Vulnerabilities > Fedoraproject

DATE CVE VULNERABILITY TITLE RISK
2023-10-23 CVE-2023-31122 Out-of-bounds Read vulnerability in multiple products
Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
network
low complexity
apache fedoraproject CWE-125
7.5
2023-10-23 CVE-2023-45802 Improper Resource Shutdown or Release vulnerability in multiple products
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately.
network
high complexity
apache fedoraproject debian CWE-404
5.9
2023-10-20 CVE-2023-5686 Out-of-bounds Write vulnerability in multiple products
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
network
low complexity
radare fedoraproject CWE-787
8.8
2023-10-18 CVE-2023-45145 Exposure of Resource to Wrong Sphere vulnerability in multiple products
Redis is an in-memory database that persists on disk.
local
high complexity
redis fedoraproject debian CWE-668
3.6
2023-10-18 CVE-2023-5631 Cross-site Scripting vulnerability in multiple products
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior.
network
low complexity
roundcube debian fedoraproject CWE-79
5.4
2023-10-18 CVE-2023-38545 Out-of-bounds Write vulnerability in multiple products
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only.
network
low complexity
haxx fedoraproject netapp microsoft CWE-787
critical
9.8
2023-10-18 CVE-2023-38552 Insufficient Verification of Data Authenticity vulnerability in multiple products
When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.
network
low complexity
nodejs fedoraproject CWE-345
7.5
2023-10-18 CVE-2023-39332 Path Traversal vulnerability in multiple products
Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects.
network
low complexity
nodejs fedoraproject CWE-22
critical
9.8
2023-10-17 CVE-2023-22084 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).
network
low complexity
oracle netapp fedoraproject
4.9
2023-10-17 CVE-2023-45803 Information Exposure vulnerability in multiple products
urllib3 is a user-friendly HTTP client library for Python.
high complexity
python fedoraproject CWE-200
4.2