Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.45%
  • Veröffentlicht 09.09.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:17:41

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

Exploit
  • EPSS 1.11%
  • Veröffentlicht 09.09.2020 19:15:21
  • Zuletzt bearbeitet 21.11.2024 05:14:42

WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to XXE injection.

Exploit
  • EPSS 44.26%
  • Veröffentlicht 09.09.2020 19:15:21
  • Zuletzt bearbeitet 21.11.2024 05:16:12

CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.

Exploit
  • EPSS 0.8%
  • Veröffentlicht 09.09.2020 18:15:23
  • Zuletzt bearbeitet 21.11.2024 05:36:36

In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 09.09.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:17:39

In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_connt...

  • EPSS 0.08%
  • Veröffentlicht 09.09.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:17:39

A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b...

  • EPSS 1.04%
  • Veröffentlicht 09.09.2020 14:15:12
  • Zuletzt bearbeitet 16.04.2026 15:16:41

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the atta...

  • EPSS 0.3%
  • Veröffentlicht 08.09.2020 10:15:16
  • Zuletzt bearbeitet 21.11.2024 05:31:36

u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon A...

Exploit
  • EPSS 0.62%
  • Veröffentlicht 04.09.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:39:40

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occ...

Exploit
  • EPSS 0.7%
  • Veröffentlicht 04.09.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:16:15

GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.