Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.02%
  • Veröffentlicht 20.12.2019 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:11

Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any pr...

  • EPSS 0.9%
  • Veröffentlicht 20.12.2019 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:11

Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-En...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 20.12.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:39

Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 20.12.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:39

Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 19.12.2019 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:37

cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c ...

  • EPSS 1.63%
  • Veröffentlicht 18.12.2019 20:15:16
  • Zuletzt bearbeitet 13.02.2025 15:37:40

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id....

  • EPSS 4.17%
  • Veröffentlicht 18.12.2019 20:15:15
  • Zuletzt bearbeitet 04.11.2025 19:15:38

The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disabl...

Exploit
  • EPSS 4.03%
  • Veröffentlicht 17.12.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:43:01

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain ac...

Exploit
  • EPSS 11.61%
  • Veröffentlicht 17.12.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:43:01

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can recover a user's password hash by sending a crafted HTTP POST request.

Exploit
  • EPSS 2.8%
  • Veröffentlicht 17.12.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:43:01

ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to...