Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Published 22.04.2022 14:15:09
  • Last modified 21.11.2024 06:55:41

FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.

Exploit
  • EPSS 0.17%
  • Published 22.04.2022 14:15:09
  • Last modified 21.11.2024 06:55:41

FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.

Exploit
  • EPSS 0.07%
  • Published 21.04.2022 11:15:08
  • Last modified 21.11.2024 06:40:41

Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.

  • EPSS 0.18%
  • Published 20.04.2022 23:15:08
  • Last modified 21.11.2024 06:59:17

In GNOME Epiphany before 41.4 and 42.x before 42.2, an HTML document can trigger a client buffer overflow (in ephy_string_shorten in the UI process) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is...

  • EPSS 0.13%
  • Published 20.04.2022 10:15:08
  • Last modified 21.11.2024 06:57:10

The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.

  • EPSS 0.13%
  • Published 20.04.2022 10:15:07
  • Last modified 21.11.2024 06:50:50

encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.

Exploit
  • EPSS 1.5%
  • Published 19.04.2022 17:15:11
  • Last modified 21.11.2024 06:52:30

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can...

  • EPSS 88.4%
  • Published 19.04.2022 16:17:10
  • Last modified 21.11.2024 06:58:35

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.

  • EPSS 0.43%
  • Published 18.04.2022 17:15:16
  • Last modified 03.11.2025 22:15:52

A heap double free issue was found in Opensc before version 0.22.0 in sc_pkcs15_free_tokeninfo.

  • EPSS 0.06%
  • Published 18.04.2022 17:15:16
  • Last modified 03.11.2025 22:15:52

A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid.