Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.51%
  • Published 26.09.2022 16:15:10
  • Last modified 22.05.2025 15:15:54

Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 1.26%
  • Published 26.09.2022 16:15:10
  • Last modified 22.05.2025 15:15:55

Heap buffer overflow in Downloads in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.34%
  • Published 26.09.2022 14:15:11
  • Last modified 05.05.2025 16:15:19

A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameserv...

Exploit
  • EPSS 0.22%
  • Published 26.09.2022 05:15:10
  • Last modified 21.11.2024 06:45:27

The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.

Exploit
  • EPSS 0.07%
  • Published 25.09.2022 19:15:09
  • Last modified 21.11.2024 07:19:14

Use After Free in GitHub repository vim/vim prior to 9.0.0579.

Exploit
  • EPSS 0.05%
  • Published 25.09.2022 17:15:09
  • Last modified 21.11.2024 07:19:14

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.

Exploit
  • EPSS 0.05%
  • Published 23.09.2022 22:15:09
  • Last modified 21.11.2024 07:19:12

NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.

Exploit
  • EPSS 74.63%
  • Published 23.09.2022 18:15:10
  • Last modified 27.05.2025 15:15:26

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to er...

  • EPSS 0.31%
  • Published 23.09.2022 16:15:11
  • Last modified 27.05.2025 15:15:28

Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.

Exploit
  • EPSS 5.08%
  • Published 23.09.2022 05:15:08
  • Last modified 01.06.2025 11:15:19

In Kitty before 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup.