Vulnerabilities
Vulnerable Software
Fedoraproject:  >> Fedora  >> 32  Security Vulnerabilities
xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-12-24
Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.
CVSS Score
7.8
EPSS Score
0.004
Published
2019-12-20
Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.
CVSS Score
7.8
EPSS Score
0.004
Published
2019-12-20
cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-12-19
ATasm 1.06 has a stack-based buffer overflow in the to_comma() function in asm.c via a crafted .m65 file.
CVSS Score
7.8
EPSS Score
0.002
Published
2019-12-13
ATasm 1.06 has a stack-based buffer overflow in the parse_expr() function in setparse.c via a crafted .m65 file.
CVSS Score
7.8
EPSS Score
0.004
Published
2019-12-13
ATasm 1.06 has a stack-based buffer overflow in the get_signed_expression() function in setparse.c via a crafted .m65 file.
CVSS Score
7.8
EPSS Score
0.004
Published
2019-12-13
make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
CVSS Score
5.5
EPSS Score
0.004
Published
2019-12-12
The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
CVSS Score
7.5
EPSS Score
0.022
Published
2019-12-12
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
CVSS Score
5.3
EPSS Score
0.048
Published
2019-12-06


Contact Us

Shodan ® - All rights reserved