Fedoraproject

Fedora

5355 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 13.03%
  • Veröffentlicht 17.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:32

Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF.

  • EPSS 1.21%
  • Veröffentlicht 17.04.2019 14:29:04
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...

  • EPSS 1.21%
  • Veröffentlicht 17.04.2019 14:29:04
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...

  • EPSS 1.45%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...

  • EPSS 5.93%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...

  • EPSS 2.36%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:43

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attac...

  • EPSS 9.11%
  • Veröffentlicht 17.04.2019 14:29:03
  • Zuletzt bearbeitet 21.11.2024 04:51:44

The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password...

  • EPSS 1.13%
  • Veröffentlicht 10.04.2019 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:28

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is su...

  • EPSS 0.35%
  • Veröffentlicht 10.04.2019 00:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:28

Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.g...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 09.04.2019 21:29:03
  • Zuletzt bearbeitet 21.11.2024 04:42:40

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable wh...