Debian

Debian Linux

9144 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 23.04.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:19

A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 22.04.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:47

A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.

  • EPSS 5.73%
  • Veröffentlicht 22.04.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:12

CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.

  • EPSS 1.52%
  • Veröffentlicht 21.04.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:56:34

Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open fo...

Exploit
  • EPSS 66.69%
  • Veröffentlicht 21.04.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:45

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occur...

  • EPSS 0.9%
  • Veröffentlicht 17.04.2020 04:15:10
  • Zuletzt bearbeitet 05.05.2025 17:15:57

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a vali...

  • EPSS 7.54%
  • Veröffentlicht 15.04.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expr...

  • EPSS 4.82%
  • Veröffentlicht 15.04.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The abs...

  • EPSS 0.57%
  • Veröffentlicht 15.04.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addSt...

  • EPSS 0.55%
  • Veröffentlicht 15.04.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:23:02

An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server infor...