Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.53%
  • Published 23.09.2019 12:15:10
  • Last modified 21.11.2024 04:31:01

Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.

Exploit
  • EPSS 0.23%
  • Published 20.09.2019 19:15:11
  • Last modified 21.11.2024 04:27:25

There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.

  • EPSS 0.05%
  • Published 19.09.2019 18:15:10
  • Last modified 21.11.2024 04:27:25

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wher...

  • EPSS 7.12%
  • Published 19.09.2019 14:15:10
  • Last modified 21.11.2024 04:21:46

In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.

Exploit
  • EPSS 0.05%
  • Published 17.09.2019 16:15:10
  • Last modified 21.11.2024 04:27:27

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descript...

  • EPSS 8.53%
  • Published 17.09.2019 12:15:10
  • Last modified 21.11.2024 04:30:21

process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.

  • EPSS 1.25%
  • Published 17.09.2019 12:15:10
  • Last modified 21.11.2024 04:30:36

OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 is prone to a signature-bypass vulnerability with multiple From: addresses, which might affect applications that consider a domain name to be relevant to the origin of an e-mail message.

  • EPSS 4.69%
  • Published 16.09.2019 19:15:10
  • Last modified 21.11.2024 04:45:01

Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.

  • EPSS 10.79%
  • Published 16.09.2019 19:15:10
  • Last modified 21.11.2024 04:45:01

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

  • EPSS 7.76%
  • Published 15.09.2019 22:15:10
  • Last modified 21.11.2024 04:26:55

A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.