Fedoraproject

Fedora

5355 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 14.37%
  • Veröffentlicht 09.04.2019 04:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:05

In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.

Exploit
  • EPSS 0.61%
  • Veröffentlicht 09.04.2019 04:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:05

In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely.

Exploit
  • EPSS 12.66%
  • Veröffentlicht 09.04.2019 04:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:05

In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.

Exploit
  • EPSS 12.66%
  • Veröffentlicht 09.04.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:04

In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.

  • EPSS 0.36%
  • Veröffentlicht 09.04.2019 02:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:25

simple-markdown.js in Khan Academy simple-markdown before 0.4.4 allows XSS via a data: or vbscript: URI.

Exploit
  • EPSS 0.51%
  • Veröffentlicht 08.04.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:23

FontInfoScanner::scanFonts in FontInfo.cc in Poppler 0.75.0 has infinite recursion, leading to a call to the error function in Error.cc.

Warnung Exploit
  • EPSS 89.57%
  • Veröffentlicht 08.04.2019 22:29:00
  • Zuletzt bearbeitet 27.10.2025 17:37:51

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with...

  • EPSS 43.02%
  • Veröffentlicht 08.04.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:30

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictio...

  • EPSS 5.87%
  • Veröffentlicht 08.04.2019 20:29:10
  • Zuletzt bearbeitet 21.11.2024 04:16:30

In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:19:49

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This ...