Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Debian_linux
(Debian)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-06-26 | CVE-2019-11272 | Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null". | Debian_linux, Spring_security | 7.3 | ||
2017-03-15 | CVE-2017-5522 | Stack-based buffer overflow in MapServer before 6.0.6, 6.2.x before 6.2.4, 6.4.x before 6.4.5, and 7.0.x before 7.0.4 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving WFS get feature requests. | Debian_linux, Mapserver | 9.8 | ||
2021-03-17 | CVE-2017-20002 | The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges. | Debian_linux, Shadow | 7.8 | ||
2018-02-08 | CVE-2018-6789 | An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely. | Ubuntu_linux, Debian_linux, Exim | 9.8 | ||
2021-04-06 | CVE-2021-30163 | Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to discover the names of private projects if issue-journal details exist that have changes to project_id values. | Debian_linux, Redmine | 7.5 | ||
2021-04-06 | CVE-2021-30164 | Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to bypass the add_issue_notes permission requirement by leveraging the Issues API. | Debian_linux, Redmine | 9.8 | ||
2017-05-08 | CVE-2017-8831 | The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. | Ubuntu_linux, Debian_linux, Linux_kernel | 6.4 | ||
2021-04-06 | CVE-2019-25026 | Redmine before 3.4.13 and 4.x before 4.0.6 mishandles markup data during Textile formatting. | Debian_linux, Redmine | 5.3 | ||
2021-04-06 | CVE-2020-36306 | Redmine before 4.0.7 and 4.1.x before 4.1.1 has XSS via the back_url field. | Debian_linux, Redmine | 6.1 | ||
2021-04-06 | CVE-2020-36307 | Redmine before 4.0.7 and 4.1.x before 4.1.1 has stored XSS via textile inline links. | Debian_linux, Redmine | 6.1 |