Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.48%
  • Published 27.02.2021 05:15:14
  • Last modified 21.11.2024 06:20:58

In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

  • EPSS 12.14%
  • Published 27.02.2021 05:15:14
  • Last modified 21.11.2024 06:20:59

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/uti...

  • EPSS 14.33%
  • Published 27.02.2021 05:15:14
  • Last modified 21.11.2024 06:21:07

An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.

Exploit
  • EPSS 1.41%
  • Published 27.02.2021 05:15:13
  • Last modified 21.11.2024 05:22:30

An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-b...

  • EPSS 0.8%
  • Published 27.02.2021 05:15:13
  • Last modified 21.11.2024 05:23:24

In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.

  • EPSS 0.75%
  • Published 27.02.2021 05:15:13
  • Last modified 21.11.2024 05:27:47

In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.

Exploit
  • EPSS 93.9%
  • Published 27.02.2021 05:15:13
  • Last modified 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

Exploit
  • EPSS 90.95%
  • Published 27.02.2021 05:15:13
  • Last modified 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.

  • EPSS 10.04%
  • Published 27.02.2021 05:15:13
  • Last modified 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.

Exploit
  • EPSS 0.03%
  • Published 26.02.2021 23:15:11
  • Last modified 09.06.2025 16:15:31

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an i...