Vulnerabilities > Debian > Debian Linux > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-05-28 | CVE-2019-20807 | OS Command Injection vulnerability in multiple products In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua). | 4.6 |
2020-05-27 | CVE-2020-13632 | NULL Pointer Dereference vulnerability in multiple products ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. | 5.5 |
2020-05-26 | CVE-2020-3811 | Incorrect Authorization vulnerability in multiple products qmail-verify as used in netqmail 1.06 is prone to a mail-address verification bypass vulnerability. | 5.0 |
2020-05-24 | CVE-2020-13434 | Integer Overflow or Wraparound vulnerability in multiple products SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. | 5.5 |
2020-05-22 | CVE-2020-13397 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in FreeRDP before 2.1.1. | 5.5 |
2020-05-22 | CVE-2020-10711 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. | 5.9 |
2020-05-21 | CVE-2020-13113 | Use of Uninitialized Resource vulnerability in multiple products An issue was discovered in libexif before 0.6.22. | 6.4 |
2020-05-21 | CVE-2020-6491 | Insufficient data validation in site information in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted domain name. | 6.5 |
2020-05-21 | CVE-2020-6490 | Exposure of Resource to Wrong Sphere vulnerability in multiple products Insufficient data validation in loader in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page. | 4.3 |
2020-05-21 | CVE-2020-6489 | Information Exposure vulnerability in multiple products Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page. | 4.3 |