Debian

Debian Linux

9928 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.2%
  • Veröffentlicht 02.04.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 04:27:32

In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote una...

  • EPSS 74.79%
  • Veröffentlicht 02.04.2020 15:15:17
  • Zuletzt bearbeitet 21.11.2024 04:56:47

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

  • EPSS 11.3%
  • Veröffentlicht 02.04.2020 00:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:37

In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.

  • EPSS 4.85%
  • Veröffentlicht 01.04.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:35:05

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in ...

  • EPSS 41.87%
  • Veröffentlicht 01.04.2020 20:15:15
  • Zuletzt bearbeitet 21.11.2024 05:11:38

In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.

Exploit
  • EPSS 1.53%
  • Veröffentlicht 01.04.2020 04:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:36

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make in...

Exploit
  • EPSS 2.33%
  • Veröffentlicht 01.04.2020 04:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:36

In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead ...

Exploit
  • EPSS 5.02%
  • Veröffentlicht 01.04.2020 04:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:36

In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and pote...

  • EPSS 0.19%
  • Veröffentlicht 31.03.2020 18:15:26
  • Zuletzt bearbeitet 21.11.2024 05:33:50

Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can i...

  • EPSS 0.1%
  • Veröffentlicht 31.03.2020 17:15:26
  • Zuletzt bearbeitet 21.11.2024 05:11:13

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially...