Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Debian_linux
(Debian)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-09-02 | CVE-2020-22669 | Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications. | Debian_linux, Owasp_modsecurity_core_rule_set | 9.8 | ||
2022-09-03 | CVE-2022-3099 | Use After Free in GitHub repository vim/vim prior to 9.0.0360. | Debian_linux, Fedora, Vim | 7.8 | ||
2022-09-02 | CVE-2020-29260 | libvncclient v0.9.13 was discovered to contain a memory leak via the function rfbClientCleanup(). | Debian_linux, Libvncserver | 7.5 | ||
2022-09-05 | CVE-2022-39842 | An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen. | Debian_linux, Linux_kernel | 6.1 | ||
2022-09-05 | CVE-2022-3008 | The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751 | Debian_linux, Tinygltf | 8.8 | ||
2022-09-05 | CVE-2022-38749 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. | Debian_linux, Snakeyaml | 6.5 | ||
2022-09-05 | CVE-2022-38750 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. | Debian_linux, Snakeyaml | 5.5 | ||
2022-09-05 | CVE-2022-38751 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. | Debian_linux, Snakeyaml | 6.5 | ||
2022-09-06 | CVE-2022-2735 | A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS. | Pcs, Debian_linux | 7.8 | ||
2022-09-06 | CVE-2022-3134 | Use After Free in GitHub repository vim/vim prior to 9.0.0389. | Debian_linux, Vim | 7.8 |