Fedoraproject

Fedora

5335 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.24%
  • Veröffentlicht 03.04.2023 16:15:07
  • Zuletzt bearbeitet 21.11.2024 07:13:00

A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.

  • EPSS 0.18%
  • Veröffentlicht 31.03.2023 19:15:07
  • Zuletzt bearbeitet 18.02.2025 16:15:16

An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.

  • EPSS 0.34%
  • Veröffentlicht 31.03.2023 04:15:09
  • Zuletzt bearbeitet 04.11.2025 18:15:40

A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versio...

  • EPSS 0.85%
  • Veröffentlicht 31.03.2023 04:15:09
  • Zuletzt bearbeitet 04.11.2025 17:15:36

A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed vers...

  • EPSS 0.06%
  • Veröffentlicht 30.03.2023 21:15:06
  • Zuletzt bearbeitet 29.08.2025 13:42:30

A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompSc...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 30.03.2023 20:15:07
  • Zuletzt bearbeitet 21.11.2024 07:53:06

A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing a...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 30.03.2023 20:15:07
  • Zuletzt bearbeitet 23.04.2025 17:16:28

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path re...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 30.03.2023 20:15:07
  • Zuletzt bearbeitet 09.06.2025 15:15:28

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 30.03.2023 20:15:07
  • Zuletzt bearbeitet 14.02.2025 16:15:33

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION opt...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 30.03.2023 20:15:07
  • Zuletzt bearbeitet 09.06.2025 15:15:29

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previous...