Debian

Debian Linux

9213 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 17.06.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:49:41

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.

  • EPSS 0.25%
  • Veröffentlicht 17.06.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:49:41

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.

  • EPSS 0.51%
  • Veröffentlicht 17.06.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:49:41

An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadabl...

  • EPSS 0.25%
  • Veröffentlicht 17.06.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:49:41

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)

  • EPSS 0.68%
  • Veröffentlicht 17.06.2019 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:22:28

An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent use...

  • EPSS 0.68%
  • Veröffentlicht 17.06.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:22:58

An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. In the customer or external frontend, personal information of agents (e.g., Name and...

  • EPSS 3.84%
  • Veröffentlicht 14.06.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:28

A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.

  • EPSS 8.73%
  • Veröffentlicht 11.06.2019 22:29:03
  • Zuletzt bearbeitet 21.11.2024 04:16:27

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request ...

  • EPSS 17.36%
  • Veröffentlicht 11.06.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:31

A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions...

  • EPSS 0.11%
  • Veröffentlicht 07.06.2019 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:40:13

In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for ...