Debian

Debian Linux

9922 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 23.71%
  • Veröffentlicht 22.07.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:53

Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.

  • EPSS 1.73%
  • Veröffentlicht 22.07.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:53

Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 2.41%
  • Veröffentlicht 22.07.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:53

Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

  • EPSS 2.28%
  • Veröffentlicht 22.07.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:53

Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

  • EPSS 3.21%
  • Veröffentlicht 22.07.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:53

Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Exploit
  • EPSS 0.96%
  • Veröffentlicht 21.07.2020 22:15:12
  • Zuletzt bearbeitet 03.11.2025 19:15:39

LuaJit through 2.1.0-beta3 has an out-of-bounds read because __gc handler frame traversal is mishandled.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 21.07.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:19

QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 21.07.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:20

mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.

  • EPSS 2.98%
  • Veröffentlicht 20.07.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:31:09

A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to...

  • EPSS 9.35%
  • Veröffentlicht 17.07.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:19

The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins w...