Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.21%
  • Published 19.01.2021 15:15:12
  • Last modified 21.11.2024 06:21:04

rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email me...

  • EPSS 0.39%
  • Published 19.01.2021 07:15:13
  • Last modified 21.11.2024 06:21:04

fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirecto...

Exploit
  • EPSS 0.03%
  • Published 19.01.2021 06:15:12
  • Last modified 21.11.2024 06:21:03

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to ...

Warning
  • EPSS 83.04%
  • Published 18.01.2021 20:15:12
  • Last modified 22.10.2025 00:17:06

Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.

Exploit
  • EPSS 0.24%
  • Published 18.01.2021 12:15:12
  • Last modified 21.11.2024 05:22:51

The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation o...

  • EPSS 0.23%
  • Published 14.01.2021 20:15:12
  • Last modified 21.11.2024 05:47:53

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox es...

  • EPSS 0.32%
  • Published 14.01.2021 15:15:13
  • Last modified 21.11.2024 05:52:03

The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.

  • EPSS 52.59%
  • Published 14.01.2021 15:15:13
  • Last modified 21.11.2024 05:52:23

When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. ...

  • EPSS 0.05%
  • Published 14.01.2021 01:15:13
  • Last modified 21.11.2024 05:06:47

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-...

  • EPSS 0.22%
  • Published 13.01.2021 04:15:12
  • Last modified 21.11.2024 05:22:41

In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c938...