Debian

Debian Linux

9177 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.22%
  • Veröffentlicht 13.01.2020 06:15:10
  • Zuletzt bearbeitet 21.11.2024 05:36:17

OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.

Exploit
  • EPSS 2.9%
  • Veröffentlicht 10.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:35:36

Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 7.42%
  • Veröffentlicht 10.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:25:41

Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.78%
  • Veröffentlicht 10.01.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:20

Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Comm...

  • EPSS 0.8%
  • Veröffentlicht 10.01.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:20

Agent A is able to save a draft (i.e. for customer reply). Then Agent B can open the draft, change the text completely and send it in the name of Agent A. For the customer it will not be visible that the message was sent by another agent. This issue ...

  • EPSS 0.87%
  • Veröffentlicht 10.01.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:20

An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5....

  • EPSS 0.16%
  • Veröffentlicht 09.01.2020 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:38:19

LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.

Exploit
  • EPSS 20.75%
  • Veröffentlicht 09.01.2020 22:15:13
  • Zuletzt bearbeitet 16.04.2025 15:15:46

In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account t...

  • EPSS 3.47%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:32

When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability af...

  • EPSS 2.63%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Fire...