Debian

Debian Linux

9144 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.17%
  • Veröffentlicht 30.08.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 05:27:45

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() store_sm_boundary_item() Sloop_of OOB read. A specially crafted malformed file can lead to...

  • EPSS 0.14%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:09

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left u...

  • EPSS 0.14%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:09

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left u...

  • EPSS 0.09%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:09

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left u...

  • EPSS 0.06%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:09

grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 statu...

  • EPSS 0.06%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:10

long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen woul...

  • EPSS 0.07%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:10

inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the add...

  • EPSS 2.13%
  • Veröffentlicht 27.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:00:10

xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond wh...

Exploit
  • EPSS 1.29%
  • Veröffentlicht 27.08.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 05:13:39

Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) data_input.php, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 27.08.2021 17:15:06
  • Zuletzt bearbeitet 21.11.2024 05:51:45

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns...