Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 02.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:40:46

Apache Guacamole 1.1.0 and older do not properly validate datareceived from RDP servers via static virtual channels. If a userconnects to a malicious or compromised RDP server, specially-craftedPDUs could result in disclosure of information within th...

  • EPSS 0.51%
  • Veröffentlicht 01.07.2020 23:15:10
  • Zuletzt bearbeitet 21.11.2024 05:33:44

The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This...

  • EPSS 0.55%
  • Veröffentlicht 30.06.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:27

An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-...

  • EPSS 15.65%
  • Veröffentlicht 30.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:41

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containi...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 30.06.2020 12:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:29

In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.

  • EPSS 4.78%
  • Veröffentlicht 30.06.2020 11:15:10
  • Zuletzt bearbeitet 21.11.2024 03:21:16

It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overf...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 30.06.2020 11:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:29

In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based buffer over-read in Streams_Fill_PerStream in Multiple/File_MpegPs.cpp (aka an off-by-one during MpegPs parsing).

  • EPSS 1.1%
  • Veröffentlicht 29.06.2020 20:15:10
  • Zuletzt bearbeitet 21.11.2024 05:32:14

In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligent...

  • EPSS 0.48%
  • Veröffentlicht 29.06.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:19

PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the ...

  • EPSS 0.41%
  • Veröffentlicht 26.06.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:59

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file genera...