Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.06%
  • Published 18.09.2020 21:15:13
  • Last modified 21.11.2024 05:38:35

Node.js < 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.

  • EPSS 0.2%
  • Published 18.09.2020 21:15:13
  • Last modified 21.11.2024 05:38:35

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

  • EPSS 0.63%
  • Published 18.09.2020 21:15:12
  • Last modified 21.11.2024 05:38:29

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multit...

  • EPSS 0.12%
  • Published 17.09.2020 18:15:12
  • Last modified 21.11.2024 04:39:41

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

  • EPSS 0.28%
  • Published 16.09.2020 15:15:12
  • Last modified 21.11.2024 05:03:08

A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in fil...

  • EPSS 0.04%
  • Published 16.09.2020 14:15:12
  • Last modified 21.11.2024 05:03:09

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

  • EPSS 0.55%
  • Published 16.09.2020 13:15:11
  • Last modified 21.11.2024 05:03:09

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.

  • EPSS 0.1%
  • Published 16.09.2020 13:15:11
  • Last modified 21.11.2024 05:03:09

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.

  • EPSS 0.42%
  • Published 15.09.2020 10:15:12
  • Last modified 21.11.2024 05:39:41

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 ...

Exploit
  • EPSS 0.15%
  • Published 11.09.2020 18:15:13
  • Last modified 21.11.2024 05:03:05

An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest thre...