Fedoraproject

Fedora

5335 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.61%
  • Veröffentlicht 19.02.2024 13:15:07
  • Zuletzt bearbeitet 03.11.2025 22:16:40

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus....

  • EPSS 0.53%
  • Veröffentlicht 19.02.2024 11:15:08
  • Zuletzt bearbeitet 13.02.2025 18:16:25

An integer overflow in dav1d AV1 decoder that can occur when decoding videos with large frame size. This can lead to memory corruption within the AV1 decoder. We recommend upgrading past version 1.4.0 of dav1d.

Medienbericht
  • EPSS 39.62%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 04.11.2025 19:16:14

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...

Medienbericht Exploit
  • EPSS 43.88%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 23.12.2025 20:20:08

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 13.02.2024 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:59:46

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_...

  • EPSS 0.27%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 14.03.2025 17:15:40

The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` insta...

  • EPSS 0.16%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 21.11.2024 08:41:55

A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, and - the resolver receives a PTR query for an RFC 1918 address that would normally result in an a...

  • EPSS 0.14%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 29.03.2025 00:15:16

A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18...

  • EPSS 0.08%
  • Veröffentlicht 12.02.2024 23:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:40

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the comput...

  • EPSS 0.03%
  • Veröffentlicht 12.02.2024 14:15:08
  • Zuletzt bearbeitet 21.11.2024 08:44:20

A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computati...