Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.04%
  • Veröffentlicht 21.03.2019 16:00:12
  • Zuletzt bearbeitet 21.11.2024 03:44:25

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in ...

  • EPSS 4.81%
  • Veröffentlicht 21.03.2019 16:00:12
  • Zuletzt bearbeitet 21.11.2024 03:44:26

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provid...

Exploit
  • EPSS 0.57%
  • Veröffentlicht 15.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:00

rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).

Exploit
  • EPSS 5.02%
  • Veröffentlicht 15.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:01

rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.

Exploit
  • EPSS 0.57%
  • Veröffentlicht 15.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:01

rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).

Exploit
  • EPSS 9.9%
  • Veröffentlicht 15.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:01

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.

Exploit
  • EPSS 9.9%
  • Veröffentlicht 15.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:02

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.

Exploit
  • EPSS 9.9%
  • Veröffentlicht 15.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:02

rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.

  • EPSS 3.15%
  • Veröffentlicht 13.03.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:14

gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON i...

Exploit
  • EPSS 3.34%
  • Veröffentlicht 13.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:12

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.