Debian

Debian Linux

9145 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.26%
  • Veröffentlicht 19.02.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:35:00

An exploitable heap out-of-bounds read vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS reque...

Exploit
  • EPSS 6.72%
  • Veröffentlicht 19.02.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:35:00

An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of service. An attacker needs to send an HTTP request to trigge...

Exploit
  • EPSS 16.5%
  • Veröffentlicht 17.02.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 02:22:40

Multiple incomplete blacklist vulnerabilities in the avatar upload functionality in manageuser.php in Collabtive before 2.1 allow remote authenticated users to execute arbitrary code by uploading a file with a (1) .php3, (2) .php4, (3) .php5, or (4) ...

Exploit
  • EPSS 84.86%
  • Veröffentlicht 17.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:59

Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 13.02.2020 17:15:29
  • Zuletzt bearbeitet 21.11.2024 04:19:55

dojox is vulnerable to Cross-site Scripting in all versions before version 1.16.1, 1.15.2, 1.14.5, 1.13.6, 1.12.7 and 1.11.9. This is due to dojox.xmpp.util.xmlEncode only encoding the first occurrence of each character, not all of them.

  • EPSS 14.21%
  • Veröffentlicht 12.02.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:44

irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel m...

  • EPSS 0.24%
  • Veröffentlicht 12.02.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:40

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able t...

  • EPSS 22.59%
  • Veröffentlicht 12.02.2020 02:15:10
  • Zuletzt bearbeitet 21.11.2024 02:14:03

Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argu...

  • EPSS 0.76%
  • Veröffentlicht 11.02.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:13

An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_s...

Exploit
  • EPSS 2.9%
  • Veröffentlicht 11.02.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:35:41

Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.