Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 17.75%
  • Veröffentlicht 29.11.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:14:18

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

  • EPSS 1.35%
  • Veröffentlicht 16.11.2018 09:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:41

PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 17.10.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:53

A heap-based buffer over-read was discovered in the tcpreplay-edit binary of Tcpreplay 4.3.0 beta1, during the incremental checksum operation. The issue gets triggered in the function csum_replace4() in incremental_checksum.h, causing a denial of ser...

  • EPSS 0.39%
  • Veröffentlicht 17.10.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:53

A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4.3.0 beta1. The issue gets triggered in the function post_args() at tcpbridge.c, causing a denial of service or possibly unspecified other impact.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 17.10.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:53

A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call.

  • EPSS 1.62%
  • Veröffentlicht 05.10.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:03

In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree.

  • EPSS 0.59%
  • Veröffentlicht 01.10.2018 08:29:02
  • Zuletzt bearbeitet 21.11.2024 03:55:02

The html package (aka x/net/html) through 2018-09-25 in Go mishandles <table><math><select><mi><select></table>, leading to an infinite loop during an html.Parse call because inSelectIM and inSelectInTableIM do not comply with a specification.

Exploit
  • EPSS 0.91%
  • Veröffentlicht 01.10.2018 08:29:02
  • Zuletzt bearbeitet 21.11.2024 03:55:02

The html package (aka x/net/html) through 2018-09-25 in Go mishandles <svg><template><desc><t><svg></template>, leading to a "panic: runtime error" (index out of range) in (*nodeStack).pop in node.go, called from (*parser).clearActiveFormattingElemen...

Exploit
  • EPSS 1.03%
  • Veröffentlicht 01.10.2018 08:29:02
  • Zuletzt bearbeitet 21.11.2024 03:55:03

The html package (aka x/net/html) through 2018-09-25 in Go mishandles <math><template><mn><b></template>, leading to a "panic: runtime error" (index out of range) in (*insertionModeStack).pop in node.go, called from inHeadIM, during an html.Parse cal...

Exploit
  • EPSS 0.48%
  • Veröffentlicht 01.10.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:00

An issue was discovered in AdPlug 2.3.1. There are several double-free vulnerabilities in the CEmuopl class in emuopl.cpp because of a destructor's two OPLDestroy calls, each of which frees TL_TABLE, SIN_TABLE, AMS_TABLE, and VIB_TABLE.