Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 6.95%
  • Published 06.03.2020 15:15:14
  • Last modified 21.11.2024 04:54:55

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

  • EPSS 0.12%
  • Published 05.03.2020 16:15:11
  • Last modified 21.11.2024 04:54:54

init_tmp in TeeJee.FileSystem.vala in Timeshift before 20.03 unsafely reuses a preexisting temporary directory in the predictable location /tmp/timeshift. It follows symlinks in this location or uses directories owned by unprivileged users. Because T...

  • EPSS 71.08%
  • Published 05.03.2020 15:15:12
  • Last modified 21.11.2024 05:40:33

Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggreg...

Exploit
  • EPSS 0.05%
  • Published 04.03.2020 15:15:13
  • Last modified 21.11.2024 04:54:40

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl...

  • EPSS 2.04%
  • Published 02.03.2020 23:15:11
  • Last modified 21.11.2024 04:54:39

WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memor...

  • EPSS 2.09%
  • Published 28.02.2020 17:15:12
  • Last modified 21.11.2024 05:33:45

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as ...

Exploit
  • EPSS 4.4%
  • Published 27.02.2020 23:15:13
  • Last modified 21.11.2024 05:40:37

In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.

Exploit
  • EPSS 26.96%
  • Published 27.02.2020 23:15:12
  • Last modified 21.11.2024 05:35:37

Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Exploit
  • EPSS 0.81%
  • Published 27.02.2020 23:15:12
  • Last modified 21.11.2024 05:35:37

Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Exploit
  • EPSS 0.84%
  • Published 27.02.2020 23:15:12
  • Last modified 21.11.2024 05:35:37

Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.