Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.94%
  • Veröffentlicht 19.04.2023 04:15:31
  • Zuletzt bearbeitet 21.11.2024 07:57:59

Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.66%
  • Veröffentlicht 19.04.2023 04:15:31
  • Zuletzt bearbeitet 21.11.2024 07:57:59

Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.49%
  • Veröffentlicht 19.04.2023 04:15:31
  • Zuletzt bearbeitet 21.11.2024 07:57:59

Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Warnung
  • EPSS 0.34%
  • Veröffentlicht 19.04.2023 04:15:31
  • Zuletzt bearbeitet 19.02.2025 19:40:21

Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.35%
  • Veröffentlicht 19.04.2023 04:15:31
  • Zuletzt bearbeitet 21.11.2024 07:58:00

Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

Exploit
  • EPSS 0.11%
  • Veröffentlicht 19.04.2023 00:15:07
  • Zuletzt bearbeitet 19.05.2025 12:38:20

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protect...

  • EPSS 0.12%
  • Veröffentlicht 18.04.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:10

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versio...

  • EPSS 0.1%
  • Veröffentlicht 18.04.2023 20:15:16
  • Zuletzt bearbeitet 21.11.2024 07:43:59

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m...

  • EPSS 0.1%
  • Veröffentlicht 18.04.2023 20:15:15
  • Zuletzt bearbeitet 21.11.2024 07:43:58

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pr...

  • EPSS 0.2%
  • Veröffentlicht 18.04.2023 20:15:15
  • Zuletzt bearbeitet 21.11.2024 07:43:58

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple pro...