Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 88.11%
  • Veröffentlicht 14.07.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 07:05:56

The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).

  • EPSS 0.06%
  • Veröffentlicht 12.07.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 06:58:40

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue ...

  • EPSS 1.41%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:55

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

  • EPSS 0.07%
  • Veröffentlicht 12.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:56

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 08.07.2022 22:15:07
  • Zuletzt bearbeitet 21.11.2024 07:00:48

Use After Free in GitHub repository vim/vim prior to 9.0.0046.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 08.07.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:48

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 08.07.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 07:00:48

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.

Exploit
  • EPSS 2.59%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

Exploit
  • EPSS 4.55%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 23.04.2025 18:15:53

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...