Vulnerabilities (CVE)

Filtered by vendor Debian Subscribe
Filtered by product Debian Linux
Total 8822 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-13943 3 Apache, Debian, Oracle 4 Tomcat, Debian Linux, Instantis Enterprisetrack and 1 more 2023-01-31 4.0 MEDIUM 4.3 MEDIUM
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
CVE-2020-25739 3 Canonical, Debian, Gon Project 3 Ubuntu Linux, Debian Linux, Gon 2023-01-31 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
CVE-2019-17361 4 Canonical, Debian, Opensuse and 1 more 4 Ubuntu Linux, Debian Linux, Leap and 1 more 2023-01-31 6.8 MEDIUM 9.8 CRITICAL
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
CVE-2019-20387 2 Debian, Opensuse 2 Debian Linux, Libsolv 2023-01-31 5.0 MEDIUM 7.5 HIGH
repodata_schema2id in repodata.c in libsolv before 0.7.6 has a heap-based buffer over-read via a last schema whose length is less than the length of the input schema.
CVE-2018-1084 4 Canonical, Corosync, Debian and 1 more 4 Ubuntu Linux, Corosync, Debian Linux and 1 more 2023-01-31 7.5 HIGH 7.5 HIGH
corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
CVE-2019-16217 2 Debian, Wordpress 2 Debian Linux, Wordpress 2023-01-31 4.3 MEDIUM 6.1 MEDIUM
WordPress before 5.2.3 allows XSS in media uploads because wp_ajax_upload_attachment is mishandled.
CVE-2019-16218 2 Debian, Wordpress 2 Debian Linux, Wordpress 2023-01-31 4.3 MEDIUM 6.1 MEDIUM
WordPress before 5.2.3 allows XSS in stored comments.
CVE-2019-16219 2 Debian, Wordpress 2 Debian Linux, Wordpress 2023-01-31 4.3 MEDIUM 6.1 MEDIUM
WordPress before 5.2.3 allows XSS in shortcode previews.
CVE-2019-16220 2 Debian, Wordpress 2 Debian Linux, Wordpress 2023-01-31 5.8 MEDIUM 6.1 MEDIUM
In WordPress before 5.2.3, validation and sanitization of a URL in wp_validate_redirect in wp-includes/pluggable.php could lead to an open redirect.
CVE-2019-16222 2 Debian, Wordpress 2 Debian Linux, Wordpress 2023-01-31 4.3 MEDIUM 6.1 MEDIUM
WordPress before 5.2.3 has an issue with URL sanitization in wp_kses_bad_protocol_once in wp-includes/kses.php that can lead to cross-site scripting (XSS) attacks.
CVE-2019-16221 2 Debian, Wordpress 2 Debian Linux, Wordpress 2023-01-31 4.3 MEDIUM 6.1 MEDIUM
WordPress before 5.2.3 allows reflected XSS in the dashboard.
CVE-2022-22816 2 Debian, Python 2 Debian Linux, Pillow 2023-01-31 6.4 MEDIUM 6.5 MEDIUM
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
CVE-2022-21127 3 Debian, Intel, Xen 5 Debian Linux, Sgx Dcap, Sgx Psw and 2 more 2023-01-31 2.1 LOW 5.5 MEDIUM
Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2022-22815 2 Debian, Python 2 Debian Linux, Pillow 2023-01-31 6.4 MEDIUM 6.5 MEDIUM
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
CVE-2018-11563 2 Debian, Otrs 2 Debian Linux, Otrs 2023-01-31 4.9 MEDIUM 4.6 MEDIUM
An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.7. A carefully constructed email could be used to inject and execute arbitrary stylesheet or JavaScript code in a logged in customer's browser in the context of the OTRS customer panel application.
CVE-2019-11730 4 Debian, Mozilla, Opensuse and 1 more 7 Debian Linux, Firefox, Firefox Esr and 4 more 2023-01-31 4.3 MEDIUM 6.5 MEDIUM
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
CVE-2021-23450 3 Debian, Linuxfoundation, Oracle 5 Debian Linux, Dojo, Communications Policy Management and 2 more 2023-01-30 7.5 HIGH 9.8 CRITICAL
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
CVE-2021-3805 2 Debian, Object-path Project 2 Debian Linux, Object-path 2023-01-30 5.0 MEDIUM 7.5 HIGH
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2021-23434 2 Debian, Object-path Project 2 Debian Linux, Object-path 2023-01-30 7.5 HIGH 8.6 HIGH
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
CVE-2022-45685 2 Debian, Jettison Project 2 Debian Linux, Jettison 2023-01-30 N/A 7.5 HIGH
A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.