Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.63%
  • Published 07.07.2021 22:15:07
  • Last modified 21.11.2024 05:48:56

A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger...

  • EPSS 0.5%
  • Published 06.07.2021 15:15:07
  • Last modified 21.11.2024 06:07:38

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementatio...

  • EPSS 0.92%
  • Published 02.07.2021 19:15:08
  • Last modified 21.11.2024 06:04:10

Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

Warning
  • EPSS 4.58%
  • Published 02.07.2021 19:15:07
  • Last modified 24.10.2025 21:07:05

Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.61%
  • Published 02.07.2021 19:15:07
  • Last modified 21.11.2024 06:04:10

Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Exploit
  • EPSS 0.73%
  • Published 02.07.2021 13:15:07
  • Last modified 21.11.2024 06:12:01

In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a "sitewide block" applied, it is able to still "purge" pages through the MediaWiki Action API...

  • EPSS 6.96%
  • Published 02.07.2021 10:15:07
  • Last modified 21.11.2024 06:11:43

Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.

Exploit
  • EPSS 0.02%
  • Published 01.07.2021 03:15:08
  • Last modified 21.11.2024 06:13:07

The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).

Exploit
  • EPSS 0.02%
  • Published 01.07.2021 03:15:08
  • Last modified 21.11.2024 06:13:07

The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).

Exploit
  • EPSS 0.02%
  • Published 01.07.2021 03:15:08
  • Last modified 21.11.2024 06:13:07

The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).