Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 10.11.2020 19:15:11
  • Last modified 21.11.2024 05:22:40

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically i...

  • EPSS 12.81%
  • Published 10.11.2020 17:15:12
  • Last modified 21.11.2024 05:17:12

The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.

Exploit
  • EPSS 3.83%
  • Published 06.11.2020 18:15:11
  • Last modified 21.11.2024 03:21:16

raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).

Warning Exploit
  • EPSS 94.39%
  • Published 06.11.2020 08:15:13
  • Last modified 22.10.2025 00:16:59

An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.

  • EPSS 0.06%
  • Published 06.11.2020 08:15:13
  • Last modified 21.11.2024 05:08:13

The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.

  • EPSS 71.27%
  • Published 06.11.2020 08:15:13
  • Last modified 21.11.2024 05:18:10

In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.

  • EPSS 0.35%
  • Published 06.11.2020 08:15:13
  • Last modified 21.11.2024 05:21:29

eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.

  • EPSS 0.59%
  • Published 06.11.2020 06:15:11
  • Last modified 21.11.2024 05:22:30

An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in...

Exploit
  • EPSS 0.21%
  • Published 06.11.2020 05:15:10
  • Last modified 21.11.2024 05:22:30

libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.

  • EPSS 1.11%
  • Published 05.11.2020 21:15:12
  • Last modified 21.11.2024 05:08:15

Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.