Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.37%
  • Published 20.09.2021 18:15:11
  • Last modified 21.11.2024 06:07:51

Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1.

  • EPSS 0.77%
  • Published 19.09.2021 17:15:07
  • Last modified 21.11.2024 06:25:23

loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.

  • EPSS 0.18%
  • Published 17.09.2021 21:15:07
  • Last modified 21.11.2024 06:18:55

Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm t...

  • EPSS 0.15%
  • Published 17.09.2021 20:15:07
  • Last modified 21.11.2024 06:18:55

Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.19.0 and before version 0.30.0 there was a use-after-free bug when passing `externref`s from the host to guest Wasm content. To trigger the bug, you have to explici...

  • EPSS 0.07%
  • Published 17.09.2021 20:15:07
  • Last modified 21.11.2024 06:18:56

Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteein...

  • EPSS 9.88%
  • Published 16.09.2021 15:15:07
  • Last modified 21.11.2024 06:11:13

Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.

  • EPSS 4.96%
  • Published 16.09.2021 15:15:07
  • Last modified 01.05.2025 15:40:05

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

  • EPSS 42.79%
  • Published 16.09.2021 15:15:07
  • Last modified 01.05.2025 15:39:40

ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.

Warning
  • EPSS 94.43%
  • Published 16.09.2021 15:15:07
  • Last modified 27.10.2025 17:37:06

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

Exploit
  • EPSS 0.12%
  • Published 15.09.2021 13:15:08
  • Last modified 21.11.2024 06:22:27

vim is vulnerable to Use After Free