CVE-2023-45853: zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
CRITICAL
Package:
zlib1g
Installed Version:
1:1.2.13.dfsg-1
Fixed Version:
CVSS Score:
9.80
CVE-2025-6020: linux-pam: Linux-pam directory Traversal
High
Package:
libpam-modules
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
7.80
CVE-2025-6020: linux-pam: Linux-pam directory Traversal
High
Package:
libpam0g
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
7.80
CVE-2025-6297: It was discovered that dpkg-deb does not properly sanitize directory p ...
High
Package:
dpkg
Installed Version:
1.21.22
Fixed Version:
CVSS Score:
8.20
CVE-2025-6020: linux-pam: Linux-pam directory Traversal
High
Package:
libpam-runtime
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
7.80
CVE-2025-6020: linux-pam: Linux-pam directory Traversal
High
Package:
libpam-modules-bin
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
7.80
CVE-2024-10041: pam: libpam: Libpam vulnerable to read hashed password
Medium
Package:
libpam-modules
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
4.70
CVE-2024-10041: pam: libpam: Libpam vulnerable to read hashed password
Medium
Package:
libpam0g
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
4.70
CVE-2025-30258: gnupg: verification DoS due to a malicious subkey in the keyring
Medium
Package:
gpgv
Installed Version:
2.2.40-1.1+deb12u1
Fixed Version:
CVSS Score:
4.70
CVE-2024-10041: pam: libpam: Libpam vulnerable to read hashed password
Medium
Package:
libpam-modules-bin
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
4.70
CVE-2024-22365: pam: allowing unprivileged user to block another user namespace
Medium
Package:
libpam-modules-bin
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
5.50
CVE-2023-50495: ncurses: segmentation fault via _nc_wrap_entry()
Medium
Package:
ncurses-base
Installed Version:
6.4-4
Fixed Version:
CVSS Score:
6.50
CVE-2024-22365: pam: allowing unprivileged user to block another user namespace
Medium
Package:
libpam-modules
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
5.50
CVE-2023-50495: ncurses: segmentation fault via _nc_wrap_entry()
Medium
Package:
ncurses-bin
Installed Version:
6.4-4
Fixed Version:
CVSS Score:
6.50
CVE-2024-22365: pam: allowing unprivileged user to block another user namespace
Medium
Package:
libpam0g
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
5.50
CVE-2023-50495: ncurses: segmentation fault via _nc_wrap_entry()
Medium
Package:
libtinfo6
Installed Version:
6.4-4
Fixed Version:
CVSS Score:
6.50
CVE-2024-10041: pam: libpam: Libpam vulnerable to read hashed password
Medium
Package:
libpam-runtime
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
4.70
CVE-2024-22365: pam: allowing unprivileged user to block another user namespace
Medium
Package:
libpam-runtime
Installed Version:
1.5.2-6+deb12u1
Fixed Version:
CVSS Score:
5.50
TEMP-0841856-B18BAF: [Privilege escalation possible to other user than root]
LOW
Package:
bash
Installed Version:
5.2.15-2+b9
Fixed Version:
CVSS Score:
Unknown
CVE-2025-6141: gnu-ncurses: ncurses Stack Buffer Overflow
Low
Package:
ncurses-bin
Installed Version:
6.4-4
Fixed Version:
CVSS Score:
3.30
TEMP-0290435-0B57B5: [tar's rmt command may have undesired side effects]
LOW
Package:
tar
Installed Version:
1.34+dfsg-1.2+deb12u1
Fixed Version:
CVSS Score:
Unknown
TEMP-0628843-DBAD28: [more related to CVE-2005-4890]
LOW
Package:
login
Installed Version:
1:4.13+dfsg1-1+deb12u1
Fixed Version:
CVSS Score:
Unknown
CVE-2025-6141: gnu-ncurses: ncurses Stack Buffer Overflow
Low
Package:
ncurses-base
Installed Version:
6.4-4
Fixed Version:
CVSS Score:
3.30
TEMP-0517018-A83CE6: [sysvinit: no-root option in expert installer exposes locally exploitable security flaw]
LOW
Package:
sysvinit-utils
Installed Version:
3.06-4
Fixed Version:
CVSS Score:
Unknown
CVE-2024-56433: shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
Low
Package:
passwd
Installed Version:
1:4.13+dfsg1-1+deb12u1
Fixed Version:
CVSS Score:
3.60
CVE-2024-56433: shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
Low
Package:
login
Installed Version:
1:4.13+dfsg1-1+deb12u1
Fixed Version:
CVSS Score:
3.60
CVE-2025-6141: gnu-ncurses: ncurses Stack Buffer Overflow
Low
Package:
libtinfo6
Installed Version:
6.4-4
Fixed Version:
CVSS Score:
3.30
CVE-2016-2781: coreutils: Non-privileged session can escape to the parent session in chroot
Low
Package:
coreutils
Installed Version:
9.1-1
Fixed Version:
CVSS Score:
Unknown
TEMP-0628843-DBAD28: [more related to CVE-2005-4890]
LOW
Package:
passwd
Installed Version:
1:4.13+dfsg1-1+deb12u1
Fixed Version:
CVSS Score:
Unknown