Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 10.79%
  • Published 06.02.2019 19:29:00
  • Last modified 21.11.2024 04:42:05

Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

Exploit
  • EPSS 0.29%
  • Published 04.02.2019 21:29:01
  • Last modified 19.03.2025 20:15:15

rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An aut...

Exploit
  • EPSS 1.91%
  • Published 04.02.2019 21:29:01
  • Last modified 21.11.2024 04:17:41

libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a cr...

  • EPSS 1.09%
  • Published 04.02.2019 21:29:01
  • Last modified 21.11.2024 04:17:41

libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, rea...

Exploit
  • EPSS 0.31%
  • Published 03.02.2019 03:29:00
  • Last modified 21.11.2024 04:47:58

In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a c...

  • EPSS 8.06%
  • Published 31.01.2019 18:29:00
  • Last modified 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...

Exploit
  • EPSS 57.89%
  • Published 31.01.2019 18:29:00
  • Last modified 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...

Exploit
  • EPSS 0.88%
  • Published 31.01.2019 18:29:00
  • Last modified 21.11.2024 04:47:55

In NetKit through 0.17, rcp.c in the rcp client allows remote rsh servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side. This is s...

  • EPSS 6.15%
  • Published 30.01.2019 22:29:00
  • Last modified 21.11.2024 03:54:03

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_htt...

Exploit
  • EPSS 61.15%
  • Published 16.01.2019 05:29:01
  • Last modified 21.07.2025 23:15:25

An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this...