Fedoraproject

Fedora

5335 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 18.13%
  • Veröffentlicht 21.08.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:08

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To ...

  • EPSS 1.69%
  • Veröffentlicht 21.08.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:08

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to ch...

  • EPSS 8.52%
  • Veröffentlicht 17.08.2020 19:15:21
  • Zuletzt bearbeitet 21.11.2024 05:10:55

A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be ex...

Warnung Exploit
  • EPSS 94.38%
  • Veröffentlicht 17.08.2020 19:15:15
  • Zuletzt bearbeitet 29.10.2025 13:54:15

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability...

Exploit
  • EPSS 2.02%
  • Veröffentlicht 17.08.2020 17:15:13
  • Zuletzt bearbeitet 05.05.2025 14:12:47

ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).

Exploit
  • EPSS 0.31%
  • Veröffentlicht 13.08.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:37

Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 13.08.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:35

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 13.08.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:36

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).

Exploit
  • EPSS 0.24%
  • Veröffentlicht 13.08.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:36

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possib...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 13.08.2020 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:08:13

In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.