Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 13.04.2016 15:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption)...

  • EPSS 0.07%
  • Veröffentlicht 13.04.2016 15:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) ...

Exploit
  • EPSS 2.24%
  • Veröffentlicht 13.04.2016 15:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and appl...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 13.04.2016 15:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.

  • EPSS 0.13%
  • Veröffentlicht 13.04.2016 14:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

schema.py in Roundup before 1.5.1 does not properly limit attributes included in default user permissions, which might allow remote authenticated users to obtain sensitive user information by viewing user details.

  • EPSS 78.52%
  • Veröffentlicht 12.04.2016 23:59:37
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersona...

  • EPSS 8.22%
  • Veröffentlicht 12.04.2016 15:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation.

  • EPSS 0.5%
  • Veröffentlicht 12.04.2016 15:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The "have you forgotten your password" links in the User module in Drupal 7.x before 7.43 and 8.x before 8.0.4 allow remote attackers to obtain sensitive username information by leveraging a configuration that permits using an email address to login ...

  • EPSS 1.02%
  • Veröffentlicht 12.04.2016 15:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The User module in Drupal 6.x before 6.38 and 7.x before 7.43 allows remote attackers to gain privileges by leveraging contributed or custom code that calls the user_save function with an explicit category and loads all roles into the array.

  • EPSS 0.54%
  • Veröffentlicht 12.04.2016 15:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The System module in Drupal 6.x before 6.38 and 7.x before 7.43 might allow remote attackers to hijack the authentication of site administrators for requests that download and run files with arbitrary JSON-encoded content, aka a "reflected file downl...