Vulnerabilities > Debian > Debian Linux > 12.0

DATE CVE VULNERABILITY TITLE RISK
2025-02-28 CVE-2025-26466 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
A flaw was found in the OpenSSH package.
network
high complexity
openbsd canonical debian CWE-770
5.9
2025-02-18 CVE-2025-26465 A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled.
network
high complexity
openbsd debian redhat netapp
6.8
2024-11-10 CVE-2024-46952 Classic Buffer Overflow vulnerability in multiple products
An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0.
local
low complexity
artifex debian CWE-120
7.8
2024-11-10 CVE-2024-46953 Integer Overflow or Wraparound vulnerability in multiple products
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0.
local
low complexity
artifex debian suse CWE-190
7.8
2024-11-10 CVE-2024-46955 Out-of-bounds Read vulnerability in multiple products
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0.
local
low complexity
artifex debian suse CWE-125
5.5
2024-11-10 CVE-2024-46956 Out-of-bounds Read vulnerability in multiple products
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0.
local
low complexity
artifex debian suse CWE-125
7.8
2024-11-10 CVE-2024-46951 Access of Uninitialized Pointer vulnerability in multiple products
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0.
local
low complexity
artifex debian suse CWE-824
7.8
2024-07-01 CVE-2024-6387 Race Condition vulnerability in multiple products
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd).
8.1
2024-06-28 CVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
network
low complexity
mit debian
critical
9.1
2024-02-11 CVE-2024-25714 Information Exposure Through Discrepancy vulnerability in multiple products
In Rhonabwy through 1.1.13, HMAC signature verification uses a strcmp function that is vulnerable to side-channel attacks, because it stops the comparison when the first difference is spotted in the two signatures.
network
low complexity
rhonabwy-project debian CWE-203
critical
9.8