Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.27%
  • Veröffentlicht 04.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:24

Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result...

  • EPSS 0.8%
  • Veröffentlicht 04.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:24

Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the d...

  • EPSS 0.59%
  • Veröffentlicht 04.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:24

Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnera...

  • EPSS 0.29%
  • Veröffentlicht 04.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:30

Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions o...

  • EPSS 3.09%
  • Veröffentlicht 04.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:30

Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk he...

  • EPSS 1.25%
  • Veröffentlicht 04.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:31

Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code exec...

  • EPSS 0.09%
  • Veröffentlicht 04.10.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:25:28

containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise u...

  • EPSS 2.42%
  • Veröffentlicht 04.10.2021 14:15:07
  • Zuletzt bearbeitet 03.11.2025 20:15:48

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a spec...

  • EPSS 0.03%
  • Veröffentlicht 02.10.2021 00:15:07
  • Zuletzt bearbeitet 21.11.2024 06:26:55

prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 29.09.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:50:59

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This ...