Debian

Debian Linux

9952 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.63%
  • Veröffentlicht 10.01.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:20

An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5....

  • EPSS 0.16%
  • Veröffentlicht 09.01.2020 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:38:19

LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.

Exploit
  • EPSS 23.24%
  • Veröffentlicht 09.01.2020 22:15:13
  • Zuletzt bearbeitet 16.04.2025 15:15:46

In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account t...

  • EPSS 3.47%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:32

When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability af...

  • EPSS 2.63%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Fire...

  • EPSS 4.63%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direc...

  • EPSS 0.9%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored....

Exploit
  • EPSS 3.28%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:34

Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. T...

  • EPSS 0.81%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:42

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerabilit...

Exploit
  • EPSS 0.88%
  • Veröffentlicht 08.01.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:38:19

nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).