Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 08.07.2022 22:15:07
  • Zuletzt bearbeitet 21.11.2024 07:00:48

Use After Free in GitHub repository vim/vim prior to 9.0.0046.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 08.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:48

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 08.07.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 07:00:48

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.

Exploit
  • EPSS 1.95%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

Exploit
  • EPSS 2.57%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 23.04.2025 18:15:53

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:13

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

Exploit
  • EPSS 4.18%
  • Veröffentlicht 06.07.2022 18:15:19
  • Zuletzt bearbeitet 03.11.2025 22:15:58

moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rf...

  • EPSS 0.06%
  • Veröffentlicht 06.07.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:10

A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue ha...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 05.07.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 07:03:55

UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate ...