Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.96%
  • Veröffentlicht 16.09.2021 15:15:07
  • Zuletzt bearbeitet 01.05.2025 15:40:05

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

  • EPSS 44.19%
  • Veröffentlicht 16.09.2021 15:15:07
  • Zuletzt bearbeitet 01.05.2025 15:39:40

ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.

Warnung
  • EPSS 94.43%
  • Veröffentlicht 16.09.2021 15:15:07
  • Zuletzt bearbeitet 27.10.2025 17:37:06

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 15.09.2021 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:27

vim is vulnerable to Use After Free

Exploit
  • EPSS 0.36%
  • Veröffentlicht 15.09.2021 08:15:06
  • Zuletzt bearbeitet 21.11.2024 06:22:24

vim is vulnerable to Heap-based Buffer Overflow

  • EPSS 13.84%
  • Veröffentlicht 10.09.2021 02:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:53

The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.

Exploit
  • EPSS 92.85%
  • Veröffentlicht 08.09.2021 17:15:12
  • Zuletzt bearbeitet 21.11.2024 06:23:54

An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.

Exploit
  • EPSS 2.76%
  • Veröffentlicht 08.09.2021 16:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:12

A code execution vulnerability exists in the DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib 3.17.0. A specially-crafted .dxf file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerabil...

  • EPSS 2.74%
  • Veröffentlicht 08.09.2021 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:49:24

An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

  • EPSS 0.05%
  • Veröffentlicht 08.09.2021 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:49:25

An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper ...