Debian

Debian Linux

9928 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.65%
  • Veröffentlicht 30.04.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:37

In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versi...

  • EPSS 1.04%
  • Veröffentlicht 30.04.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:37

In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in v...

  • EPSS 1.43%
  • Veröffentlicht 30.04.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:36

In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along wi...

  • EPSS 0.2%
  • Veröffentlicht 30.04.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:18

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker ...

Warnung Exploit
  • EPSS 94.42%
  • Veröffentlicht 30.04.2020 17:15:12
  • Zuletzt bearbeitet 07.11.2025 19:32:41

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods...

Warnung Exploit
  • EPSS 94.27%
  • Veröffentlicht 30.04.2020 17:15:12
  • Zuletzt bearbeitet 07.11.2025 19:32:37

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated u...

Exploit
  • EPSS 18.63%
  • Veröffentlicht 29.04.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:36

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This prob...

Warnung Exploit
  • EPSS 32.3%
  • Veröffentlicht 29.04.2020 21:15:11
  • Zuletzt bearbeitet 07.11.2025 19:32:52

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may ex...

  • EPSS 0.06%
  • Veröffentlicht 29.04.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:58:49

In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade...

  • EPSS 6.54%
  • Veröffentlicht 28.04.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:47

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavi...