Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 26.02.2024 16:27:57
  • Zuletzt bearbeitet 18.12.2024 18:07:03

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes. This vulnerability is patched...

  • EPSS 0.85%
  • Veröffentlicht 26.02.2024 16:27:57
  • Zuletzt bearbeitet 19.12.2024 19:26:20

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to versions 6.0.16 and 7.0.3, an attacker can craft traffic to cause Suricata to use far more CPU and memory for processing th...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 26.02.2024 16:27:57
  • Zuletzt bearbeitet 07.02.2025 17:35:33

LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.

  • EPSS 0.2%
  • Veröffentlicht 26.02.2024 16:27:52
  • Zuletzt bearbeitet 27.02.2025 03:05:58

Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening.

Exploit
  • EPSS 2.13%
  • Veröffentlicht 24.02.2024 05:15:44
  • Zuletzt bearbeitet 25.04.2025 19:37:25

Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could ...

  • EPSS 0.16%
  • Veröffentlicht 23.02.2024 18:15:50
  • Zuletzt bearbeitet 13.02.2025 18:17:29

Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vul...

  • EPSS 0.06%
  • Veröffentlicht 23.02.2024 18:15:50
  • Zuletzt bearbeitet 13.02.2025 18:17:29

Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.

  • EPSS 0.04%
  • Veröffentlicht 23.02.2024 15:15:09
  • Zuletzt bearbeitet 05.02.2025 21:41:30

c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hos...

  • EPSS 1.49%
  • Veröffentlicht 22.02.2024 17:15:08
  • Zuletzt bearbeitet 05.05.2025 14:14:41

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...

  • EPSS 0.15%
  • Veröffentlicht 22.02.2024 13:15:07
  • Zuletzt bearbeitet 16.05.2025 14:17:01

A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is en...