Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Published 08.07.2022 22:15:07
  • Last modified 21.11.2024 07:00:48

Use After Free in GitHub repository vim/vim prior to 9.0.0046.

Exploit
  • EPSS 0.04%
  • Published 08.07.2022 19:15:08
  • Last modified 21.11.2024 07:00:48

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.

Exploit
  • EPSS 0.11%
  • Published 08.07.2022 18:15:09
  • Last modified 21.11.2024 07:00:48

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.

Exploit
  • EPSS 1.95%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

Exploit
  • EPSS 2.57%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 0.17%
  • Published 07.07.2022 13:15:08
  • Last modified 23.04.2025 18:15:53

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...

Exploit
  • EPSS 0.3%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:13

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

Exploit
  • EPSS 4.18%
  • Published 06.07.2022 18:15:19
  • Last modified 03.11.2025 22:15:58

moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rf...

  • EPSS 0.06%
  • Published 06.07.2022 16:15:08
  • Last modified 21.11.2024 06:22:10

A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue ha...

Exploit
  • EPSS 0.2%
  • Published 05.07.2022 18:15:08
  • Last modified 21.11.2024 07:03:55

UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate ...