Fedoraproject

Fedora

5355 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 46.31%
  • Veröffentlicht 04.02.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:38:52

An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.

  • EPSS 1.33%
  • Veröffentlicht 02.02.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:38:30

In xml.rs in GNOME librsvg before 2.46.2, a crafted SVG file with nested patterns can cause denial of service when passed to the library for processing. The attacker constructs pattern elements so that the number of final rendered objects grows expon...

  • EPSS 1.57%
  • Veröffentlicht 31.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 02:35:42

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecifie...

  • EPSS 0.75%
  • Veröffentlicht 31.01.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 01:31:49

ABRT might allow attackers to obtain sensitive information from crash reports.

Exploit
  • EPSS 2.95%
  • Veröffentlicht 30.01.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:56

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicA...

Exploit
  • EPSS 14.03%
  • Veröffentlicht 29.01.2020 21:15:11
  • Zuletzt bearbeitet 01.07.2025 18:15:23

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

Exploit
  • EPSS 2.65%
  • Veröffentlicht 29.01.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:38:30

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

Warnung Exploit
  • EPSS 94.11%
  • Veröffentlicht 29.01.2020 16:15:12
  • Zuletzt bearbeitet 07.11.2025 22:02:55

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This ...

  • EPSS 4.2%
  • Veröffentlicht 28.01.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 02:37:50

Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via vectors involving large management addresses and ...

  • EPSS 1.77%
  • Veröffentlicht 28.01.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 01:47:14

packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.