Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Veröffentlicht 03.09.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.

  • EPSS 0.4%
  • Veröffentlicht 01.09.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator t...

  • EPSS 0.73%
  • Veröffentlicht 01.09.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigur...

  • EPSS 0.28%
  • Veröffentlicht 01.09.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The InfoCard module 1.0 for SimpleSAMLphp allows attackers to spoof XML messages by leveraging an incorrect check of return values in signature validation utilities.

  • EPSS 1.06%
  • Veröffentlicht 01.09.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.

  • EPSS 0.42%
  • Veröffentlicht 01.09.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The multiauth module in SimpleSAMLphp 1.14.13 and earlier allows remote attackers to bypass authentication context restrictions and use an authentication source defined in config/authsources.php via vectors related to improper validation of user inpu...

  • EPSS 0.67%
  • Veröffentlicht 01.09.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.

  • EPSS 2.96%
  • Veröffentlicht 01.09.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 31.08.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cross-site scripting (XSS) vulnerability in the Security component of Kohana before 3.3.6 allows remote attackers to inject arbitrary web script or HTML by bypassing the strip_image_tags protection mechanism in system/classes/Kohana/Security.php.

Exploit
  • EPSS 7.36%
  • Veröffentlicht 31.08.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.