Debian

Debian Linux

9144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.21%
  • Published 02.11.2020 21:15:30
  • Last modified 21.11.2024 05:22:15

wp-includes/class-wp-xmlrpc-server.php in WordPress before 5.5.2 allows attackers to gain privileges by using XML-RPC to comment on a post.

  • EPSS 12.8%
  • Published 02.11.2020 21:15:30
  • Last modified 21.11.2024 05:22:15

is_blog_installed in wp-includes/functions.php in WordPress before 5.5.2 improperly determines whether WordPress is already installed, which might allow an attacker to perform a new installation, leading to remote code execution (as well as a denial ...

  • EPSS 0.27%
  • Published 29.10.2020 20:15:17
  • Last modified 21.11.2024 05:03:00

A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.

Exploit
  • EPSS 0.45%
  • Published 27.10.2020 19:15:12
  • Last modified 21.11.2024 05:05:09

Blueman is a GTK+ Bluetooth Manager. In Blueman before 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is dis...

Exploit
  • EPSS 0.16%
  • Published 23.10.2020 13:15:16
  • Last modified 21.11.2024 05:20:52

In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can obser...

  • EPSS 0.06%
  • Published 22.10.2020 21:15:14
  • Last modified 21.11.2024 05:21:38

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.

  • EPSS 0.07%
  • Published 22.10.2020 21:15:14
  • Last modified 21.11.2024 05:21:38

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.

  • EPSS 0.1%
  • Published 22.10.2020 21:15:14
  • Last modified 21.11.2024 05:21:38

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL point...

  • EPSS 1.57%
  • Published 22.10.2020 21:15:13
  • Last modified 21.11.2024 05:06:00

Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...

  • EPSS 0.04%
  • Published 22.10.2020 21:15:13
  • Last modified 21.11.2024 05:21:37

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.