Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 15.02.2021 04:15:12
  • Zuletzt bearbeitet 21.11.2024 05:48:51

In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer a...

Exploit
  • EPSS 1.44%
  • Veröffentlicht 14.02.2021 04:15:12
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled...

Exploit
  • EPSS 22.24%
  • Veröffentlicht 14.02.2021 03:15:12
  • Zuletzt bearbeitet 21.11.2024 05:57:36

In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to s...

Warnung Exploit
  • EPSS 93.87%
  • Veröffentlicht 11.02.2021 21:15:13
  • Zuletzt bearbeitet 24.10.2025 14:48:35

Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected....

  • EPSS 5.77%
  • Veröffentlicht 11.02.2021 18:15:15
  • Zuletzt bearbeitet 23.04.2025 20:15:20

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a ...

  • EPSS 13.11%
  • Veröffentlicht 10.02.2021 17:15:19
  • Zuletzt bearbeitet 21.11.2024 05:42:31

In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed...

  • EPSS 1.73%
  • Veröffentlicht 10.02.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:23

xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.

  • EPSS 3.43%
  • Veröffentlicht 10.02.2021 07:15:12
  • Zuletzt bearbeitet 21.11.2024 05:29:08

The daemon in GENIVI diagnostic log and trace (DLT), is vulnerable to a heap-based buffer overflow that could allow an attacker to remotely execute arbitrary code on the DLT-Daemon (versions prior to 2.18.6).

Exploit
  • EPSS 12.65%
  • Veröffentlicht 09.02.2021 20:15:14
  • Zuletzt bearbeitet 09.05.2025 20:15:36

encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.

Warnung
  • EPSS 24.87%
  • Veröffentlicht 09.02.2021 16:15:12
  • Zuletzt bearbeitet 24.10.2025 21:02:10

Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.