Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Exploit
  • EPSS 94.47%
  • Veröffentlicht 24.02.2020 22:15:12
  • Zuletzt bearbeitet 28.03.2025 17:15:49

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available t...

  • EPSS 2.12%
  • Veröffentlicht 24.02.2020 18:15:22
  • Zuletzt bearbeitet 21.11.2024 05:40:29

Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.

  • EPSS 45.23%
  • Veröffentlicht 24.02.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:40:29

An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.

Exploit
  • EPSS 7.87%
  • Veröffentlicht 24.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:47

pacman before 5.2 is vulnerable to arbitrary command injection in conf.c in the download_with_xfercommand() function. This can be exploited when unsigned databases are used. To exploit the vulnerability, the user must enable a non-default XferCommand...

Exploit
  • EPSS 7.87%
  • Veröffentlicht 24.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:47

pacman before 5.2 is vulnerable to arbitrary command injection in lib/libalpm/sync.c in the apply_deltas() function. This can be exploited when unsigned databases are used. To exploit the vulnerability, the user must enable the non-default delta feat...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 24.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:21

There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.

  • EPSS 0.09%
  • Veröffentlicht 24.02.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:37:56

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload wit...

Exploit
  • EPSS 94.16%
  • Veröffentlicht 22.02.2020 02:15:10
  • Zuletzt bearbeitet 21.11.2024 05:39:29

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

Exploit
  • EPSS 2.28%
  • Veröffentlicht 20.02.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 02:31:00

The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a cra...

Exploit
  • EPSS 3.08%
  • Veröffentlicht 20.02.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 02:31:00

The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to...