Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 14.11.2024 11:15:03
  • Zuletzt bearbeitet 18.11.2024 22:08:54

A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the s...

  • EPSS 0.47%
  • Veröffentlicht 02.08.2024 21:16:30
  • Zuletzt bearbeitet 27.12.2024 16:15:24

A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious ...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 24.06.2024 22:15:10
  • Zuletzt bearbeitet 26.12.2024 16:02:51

Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0.25%
  • Veröffentlicht 24.06.2024 22:15:10
  • Zuletzt bearbeitet 26.12.2024 16:26:46

Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0.23%
  • Veröffentlicht 24.06.2024 22:15:10
  • Zuletzt bearbeitet 26.12.2024 16:26:31

Use after free in Swiftshader in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0.25%
  • Veröffentlicht 24.06.2024 22:15:10
  • Zuletzt bearbeitet 26.12.2024 16:26:22

Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.14%
  • Veröffentlicht 18.06.2024 20:15:14
  • Zuletzt bearbeitet 07.08.2025 17:24:28

A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.

  • EPSS 0.15%
  • Veröffentlicht 18.06.2024 20:15:14
  • Zuletzt bearbeitet 26.03.2025 14:15:31

Incorrect CSRF token checks resulted in multiple CSRF risks.

  • EPSS 0.56%
  • Veröffentlicht 18.06.2024 20:15:13
  • Zuletzt bearbeitet 07.08.2025 17:23:59

Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.

  • EPSS 0.15%
  • Veröffentlicht 18.06.2024 20:15:13
  • Zuletzt bearbeitet 07.08.2025 16:43:09

Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.