-0500 |
kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileg |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2022-1012 |
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
HIGH |
CVE-2022-1048 |
kernel: race condition in snd_pcm_hw_free leading to use-after-free |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-1247 |
kernel: A race condition bug in rose_connect() |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2022-1353 |
Kernel: A kernel-info-leak issue in pfkey_register |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-1652 |
kernel: A concurrency use-after-free in bad_flp_intr |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
HIGH |
CVE-2022-1679 |
kernel: Use-After-Free in ath9k_htc_probe_device() could cause an escalation of privileges |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2022-1786 |
kernel: invalid-free in io_uring that can lead to LPE |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
HIGH |
CVE-2022-1882 |
kernel: Use-After-Free in free_pipe_info() could cause an escalation of privileges |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2022-26490 |
kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-27666 |
kernel: buffer overflow in IPsec ESP transformation code |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-28356 |
CVE-2022-28356 kernel: refcount leak in llc_ui_bind and llc_ui_autobind |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-28388 |
kernel: a double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-28389 |
kernel: a double free in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-28390 |
kernel: a double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-28893 |
kernel: Use after free in SUNRPC subsystem |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
HIGH |
CVE-2022-29581 |
kernel: Improper Update of Reference Count vulnerability in net/sched |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-29582 |
kernel: Race condition that allows container escape to system root |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-30594 |
kernel: mishandled seccomp permissions |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
HIGH |
CVE-2022-32250 |
kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
HIGH |
CVE-2022-32981 |
kernel: Linux kernel for powerpc 32-bit buffer overflow in ptrace PEEKUSER/POKEUSER |
linux-libc-dev |
5.10.106-1 |
|
HIGH |
CVE-2022-1304 |
e2fsprogs: out-of-bounds read/write via crafted filesystem |
logsave |
1.46.2-2 |
|
HIGH |
CVE-2021-46669 |
mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free wh |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27376 |
mariadb: assertion failure in Item_args::walk_arg |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27377 |
mariadb: use-after-poison when complex conversion is involved in blob |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27378 |
mariadb: server crash in create_tmp_table::finalize |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27379 |
mariadb: server crash in component arg_comparator::compare_real_fixed |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27380 |
mariadb: server crash at my_decimal::operator= |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27381 |
mariadb: server crash at Field::set_default via specially crafted SQL statements |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27382 |
mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27383 |
mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27384 |
mariadb: crash via component Item_subselect::init_expr_cache_tracker |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27385 |
mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27386 |
mariadb: server crashes in query_arena::set_query_arena upon SELECT from view |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27387 |
mariadb: assertion failures in decimal_bin_size |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27444 |
mariadb: crash when using HAVING with NOT EXIST predicate in an equality |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27445 |
mariadb: assertion failure in compare_order_elements |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27446 |
mariadb: crash when using HAVING with IS NULL predicate in an equality |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27447 |
mariadb: use-after-poison in Binary_string::free_buffer |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27448 |
mariadb: crash in multi-update and implicit grouping |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27449 |
mariadb: assertion failure in sql/item_func.cc |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27451 |
mariadb: crash via window function in expression in ORDER BY |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27452 |
mariadb: assertion failure in sql/item_cmpfunc.cc |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27455 |
mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27456 |
mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27457 |
mariadb: incorrect key in "dup value" error after long unique |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-27458 |
mariadb: use-after-poison in Binary_string::free_buffer |
mariadb-common |
1:10.5.15-0+deb11u1 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
ncurses-base |
6.2+20201114-2 |
|
HIGH |
CVE-2022-29458 |
ncurses: segfaulting OOB read |
ncurses-bin |
6.2+20201114-2 |
|
HIGH |
CVE-2021-41617 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configur |
openssh-client |
1:8.4p1-5 |
|
HIGH |
CVE-2020-16156 |
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files |
perl |
5.32.1-4+deb11u2 |
|
HIGH |
CVE-2020-16156 |
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files |
perl-base |
5.32.1-4+deb11u2 |
|
HIGH |
CVE-2020-16156 |
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files |
perl-modules-5.32 |
5.32.1-4+deb11u2 |
|
HIGH |
CVE-2021-3737 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response |
python3.9 |
3.9.2-1 |
|
HIGH |
CVE-2022-0391 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs |
python3.9 |
3.9.2-1 |
|
HIGH |
CVE-2021-3737 |
python: urllib: HTTP client possible infinite loop on a 100 Continue response |
python3.9-minimal |
3.9.2-1 |
|
HIGH |
CVE-2022-0391 |
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs |
python3.9-minimal |
3.9.2-1 |
|
HIGH |
CVE-2022-24070 |
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption |
subversion |
1.14.1-3 |
1.14.1-3+deb11u1 |
HIGH |
CVE-2022-1271 |
gzip: arbitrary-file-write vulnerability |
xz-utils |
5.2.5-2 |
5.2.5-2.1~deb11u1 |
HIGH |
CVE-2018-25032 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs |
zlib1g |
1:1.2.11.dfsg-2 |
1:1.2.11.dfsg-2+deb11u1 |
HIGH |
CVE-2018-25032 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs |
zlib1g-dev |
1:1.2.11.dfsg-2 |
1:1.2.11.dfsg-2+deb11u1 |
HIGH |
CVE-2021-31542 |
django: Potential directory-traversal via uploaded files |
Django |
3.1.7 |
2.2.21, 3.1.9, 3.2.1 |
HIGH |
CVE-2021-33571 |
django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in |
Django |
3.1.7 |
2.2.24, 3.1.12, 3.2.4 |
HIGH |
CVE-2021-44420 |
django: potential bypass of an upstream access control based on URL paths |
Django |
3.1.7 |
2.2.25, 3.1.14, 3.2.10 |
HIGH |
CVE-2021-32839 |
python-sqlparse: ReDoS via regular expression in StripComments filter |
sqlparse |
0.4.1 |
0.4.2 |
MEDIUM |
CVE-2021-22947 |
curl: Server responses received before STARTTLS processed after TLS handshake |
curl |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27774 |
curl: credential leak on redirect |
curl |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27776 |
curl: auth/cookie leak on redirect |
curl |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2020-36130 |
AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... |
libaom0 |
1.0.0.errata1-3 |
|
MEDIUM |
CVE-2020-36135 |
AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... |
libaom0 |
1.0.0.errata1-3 |
|
MEDIUM |
CVE-2021-3658 |
bluez: adapter incorrectly restores Discoverable state after powered down |
libbluetooth-dev |
5.55-3.1 |
|
MEDIUM |
CVE-2021-41229 |
bluez: memory leak in the SDP protocol |
libbluetooth-dev |
5.55-3.1 |
|
MEDIUM |
CVE-2021-3658 |
bluez: adapter incorrectly restores Discoverable state after powered down |
libbluetooth3 |
5.55-3.1 |
|
MEDIUM |
CVE-2021-41229 |
bluez: memory leak in the SDP protocol |
libbluetooth3 |
5.55-3.1 |
|
MEDIUM |
CVE-2021-22947 |
curl: Server responses received before STARTTLS processed after TLS handshake |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27774 |
curl: credential leak on redirect |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27776 |
curl: auth/cookie leak on redirect |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2021-22947 |
curl: Server responses received before STARTTLS processed after TLS handshake |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27774 |
curl: credential leak on redirect |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27776 |
curl: auth/cookie leak on redirect |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2021-22947 |
curl: Server responses received before STARTTLS processed after TLS handshake |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27774 |
curl: credential leak on redirect |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2022-27776 |
curl: auth/cookie leak on redirect |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
MEDIUM |
CVE-2020-21594 |
libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fal ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21595 |
libde265 v1.0.4 contains a heap buffer overflow in the mc_luma functio ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21596 |
libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_ ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21597 |
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma funct ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21599 |
libde265 v1.0.4 contains a heap buffer overflow in the de265_image::av ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21600 |
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pr ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21601 |
libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallb ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21602 |
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bi ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21603 |
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fa ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21604 |
libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21605 |
libde265 v1.0.4 contains a segmentation fault in the apply_sao_interna ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2020-21606 |
libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_ ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2021-35452 |
An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2021-36408 |
An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2021-36410 |
A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2021-36411 |
An issue has been found in libde265 v1.0.8 due to incorrect access con ... |
libde265-0 |
1.0.8-1 |
|
MEDIUM |
CVE-2022-25309 |
fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode |
libfribidi0 |
1.0.8-2 |
|
MEDIUM |
CVE-2022-25310 |
fribidi: SEGV in fribidi_remove_bidi_marks |
libfribidi0 |
1.0.8-2 |
|
MEDIUM |
CVE-2021-4209 |
GnuTLS: Null pointer dereference in MD_UPDATE |
libgnutls30 |
3.7.1-5 |
|
MEDIUM |
CVE-2021-46822 |
libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c |
libjpeg-dev |
1:2.0.6-4 |
|
MEDIUM |
CVE-2021-46822 |
libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c |
libjpeg62-turbo |
1:2.0.6-4 |
|
MEDIUM |
CVE-2021-46822 |
libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c |
libjpeg62-turbo-dev |
1:2.0.6-4 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20241 |
ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20243 |
ImageMagick: Division by zero in GetResizeFilterWeight in MagickCore/resize.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20244 |
ImageMagick: Division by zero in ImplodeImage in MagickCore/visual-effects.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20245 |
ImageMagick: Division by zero in WriteAnimatedWEBPImage() in coders/webp.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-20246 |
ImageMagick: Division by zero in ScaleResampleFilter in MagickCore/resample.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-39212 |
ImageMagick: possible read or write in postscript files |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-4219 |
imagemagick: remote DoS in MagicCore/draw.c via crafted SVG file |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-1115 |
ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2022-32547 |
ImageMagick: load of misaligned address at MagickCore/property.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
MEDIUM |
CVE-2021-23215 |
OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-26260 |
OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3598 |
OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3605 |
OpenEXR: Heap buffer overflow in the rleUncompress function |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3933 |
openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3941 |
openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-45942 |
OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute |
libopenexr-dev |
2.5.4-2 |
|
MEDIUM |
CVE-2021-23215 |
OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-26260 |
OpenEXR: Integer-overflow in Imf_2_5::DwaCompressor::initializeBuffers |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3598 |
OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3605 |
OpenEXR: Heap buffer overflow in the rleUncompress function |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3933 |
openexr: Integer-overflow in Imf_3_1::bytesPerDeepLineTable |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-3941 |
openexr: Divide-by-zero in Imf_3_1::RGBtoXYZ |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-45942 |
OpenEXR: heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute |
libopenexr25 |
2.5.4-2 |
|
MEDIUM |
CVE-2021-29338 |
openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c |
libopenjp2-7 |
2.4.0-3 |
|
MEDIUM |
CVE-2022-1122 |
openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer |
libopenjp2-7 |
2.4.0-3 |
|
MEDIUM |
CVE-2021-29338 |
openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c |
libopenjp2-7-dev |
2.4.0-3 |
|
MEDIUM |
CVE-2022-1122 |
openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer |
libopenjp2-7-dev |
2.4.0-3 |
|
MEDIUM |
CVE-2021-3426 |
python: Information disclosure via pydoc |
libpython3.9-minimal |
3.9.2-1 |
|
MEDIUM |
CVE-2021-3733 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler |
libpython3.9-minimal |
3.9.2-1 |
|
MEDIUM |
CVE-2021-4189 |
python: ftplib should not use the host from the PASV response |
libpython3.9-minimal |
3.9.2-1 |
|
MEDIUM |
CVE-2021-3426 |
python: Information disclosure via pydoc |
libpython3.9-stdlib |
3.9.2-1 |
|
MEDIUM |
CVE-2021-3733 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler |
libpython3.9-stdlib |
3.9.2-1 |
|
MEDIUM |
CVE-2021-4189 |
python: ftplib should not use the host from the PASV response |
libpython3.9-stdlib |
3.9.2-1 |
|
MEDIUM |
CVE-2021-45346 |
sqlite: crafted SQL query allows a malicious user to obtain sensitive information |
libsqlite3-0 |
3.34.1-3 |
|
MEDIUM |
CVE-2021-45346 |
sqlite: crafted SQL query allows a malicious user to obtain sensitive information |
libsqlite3-dev |
3.34.1-3 |
|
MEDIUM |
CVE-2022-2068 |
openssl: the c_rehash script allows command injection |
libssl-dev |
1.1.1n-0+deb11u1 |
|
MEDIUM |
CVE-2022-2068 |
openssl: the c_rehash script allows command injection |
libssl1.1 |
1.1.1n-0+deb11u1 |
|
MEDIUM |
CVE-2021-28544 |
subversion: SVN authz protected copyfrom paths regression |
libsvn1 |
1.14.1-3 |
1.14.1-3+deb11u1 |
MEDIUM |
CVE-2022-1210 |
tiff: Malicious file leads to a denial of service in TIFF File Handler |
libtiff-dev |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1354 |
libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c |
libtiff-dev |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1355 |
libtiff: stack-buffer-overflow in tiffcp.c in main() |
libtiff-dev |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1622 |
libtiff: out-of-bounds read in LZWDecode |
libtiff-dev |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1623 |
libtiff: out-of-bounds read in LZWDecode |
libtiff-dev |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1210 |
tiff: Malicious file leads to a denial of service in TIFF File Handler |
libtiff5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1354 |
libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c |
libtiff5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1355 |
libtiff: stack-buffer-overflow in tiffcp.c in main() |
libtiff5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1622 |
libtiff: out-of-bounds read in LZWDecode |
libtiff5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1623 |
libtiff: out-of-bounds read in LZWDecode |
libtiff5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1210 |
tiff: Malicious file leads to a denial of service in TIFF File Handler |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1354 |
libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1355 |
libtiff: stack-buffer-overflow in tiffcp.c in main() |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1622 |
libtiff: out-of-bounds read in LZWDecode |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-1623 |
libtiff: out-of-bounds read in LZWDecode |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
MEDIUM |
CVE-2022-29824 |
libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write |
libxml2 |
2.9.10+dfsg-6.7+deb11u1 |
2.9.10+dfsg-6.7+deb11u2 |
MEDIUM |
CVE-2022-29824 |
libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write |
libxml2-dev |
2.9.10+dfsg-6.7+deb11u1 |
2.9.10+dfsg-6.7+deb11u2 |
MEDIUM |
CVE-2019-15213 |
kernel: use-after-free caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2019-15794 |
kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2019-16089 |
kernel: Improper return check in nbd_genl_status function in drivers/block/nbd.c |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2019-20794 |
kernel: task processes not being properly ended could lead to resource exhaustion |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-12363 |
kernel: Improper input validation in some Intel(R) Graphics Drivers |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-12364 |
kernel: Null pointer dereference in some Intel(R) Graphics Drivers |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-14304 |
kernel: ethtool when reading eeprom of device could lead to memory leak |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-15802 |
hardware: BLURtooth: "Dual mode" hardware using CTKD are vulnerable to key overwrite |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-24504 |
kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-26555 |
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2020-36516 |
kernel: an off-path attacker may inject data or terminate a victim's TCP session |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-33061 |
kernel: insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapter |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-3669 |
kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-3714 |
kernel: Remote Page Deduplication Attacks |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-3759 |
kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-4023 |
kernel: Improper IO-uring request cancellation operation allows local users to cause a crash |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-4037 |
kernel: security regression for CVE-2018-13405 |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-4149 |
kernel: Improper lock operation in btrfs |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2021-44879 |
kernel: NULL pointer dereference in folio_mark_dirty() via a crafted f2fs image |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-0168 |
kernel: smb2_ioctl_query_info NULL Pointer Dereference |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-0171 |
kernel: KVM: cache incoherence issue in SEV API may lead to kernel crash |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-0400 |
kernel: Out of bounds read in the smc protocol stack |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-0480 |
kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-0494 |
kernel: information leak in scsi_ioctl() |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-0854 |
kernel: swiotlb information leak with DMA_FROM_DEVICE |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1016 |
kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1158 |
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1184 |
kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-1195 |
kernel: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after un |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1198 |
kernel: use-after-free in drivers/net/hamradio/6pack.c |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1199 |
kernel: Null pointer dereference and use after free in ax25_release() |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1204 |
kernel: Use after free in net/ax25/af_ax25.c |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1205 |
kernel: Null pointer dereference and use after free in net/ax25/ax25_timer.c |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1280 |
kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-1462 |
kernel: possible race condition in drivers/tty/tty_buffers.c |
linux-libc-dev |
5.10.106-1 |
|
MEDIUM |
CVE-2022-1508 |
kernel: out-of-bounds read in iov_iter_revert() in lib/iov_iter.c |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1516 |
kernel: null-ptr-deref caused by x25_disconnect |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-1729 |
kernel: race condition in perf_event_open leads to privilege escalation |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1789 |
kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1852 |
kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1972 |
kernel: out-of-bounds write vulnerability in nftable may lead to local privilege escalation |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1974 |
kernel: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-spa |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-1975 |
kernel: sleep in atomic bug when firmware download timeout |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-2078 |
kernel: Vulnerability of buffer overflow in nft_set_desc_concat_parse() |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-21499 |
kernel: possible to use the debugger to write zero into a location of choice |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
MEDIUM |
CVE-2022-2153 |
kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-33981 |
kernel: use-after-free in floppy driver may lead to a DoS |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |
MEDIUM |
CVE-2022-2068 |
openssl: the c_rehash script allows command injection |
openssl |
1.1.1n-0+deb11u1 |
|
MEDIUM |
CVE-2021-3426 |
python: Information disclosure via pydoc |
python3.9 |
3.9.2-1 |
|
MEDIUM |
CVE-2021-3733 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler |
python3.9 |
3.9.2-1 |
|
MEDIUM |
CVE-2021-4189 |
python: ftplib should not use the host from the PASV response |
python3.9 |
3.9.2-1 |
|
MEDIUM |
CVE-2021-3426 |
python: Information disclosure via pydoc |
python3.9-minimal |
3.9.2-1 |
|
MEDIUM |
CVE-2021-3733 |
python: urllib: Regular expression DoS in AbstractBasicAuthHandler |
python3.9-minimal |
3.9.2-1 |
|
MEDIUM |
CVE-2021-4189 |
python: ftplib should not use the host from the PASV response |
python3.9-minimal |
3.9.2-1 |
|
MEDIUM |
CVE-2021-28544 |
subversion: SVN authz protected copyfrom paths regression |
subversion |
1.14.1-3 |
1.14.1-3+deb11u1 |
MEDIUM |
CVE-2022-0529 |
unzip: Heap out-of-bound writes and reads during conversion of wide string to local string |
unzip |
6.0-26 |
|
MEDIUM |
CVE-2022-0530 |
unzip: SIGSEGV during the conversion of an utf-8 string to a local string |
unzip |
6.0-26 |
|
MEDIUM |
CVE-2021-31879 |
wget: authorization header disclosure on redirect |
wget |
1.21-1+deb11u1 |
|
MEDIUM |
CVE-2021-28658 |
django: potential directory-traversal via uploaded files |
Django |
3.1.7 |
2.2.20, 3.0.14, 3.1.8 |
MEDIUM |
CVE-2021-32052 |
django: header injection possibility since URLValidator accepted newlines in input on Python 3.9.5+ |
Django |
3.1.7 |
2.2.22, 3.1.10, 3.2.2 |
MEDIUM |
CVE-2021-33203 |
django: Potential directory traversal via admindocs |
Django |
3.1.7 |
2.2.24, 3.1.12, 3.2.4 |
LOW |
CVE-2011-3374 |
It was found that apt-key in apt, all versions, do not correctly valid ... |
apt |
2.2.4 |
|
LOW |
CVE-2017-13716 |
binutils: Memory leak with the C++ symbol demangler routine in libiberty |
binutils |
2.35.2-2 |
|
LOW |
CVE-2018-12934 |
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c |
binutils |
2.35.2-2 |
|
LOW |
CVE-2018-18483 |
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service |
binutils |
2.35.2-2 |
|
LOW |
CVE-2018-20623 |
binutils: Use-after-free in the error function |
binutils |
2.35.2-2 |
|
LOW |
CVE-2018-20673 |
libiberty: Integer overflow in demangle_template() function |
binutils |
2.35.2-2 |
|
LOW |
CVE-2018-20712 |
libiberty: heap-based buffer over-read in d_expression_1 |
binutils |
2.35.2-2 |
|
LOW |
CVE-2018-9996 |
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash |
binutils |
2.35.2-2 |
|
LOW |
CVE-2019-1010204 |
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread |
binutils |
2.35.2-2 |
|
LOW |
CVE-2020-35448 |
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-20197 |
binutils: Race window allows users to own arbitrary files |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-20284 |
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-3487 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-3530 |
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-3549 |
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-45078 |
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c |
binutils |
2.35.2-2 |
|
LOW |
CVE-2021-46195 |
gcc: uncontrolled recursion in libiberty/rust-demangle.c |
binutils |
2.35.2-2 |
|
LOW |
CVE-2017-13716 |
binutils: Memory leak with the C++ symbol demangler routine in libiberty |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2018-12934 |
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2018-18483 |
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2018-20623 |
binutils: Use-after-free in the error function |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2018-20673 |
libiberty: Integer overflow in demangle_template() function |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2018-20712 |
libiberty: heap-based buffer over-read in d_expression_1 |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2018-9996 |
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2019-1010204 |
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2020-35448 |
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-20197 |
binutils: Race window allows users to own arbitrary files |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-20284 |
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-3487 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-3530 |
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-3549 |
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-45078 |
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2021-46195 |
gcc: uncontrolled recursion in libiberty/rust-demangle.c |
binutils-common |
2.35.2-2 |
|
LOW |
CVE-2017-13716 |
binutils: Memory leak with the C++ symbol demangler routine in libiberty |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2018-12934 |
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2018-18483 |
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2018-20623 |
binutils: Use-after-free in the error function |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2018-20673 |
libiberty: Integer overflow in demangle_template() function |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2018-20712 |
libiberty: heap-based buffer over-read in d_expression_1 |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2018-9996 |
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2019-1010204 |
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2020-35448 |
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-20197 |
binutils: Race window allows users to own arbitrary files |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-20284 |
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-3487 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-3530 |
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-3549 |
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-45078 |
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2021-46195 |
gcc: uncontrolled recursion in libiberty/rust-demangle.c |
binutils-x86-64-linux-gnu |
2.35.2-2 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
bsdutils |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2016-2781 |
coreutils: Non-privileged session can escape to the parent session in chroot |
coreutils |
8.32-4 |
|
LOW |
CVE-2017-18018 |
coreutils: race condition vulnerability in chown and chgrp |
coreutils |
8.32-4 |
|
LOW |
CVE-2021-22898 |
curl: TELNET stack contents disclosure |
curl |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22922 |
curl: Content not matching hash in Metalink is not being discarded |
curl |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22923 |
curl: Metalink download sends credentials |
curl |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22924 |
curl: Bad connection reuse due to flawed path name checks |
curl |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2018-1000021 |
git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages t |
git |
1:2.30.2-1 |
|
LOW |
CVE-2022-24975 |
git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" |
git |
1:2.30.2-1 |
|
LOW |
CVE-2018-1000021 |
git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages t |
git-man |
1:2.30.2-1 |
|
LOW |
CVE-2022-24975 |
git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" |
git-man |
1:2.30.2-1 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
imagemagick |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
imagemagick-6-common |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
imagemagick-6.q16 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2004-0971 |
security flaw |
krb5-multidev |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
krb5-multidev |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2011-3374 |
It was found that apt-key in apt, all versions, do not correctly valid ... |
libapt-pkg6.0 |
2.2.4 |
|
LOW |
CVE-2017-13716 |
binutils: Memory leak with the C++ symbol demangler routine in libiberty |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2018-12934 |
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2018-18483 |
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2018-20623 |
binutils: Use-after-free in the error function |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2018-20673 |
libiberty: Integer overflow in demangle_template() function |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2018-20712 |
libiberty: heap-based buffer over-read in d_expression_1 |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2018-9996 |
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2019-1010204 |
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2020-35448 |
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-20197 |
binutils: Race window allows users to own arbitrary files |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-20284 |
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-3487 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-3530 |
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-3549 |
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-45078 |
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2021-46195 |
gcc: uncontrolled recursion in libiberty/rust-demangle.c |
libbinutils |
2.35.2-2 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
libblkid-dev |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
libblkid1 |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2016-9797 |
bluez: buffer over-read in l2cap_dump() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9798 |
bluez: use-after-free in conf_opt() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9799 |
bluez: buffer overflow in pklg_read_hci() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9800 |
bluez: buffer overflow in pin_code_reply_dump() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9801 |
bluez: buffer overflow in set_ext_ctrl() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9802 |
bluez: buffer over-read in l2cap_packet() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9803 |
bluez: out-of-bounds read in le_meta_ev_dump() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9804 |
bluez: buffer overflow in commands_dump() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9917 |
bluez: Heap-based buffer overflow vulnerability in read_n() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9918 |
bluez: Out of bounds stack read in packet_hexdump() |
libbluetooth-dev |
5.55-3.1 |
|
LOW |
CVE-2016-9797 |
bluez: buffer over-read in l2cap_dump() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9798 |
bluez: use-after-free in conf_opt() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9799 |
bluez: buffer overflow in pklg_read_hci() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9800 |
bluez: buffer overflow in pin_code_reply_dump() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9801 |
bluez: buffer overflow in set_ext_ctrl() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9802 |
bluez: buffer over-read in l2cap_packet() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9803 |
bluez: out-of-bounds read in le_meta_ev_dump() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9804 |
bluez: buffer overflow in commands_dump() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9917 |
bluez: Heap-based buffer overflow vulnerability in read_n() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2016-9918 |
bluez: Out of bounds stack read in packet_hexdump() |
libbluetooth3 |
5.55-3.1 |
|
LOW |
CVE-2010-4756 |
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2018-20796 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010022 |
glibc: stack guard protection bypass |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010023 |
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010024 |
glibc: ASLR bypass using cache of thread stack and heap |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010025 |
glibc: information disclosure of heap addresses of pthread_created thread |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-9192 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2010-4756 |
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2018-20796 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010022 |
glibc: stack guard protection bypass |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010023 |
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010024 |
glibc: ASLR bypass using cache of thread stack and heap |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010025 |
glibc: information disclosure of heap addresses of pthread_created thread |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-9192 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc-dev-bin |
2.31-13+deb11u3 |
|
LOW |
CVE-2010-4756 |
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2018-20796 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010022 |
glibc: stack guard protection bypass |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010023 |
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010024 |
glibc: ASLR bypass using cache of thread stack and heap |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010025 |
glibc: information disclosure of heap addresses of pthread_created thread |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-9192 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc6 |
2.31-13+deb11u3 |
|
LOW |
CVE-2010-4756 |
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expres |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2018-20796 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010022 |
glibc: stack guard protection bypass |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010023 |
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010024 |
glibc: ASLR bypass using cache of thread stack and heap |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-1010025 |
glibc: information disclosure of heap addresses of pthread_created thread |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2019-9192 |
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c |
libc6-dev |
2.31-13+deb11u3 |
|
LOW |
CVE-2017-7475 |
cairo: NULL pointer dereference with a crafted font file |
libcairo-gobject2 |
1.16.0-5 |
|
LOW |
CVE-2018-18064 |
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document |
libcairo-gobject2 |
1.16.0-5 |
|
LOW |
CVE-2019-6461 |
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c |
libcairo-gobject2 |
1.16.0-5 |
|
LOW |
CVE-2019-6462 |
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c |
libcairo-gobject2 |
1.16.0-5 |
|
LOW |
CVE-2017-7475 |
cairo: NULL pointer dereference with a crafted font file |
libcairo-script-interpreter2 |
1.16.0-5 |
|
LOW |
CVE-2018-18064 |
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document |
libcairo-script-interpreter2 |
1.16.0-5 |
|
LOW |
CVE-2019-6461 |
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c |
libcairo-script-interpreter2 |
1.16.0-5 |
|
LOW |
CVE-2019-6462 |
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c |
libcairo-script-interpreter2 |
1.16.0-5 |
|
LOW |
CVE-2017-7475 |
cairo: NULL pointer dereference with a crafted font file |
libcairo2 |
1.16.0-5 |
|
LOW |
CVE-2018-18064 |
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document |
libcairo2 |
1.16.0-5 |
|
LOW |
CVE-2019-6461 |
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c |
libcairo2 |
1.16.0-5 |
|
LOW |
CVE-2019-6462 |
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c |
libcairo2 |
1.16.0-5 |
|
LOW |
CVE-2017-7475 |
cairo: NULL pointer dereference with a crafted font file |
libcairo2-dev |
1.16.0-5 |
|
LOW |
CVE-2018-18064 |
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document |
libcairo2-dev |
1.16.0-5 |
|
LOW |
CVE-2019-6461 |
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c |
libcairo2-dev |
1.16.0-5 |
|
LOW |
CVE-2019-6462 |
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c |
libcairo2-dev |
1.16.0-5 |
|
LOW |
CVE-2017-13716 |
binutils: Memory leak with the C++ symbol demangler routine in libiberty |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2018-12934 |
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2018-18483 |
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2018-20623 |
binutils: Use-after-free in the error function |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2018-20673 |
libiberty: Integer overflow in demangle_template() function |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2018-20712 |
libiberty: heap-based buffer over-read in d_expression_1 |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2018-9996 |
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2019-1010204 |
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2020-35448 |
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-20197 |
binutils: Race window allows users to own arbitrary files |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-20284 |
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-3487 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-3530 |
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-3549 |
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-45078 |
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2021-46195 |
gcc: uncontrolled recursion in libiberty/rust-demangle.c |
libctf-nobfd0 |
2.35.2-2 |
|
LOW |
CVE-2017-13716 |
binutils: Memory leak with the C++ symbol demangler routine in libiberty |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2018-12934 |
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2018-18483 |
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2018-20623 |
binutils: Use-after-free in the error function |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2018-20673 |
libiberty: Integer overflow in demangle_template() function |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2018-20712 |
libiberty: heap-based buffer over-read in d_expression_1 |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2018-9996 |
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2019-1010204 |
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2020-35448 |
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not v |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-20197 |
binutils: Race window allows users to own arbitrary files |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-20284 |
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-3487 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-3530 |
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-3549 |
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section para |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-45078 |
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-46195 |
gcc: uncontrolled recursion in libiberty/rust-demangle.c |
libctf0 |
2.35.2-2 |
|
LOW |
CVE-2021-22898 |
curl: TELNET stack contents disclosure |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22922 |
curl: Content not matching hash in Metalink is not being discarded |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22923 |
curl: Metalink download sends credentials |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22924 |
curl: Bad connection reuse due to flawed path name checks |
libcurl3-gnutls |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22898 |
curl: TELNET stack contents disclosure |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22922 |
curl: Content not matching hash in Metalink is not being discarded |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22923 |
curl: Metalink download sends credentials |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22924 |
curl: Bad connection reuse due to flawed path name checks |
libcurl4 |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22898 |
curl: TELNET stack contents disclosure |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22922 |
curl: Content not matching hash in Metalink is not being discarded |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22923 |
curl: Metalink download sends credentials |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2021-22924 |
curl: Bad connection reuse due to flawed path name checks |
libcurl4-openssl-dev |
7.74.0-1.3+deb11u1 |
|
LOW |
CVE-2013-0340 |
expat: internal entity expansion |
libexpat1 |
2.2.10-2+deb11u3 |
|
LOW |
CVE-2013-0340 |
expat: internal entity expansion |
libexpat1-dev |
2.2.10-2+deb11u3 |
|
LOW |
CVE-2022-31782 |
ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... |
libfreetype-dev |
2.10.4+dfsg-1 |
|
LOW |
CVE-2022-31782 |
ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... |
libfreetype6 |
2.10.4+dfsg-1 |
|
LOW |
CVE-2022-31782 |
ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... |
libfreetype6-dev |
2.10.4+dfsg-1 |
|
LOW |
CVE-2018-6829 |
libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintex |
libgcrypt20 |
1.8.7-6 |
|
LOW |
CVE-2012-0039 |
glib2: hash table collisions CPU usage DoS |
libglib2.0-0 |
2.66.8-1 |
|
LOW |
CVE-2012-0039 |
glib2: hash table collisions CPU usage DoS |
libglib2.0-bin |
2.66.8-1 |
|
LOW |
CVE-2012-0039 |
glib2: hash table collisions CPU usage DoS |
libglib2.0-data |
2.66.8-1 |
|
LOW |
CVE-2012-0039 |
glib2: hash table collisions CPU usage DoS |
libglib2.0-dev |
2.66.8-1 |
|
LOW |
CVE-2012-0039 |
glib2: hash table collisions CPU usage DoS |
libglib2.0-dev-bin |
2.66.8-1 |
|
LOW |
CVE-2011-3389 |
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) |
libgnutls30 |
3.7.1-5 |
|
LOW |
CVE-2004-0971 |
security flaw |
libgssapi-krb5-2 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libgssapi-krb5-2 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libgssrpc4 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libgssrpc4 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2017-9937 |
libtiff: memory malloc failure in tif_jbig.c could cause DOS. |
libjbig-dev |
2.1-3.1 |
|
LOW |
CVE-2017-9937 |
libtiff: memory malloc failure in tif_jbig.c could cause DOS. |
libjbig0 |
2.1-3.1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libk5crypto3 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libk5crypto3 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libkadm5clnt-mit12 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libkadm5clnt-mit12 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libkadm5srv-mit12 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libkadm5srv-mit12 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libkdb5-10 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libkdb5-10 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libkrb5-3 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libkrb5-3 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libkrb5-dev |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libkrb5-dev |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2004-0971 |
security flaw |
libkrb5support0 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2018-5709 |
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c |
libkrb5support0 |
1.18.3-6+deb11u1 |
|
LOW |
CVE-2015-3276 |
openldap: incorrect multi-keyword mode cipherstring parsing |
libldap-2.4-2 |
2.4.57+dfsg-3 |
|
LOW |
CVE-2017-14159 |
openldap: Privilege escalation via PID file manipulation |
libldap-2.4-2 |
2.4.57+dfsg-3 |
|
LOW |
CVE-2017-17740 |
openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers |
libldap-2.4-2 |
2.4.57+dfsg-3 |
|
LOW |
CVE-2020-15719 |
openldap: Certificate validation incorrectly matches name against CN-ID |
libldap-2.4-2 |
2.4.57+dfsg-3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickcore-6-arch-config |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickcore-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickcore-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickcore-6.q16-6-extra |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickcore-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickcore-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickwand-6-headers |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickwand-6.q16-6 |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickwand-6.q16-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2005-0406 |
A design flaw in image processing software that modifies JPEG images m ... |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2008-3134 |
GraphicsMagick/ImageMagick: multiple crash or DoS issues |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2016-8678 |
ImageMagick: Heap-buffer overflow in IsPixelMonochrome |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11754 |
ImageMagick: Memory leak in WritePICONImage function |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-11755 |
ImageMagick: Memory leak in WritePICONImage function via mishandled AcquireSemaphoreInfo call |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2017-7275 |
ImageMagick: Memory allocation failure in AcquireMagickMemory (incomplete fix for CVE-2016-8866) |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2018-15607 |
ImageMagick: CPU Exhaustion via crafted input file |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2021-20311 |
ImageMagick: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32545 |
ImageMagick: outside the range of representable values of type 'unsigned char' at coders/psd.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-32546 |
ImageMagick: outside the range of representable values of type 'unsigned long' at coders/pcl.c |
libmagickwand-dev |
8:6.9.11.60+dfsg-1.3 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
libmount-dev |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
libmount1 |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
libncurses-dev |
6.2+20201114-2 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
libncurses5-dev |
6.2+20201114-2 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
libncurses6 |
6.2+20201114-2 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
libncursesw5-dev |
6.2+20201114-2 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
libncursesw6 |
6.2+20201114-2 |
|
LOW |
CVE-2017-14988 |
OpenEXR: Excessive memory allocation in Header::readfrom |
libopenexr-dev |
2.5.4-2 |
|
LOW |
CVE-2021-26945 |
OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart> |
libopenexr-dev |
2.5.4-2 |
|
LOW |
CVE-2017-14988 |
OpenEXR: Excessive memory allocation in Header::readfrom |
libopenexr25 |
2.5.4-2 |
|
LOW |
CVE-2021-26945 |
OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart> |
libopenexr25 |
2.5.4-2 |
|
LOW |
CVE-2016-10505 |
openjpeg: NULL pointer dereference in imagetopnm function in convert.c |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-10506 |
openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9113 |
CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security i |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9114 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9115 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9116 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9117 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9580 |
openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-9581 |
openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2017-17479 |
openjpeg: Stack-buffer overflow in the pgxtoimage function |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2018-16375 |
openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2018-16376 |
openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2018-20846 |
openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2019-6988 |
openjpeg: DoS via memory exhaustion in opj_decompress |
libopenjp2-7 |
2.4.0-3 |
|
LOW |
CVE-2016-10505 |
openjpeg: NULL pointer dereference in imagetopnm function in convert.c |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-10506 |
openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9113 |
CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multiple security i |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9114 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9115 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9116 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9117 |
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 openjpeg2: Multi |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9580 |
openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2016-9581 |
openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2017-17479 |
openjpeg: Stack-buffer overflow in the pgxtoimage function |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2018-16375 |
openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2018-16376 |
openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2018-20846 |
openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2019-6988 |
openjpeg: DoS via memory exhaustion in opj_decompress |
libopenjp2-7-dev |
2.4.0-3 |
|
LOW |
CVE-2017-11164 |
pcre: OP_KETRMAX feature in the match function in pcre_exec.c |
libpcre16-3 |
2:8.39-13 |
|
LOW |
CVE-2017-16231 |
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service |
libpcre16-3 |
2:8.39-13 |
|
LOW |
CVE-2017-7245 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre16-3 |
2:8.39-13 |
|
LOW |
CVE-2017-7246 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre16-3 |
2:8.39-13 |
|
LOW |
CVE-2019-20838 |
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 |
libpcre16-3 |
2:8.39-13 |
|
LOW |
CVE-2017-11164 |
pcre: OP_KETRMAX feature in the match function in pcre_exec.c |
libpcre3 |
2:8.39-13 |
|
LOW |
CVE-2017-16231 |
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service |
libpcre3 |
2:8.39-13 |
|
LOW |
CVE-2017-7245 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre3 |
2:8.39-13 |
|
LOW |
CVE-2017-7246 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre3 |
2:8.39-13 |
|
LOW |
CVE-2019-20838 |
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 |
libpcre3 |
2:8.39-13 |
|
LOW |
CVE-2017-11164 |
pcre: OP_KETRMAX feature in the match function in pcre_exec.c |
libpcre3-dev |
2:8.39-13 |
|
LOW |
CVE-2017-16231 |
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service |
libpcre3-dev |
2:8.39-13 |
|
LOW |
CVE-2017-7245 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre3-dev |
2:8.39-13 |
|
LOW |
CVE-2017-7246 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre3-dev |
2:8.39-13 |
|
LOW |
CVE-2019-20838 |
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 |
libpcre3-dev |
2:8.39-13 |
|
LOW |
CVE-2017-11164 |
pcre: OP_KETRMAX feature in the match function in pcre_exec.c |
libpcre32-3 |
2:8.39-13 |
|
LOW |
CVE-2017-16231 |
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service |
libpcre32-3 |
2:8.39-13 |
|
LOW |
CVE-2017-7245 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre32-3 |
2:8.39-13 |
|
LOW |
CVE-2017-7246 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcre32-3 |
2:8.39-13 |
|
LOW |
CVE-2019-20838 |
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 |
libpcre32-3 |
2:8.39-13 |
|
LOW |
CVE-2017-11164 |
pcre: OP_KETRMAX feature in the match function in pcre_exec.c |
libpcrecpp0v5 |
2:8.39-13 |
|
LOW |
CVE-2017-16231 |
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service |
libpcrecpp0v5 |
2:8.39-13 |
|
LOW |
CVE-2017-7245 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcrecpp0v5 |
2:8.39-13 |
|
LOW |
CVE-2017-7246 |
pcre: stack-based buffer overflow write in pcre32_copy_substring |
libpcrecpp0v5 |
2:8.39-13 |
|
LOW |
CVE-2019-20838 |
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 |
libpcrecpp0v5 |
2:8.39-13 |
|
LOW |
CVE-2011-4116 |
perl: File::Temp insecure temporary file handling |
libperl5.32 |
5.32.1-4+deb11u2 |
|
LOW |
CVE-2019-6129 |
libpng: memory leak of png_info struct in pngcp.c |
libpng-dev |
1.6.37-3 |
|
LOW |
CVE-2021-4214 |
libpng: hardcoded value leads to heap-overflow |
libpng-dev |
1.6.37-3 |
|
LOW |
CVE-2019-6129 |
libpng: memory leak of png_info struct in pngcp.c |
libpng16-16 |
1.6.37-3 |
|
LOW |
CVE-2021-4214 |
libpng: hardcoded value leads to heap-overflow |
libpng16-16 |
1.6.37-3 |
|
LOW |
CVE-2020-27619 |
python: Unsafe use of eval() on data retrieved via HTTP in the test suite |
libpython3.9-minimal |
3.9.2-1 |
|
LOW |
CVE-2020-27619 |
python: Unsafe use of eval() on data retrieved via HTTP in the test suite |
libpython3.9-stdlib |
3.9.2-1 |
|
LOW |
CVE-2021-36084 |
libsepol: use-after-free in __cil_verify_classperms() |
libsepol1 |
3.1-1 |
|
LOW |
CVE-2021-36085 |
libsepol: use-after-free in __cil_verify_classperms() |
libsepol1 |
3.1-1 |
|
LOW |
CVE-2021-36086 |
libsepol: use-after-free in cil_reset_classpermission() |
libsepol1 |
3.1-1 |
|
LOW |
CVE-2021-36087 |
libsepol: heap-based buffer overflow in ebitmap_match_any() |
libsepol1 |
3.1-1 |
|
LOW |
CVE-2021-36084 |
libsepol: use-after-free in __cil_verify_classperms() |
libsepol1-dev |
3.1-1 |
|
LOW |
CVE-2021-36085 |
libsepol: use-after-free in __cil_verify_classperms() |
libsepol1-dev |
3.1-1 |
|
LOW |
CVE-2021-36086 |
libsepol: use-after-free in cil_reset_classpermission() |
libsepol1-dev |
3.1-1 |
|
LOW |
CVE-2021-36087 |
libsepol: heap-based buffer overflow in ebitmap_match_any() |
libsepol1-dev |
3.1-1 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
libsmartcols1 |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2021-36690 |
** DISPUTED ** A segmentation fault can occur in the sqlite3.exe comma ... |
libsqlite3-0 |
3.34.1-3 |
|
LOW |
CVE-2021-36690 |
** DISPUTED ** A segmentation fault can occur in the sqlite3.exe comma ... |
libsqlite3-dev |
3.34.1-3 |
|
LOW |
CVE-2007-6755 |
Dual_EC_DRBG: weak pseudo random number generator |
libssl-dev |
1.1.1n-0+deb11u1 |
|
LOW |
CVE-2010-0928 |
openssl: RSA authentication weakness |
libssl-dev |
1.1.1n-0+deb11u1 |
|
LOW |
CVE-2007-6755 |
Dual_EC_DRBG: weak pseudo random number generator |
libssl1.1 |
1.1.1n-0+deb11u1 |
|
LOW |
CVE-2010-0928 |
openssl: RSA authentication weakness |
libssl1.1 |
1.1.1n-0+deb11u1 |
|
LOW |
CVE-2013-4392 |
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts |
libsystemd0 |
247.3-7 |
|
LOW |
CVE-2020-13529 |
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client t |
libsystemd0 |
247.3-7 |
|
LOW |
CVE-2021-35331 |
** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehl ... |
libtcl8.6 |
8.6.11+dfsg-1 |
|
LOW |
CVE-2014-8130 |
libtiff: divide by zero in the tiffdither tool |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-16232 |
libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-17973 |
libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-5563 |
libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-9117 |
libtiff: Heap-based buffer over-read in bmp2tiff |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2018-10126 |
libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2022-1056 |
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ... |
libtiff-dev |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2014-8130 |
libtiff: divide by zero in the tiffdither tool |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-16232 |
libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-17973 |
libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-5563 |
libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-9117 |
libtiff: Heap-based buffer over-read in bmp2tiff |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2018-10126 |
libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2022-1056 |
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ... |
libtiff5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2014-8130 |
libtiff: divide by zero in the tiffdither tool |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-16232 |
libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-17973 |
libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-5563 |
libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2017-9117 |
libtiff: Heap-based buffer over-read in bmp2tiff |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2018-10126 |
libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2022-1056 |
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers ... |
libtiffxx5 |
4.2.0-1+deb11u1 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
libtinfo6 |
6.2+20201114-2 |
|
LOW |
CVE-2013-4392 |
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts |
libudev1 |
247.3-7 |
|
LOW |
CVE-2020-13529 |
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client t |
libudev1 |
247.3-7 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
libuuid1 |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2016-9085 |
libwebp: Several integer overflows |
libwebp-dev |
0.6.1-2.1 |
|
LOW |
CVE-2016-9085 |
libwebp: Several integer overflows |
libwebp6 |
0.6.1-2.1 |
|
LOW |
CVE-2016-9085 |
libwebp: Several integer overflows |
libwebpdemux2 |
0.6.1-2.1 |
|
LOW |
CVE-2016-9085 |
libwebp: Several integer overflows |
libwebpmux3 |
0.6.1-2.1 |
|
LOW |
CVE-2007-3476 |
libgd Denial of service by corrupted GIF images |
libwmf-dev |
0.2.8.4-17 |
|
LOW |
CVE-2007-3477 |
gd: arc drawing functions can consume large amount of CPU time |
libwmf-dev |
0.2.8.4-17 |
|
LOW |
CVE-2007-3996 |
php multiple integer overflows in gd |
libwmf-dev |
0.2.8.4-17 |
|
LOW |
CVE-2009-3546 |
gd: insufficient input validation in _gdGetColors() |
libwmf-dev |
0.2.8.4-17 |
|
LOW |
CVE-2007-3476 |
libgd Denial of service by corrupted GIF images |
libwmf0.2-7 |
0.2.8.4-17 |
|
LOW |
CVE-2007-3477 |
gd: arc drawing functions can consume large amount of CPU time |
libwmf0.2-7 |
0.2.8.4-17 |
|
LOW |
CVE-2007-3996 |
php multiple integer overflows in gd |
libwmf0.2-7 |
0.2.8.4-17 |
|
LOW |
CVE-2009-3546 |
gd: insufficient input validation in _gdGetColors() |
libwmf0.2-7 |
0.2.8.4-17 |
|
LOW |
CVE-2015-9019 |
libxslt: math.random() in xslt uses unseeded randomness |
libxslt1-dev |
1.1.34-4 |
|
LOW |
CVE-2015-9019 |
libxslt: math.random() in xslt uses unseeded randomness |
libxslt1.1 |
1.1.34-4 |
|
LOW |
CVE-2004-0230 |
TCP, when using a large Window Size, makes it easier for remote attack ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2005-3660 |
Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2007-3719 |
kernel: secretly Monopolizing the CPU Without Superuser Privileges |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2008-2544 |
kernel: mounting proc readonly on a different mount point silently mounts it rw if the /proc mount i |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2008-4609 |
kernel: TCP protocol vulnerabilities from Outpost24 |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2010-4563 |
kernel: ipv6: sniffer detection |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2010-5321 |
kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2011-4915 |
fs/proc/base.c in the Linux kernel through 3.1 allows local users to o ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2011-4917 |
In the Linux kernel through 3.1 there is an information disclosure iss ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2012-4542 |
kernel: block: default SCSI command filter does not accomodate commands overlap across device classe |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2014-9892 |
The snd_compr_tstamp function in sound/core/compress_offload.c in the ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2014-9900 |
kernel: Info leak in uninitialized structure ethtool_wolinfo in ethtool_get_wol() |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2015-2877 |
Kernel: Cross-VM ASL INtrospection (CAIN) |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2016-10723 |
** DISPUTED ** An issue was discovered in the Linux kernel through 4.1 ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2016-8660 |
kernel: xfs: local DoS due to a page lock order bug in the XFS seek hole/data implementation |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2017-0630 |
kernel: Information disclosure vulnerability in kernel trace subsystem |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2017-13693 |
kernel: ACPI operand cache leak in dsutils.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2017-13694 |
kernel: ACPI node and node_ext cache leak |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2018-1121 |
procps-ng, procps: process hiding through race condition enumerating /proc |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2018-12928 |
kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2018-17977 |
kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP pack |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-11191 |
kernel: race condition in load_aout_binary() allows local users to bypass ASLR on setuid a.out progr |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12378 |
kernel: unchecked kmalloc of new_ra in ip6_ra_control leads to denial of service |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12379 |
kernel: memory leak in con_insert_unipair in drivers/tty/vt/consolemap.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12380 |
kernel: memory allocation failure in the efi subsystem leads to denial of service |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12381 |
kernel: unchecked kmalloc of new_ra in ip_ra_control leads to denial of service |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12382 |
kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12455 |
kernel: null pointer dereference in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c causing de |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-12456 |
kernel: double fetch in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl. |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-16229 |
kernel: null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-16230 |
kernel: null pointer dereference in drivers/gpu/drm/radeon/radeon_display.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-16231 |
kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-16232 |
kernel: null-pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-16233 |
kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-16234 |
kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2019-19070 |
kernel: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c allows for a DoS |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2020-11725 |
kernel: improper handling of private_size*count multiplication due to count=info->owner typo |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2020-35501 |
kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH cap |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2021-26934 |
An issue was discovered in the Linux kernel 4.18 through 5.10.16, as u ... |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2021-32078 |
kernel: out-of-bounds read in arch/arm/mach-footbridge/personal-pci.c due to improper input validati |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2022-1734 |
kernel: Use-After-Free in NFC driver in nfcmrvl_nci_unregister_dev when simulating NFC device from u |
linux-libc-dev |
5.10.106-1 |
5.10.120-1 |
LOW |
CVE-2022-25265 |
kernel: Executable Space Protection Bypass |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2022-32296 |
kernel: insufficient TCP source port randomness leads to client identification |
linux-libc-dev |
5.10.106-1 |
|
LOW |
CVE-2007-5686 |
initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... |
login |
1:4.8.1-1 |
|
LOW |
CVE-2013-4235 |
shadow-utils: TOCTOU race conditions by copying and removing directory trees |
login |
1:4.8.1-1 |
|
LOW |
CVE-2019-19882 |
shadow-utils: local users can obtain root access because setuid programs are misconfigured |
login |
1:4.8.1-1 |
|
LOW |
CVE-2008-1687 |
m4: unquoted output of maketemp and mkstemp |
m4 |
1.4.18-5 |
|
LOW |
CVE-2008-1688 |
m4: code execution via -F argument |
m4 |
1.4.18-5 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
mount |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
ncurses-base |
6.2+20201114-2 |
|
LOW |
CVE-2021-39537 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c |
ncurses-bin |
6.2+20201114-2 |
|
LOW |
CVE-2007-2243 |
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ... |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2007-2768 |
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ... |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2008-3234 |
sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ... |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2016-20012 |
openssh: Public key information leak |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2018-15919 |
openssh: User enumeration via malformed packets in authentication requests |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2019-6110 |
openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2020-14145 |
openssh: Observable discrepancy leading to an information leak in the algorithm negotiation |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2020-15778 |
openssh: scp allows command injection when using backtick characters in the destination argument |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2021-36368 |
openssh: possible bypass of fido 2 devices and ssh-askpass |
openssh-client |
1:8.4p1-5 |
|
LOW |
CVE-2007-6755 |
Dual_EC_DRBG: weak pseudo random number generator |
openssl |
1.1.1n-0+deb11u1 |
|
LOW |
CVE-2010-0928 |
openssl: RSA authentication weakness |
openssl |
1.1.1n-0+deb11u1 |
|
LOW |
CVE-2007-5686 |
initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... |
passwd |
1:4.8.1-1 |
|
LOW |
CVE-2013-4235 |
shadow-utils: TOCTOU race conditions by copying and removing directory trees |
passwd |
1:4.8.1-1 |
|
LOW |
CVE-2019-19882 |
shadow-utils: local users can obtain root access because setuid programs are misconfigured |
passwd |
1:4.8.1-1 |
|
LOW |
CVE-2010-4651 |
patch: directory traversal flaw allows for arbitrary file creation |
patch |
2.7.6-7 |
|
LOW |
CVE-2018-6951 |
patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash |
patch |
2.7.6-7 |
|
LOW |
CVE-2018-6952 |
patch: Double free of memory in pch.c:another_hunk() causes a crash |
patch |
2.7.6-7 |
|
LOW |
CVE-2021-45261 |
patch: Invalid Pointer via another_hunk function |
patch |
2.7.6-7 |
|
LOW |
CVE-2011-4116 |
perl: File::Temp insecure temporary file handling |
perl |
5.32.1-4+deb11u2 |
|
LOW |
CVE-2011-4116 |
perl: File::Temp insecure temporary file handling |
perl-base |
5.32.1-4+deb11u2 |
|
LOW |
CVE-2011-4116 |
perl: File::Temp insecure temporary file handling |
perl-modules-5.32 |
5.32.1-4+deb11u2 |
|
LOW |
CVE-2020-27619 |
python: Unsafe use of eval() on data retrieved via HTTP in the test suite |
python3.9 |
3.9.2-1 |
|
LOW |
CVE-2020-27619 |
python: Unsafe use of eval() on data retrieved via HTTP in the test suite |
python3.9-minimal |
3.9.2-1 |
|
LOW |
CVE-2005-2541 |
tar: does not properly warn the user when extracting setuid or setgid files |
tar |
1.34+dfsg-1 |
|
LOW |
CVE-2021-35331 |
** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehl ... |
tcl8.6 |
8.6.11+dfsg-1 |
|
LOW |
CVE-2021-35331 |
** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehl ... |
tcl8.6-dev |
8.6.11+dfsg-1 |
|
LOW |
CVE-2021-4217 |
unzip: Null pointer dereference in Unicode strings code |
unzip |
6.0-26 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
util-linux |
2.36.1-8+deb11u1 |
|
LOW |
CVE-2022-0563 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline |
uuid-dev |
2.36.1-8+deb11u1 |
|
UNKNOWN |
CVE-2022-20153 |
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-afte ... |
linux-libc-dev |
5.10.106-1 |
5.10.113-1 |