Vulnerabilities > Debian > Debian Linux > Medium

DATE CVE VULNERABILITY TITLE RISK
2023-07-20 CVE-2023-34968 Information Exposure Through Sent Data vulnerability in multiple products
A path disclosure vulnerability was found in Samba.
network
low complexity
samba fedoraproject redhat debian CWE-201
5.3
2023-07-13 CVE-2023-21400 Improper Locking vulnerability in multiple products
In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking.
local
low complexity
google debian CWE-667
6.7
2023-07-12 CVE-2023-3618 Classic Buffer Overflow vulnerability in multiple products
A flaw was found in libtiff.
network
low complexity
libtiff debian redhat CWE-120
6.5
2023-07-06 CVE-2023-36823 Sanitize is an allowlist-based HTML and CSS sanitizer.
network
low complexity
sanitize-project debian
6.1
2023-07-05 CVE-2023-35936 Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library.
local
high complexity
pandoc debian
5.0
2023-07-05 CVE-2023-37207 Unsafe Reflection vulnerability in multiple products
A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL.
network
low complexity
mozilla debian CWE-470
6.5
2023-06-30 CVE-2023-3338 NULL Pointer Dereference vulnerability in multiple products
A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol.
network
low complexity
linux netapp debian CWE-476
6.5
2023-06-23 CVE-2023-3212 NULL Pointer Dereference vulnerability in multiple products
A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel.
4.4
2023-06-08 CVE-2023-34969 D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon.
network
low complexity
freedesktop fedoraproject debian
6.5
2023-06-07 CVE-2023-0666 Out-of-bounds Write vulnerability in multiple products
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
network
low complexity
wireshark debian CWE-787
6.5