Debian

Debian Linux

9928 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.18%
  • Veröffentlicht 27.02.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 05:40:37

In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.

Exploit
  • EPSS 3.61%
  • Veröffentlicht 27.02.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 05:40:37

In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.

Exploit
  • EPSS 1.16%
  • Veröffentlicht 27.02.2020 21:15:19
  • Zuletzt bearbeitet 21.11.2024 05:36:35

In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upl...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 27.02.2020 21:15:19
  • Zuletzt bearbeitet 21.11.2024 05:36:35

In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on th...

  • EPSS 15.32%
  • Veröffentlicht 26.02.2020 16:15:19
  • Zuletzt bearbeitet 21.11.2024 05:40:19

An issue was discovered in Pure-FTPd 1.0.49. An uninitialized pointer vulnerability has been detected in the diraliases linked list. When the *lookup_alias(const char alias) or print_aliases(void) function is called, they fail to correctly detect the...

Exploit
  • EPSS 88.14%
  • Veröffentlicht 25.02.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:27

OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the se...

  • EPSS 0.1%
  • Veröffentlicht 25.02.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:40:31

An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.

Warnung Exploit
  • EPSS 94.47%
  • Veröffentlicht 24.02.2020 22:15:12
  • Zuletzt bearbeitet 27.10.2025 17:37:12

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available t...

  • EPSS 6.06%
  • Veröffentlicht 24.02.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:33

The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of H...

  • EPSS 1.01%
  • Veröffentlicht 24.02.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:38

In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smug...