Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:16
  • Zuletzt bearbeitet 23.12.2025 00:50:13

In the Linux kernel, the following vulnerability has been resolved: init/main.c: Fix potential static_command_line memory overflow We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for static_command_line, but the strings copied int...

Exploit
  • EPSS 57.55%
  • Veröffentlicht 29.04.2024 04:15:07
  • Zuletzt bearbeitet 04.11.2025 19:16:27

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can su...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 25.04.2024 15:16:04
  • Zuletzt bearbeitet 16.12.2025 19:17:44

A heap-based buffer overflow vulnerability exists in the LookupTable::SetLUT functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trig...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 25.04.2024 15:16:04
  • Zuletzt bearbeitet 04.11.2025 18:15:52

An out-of-bounds read vulnerability exists in the RAWCodec::DecodeBytes functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger t...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 25.04.2024 15:16:03
  • Zuletzt bearbeitet 16.12.2025 19:17:37

An out-of-bounds write vulnerability exists in the JPEG2000Codec::DecodeByStreamsCommon functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to a heap buffer overflow. An attacker can provide a malicious ...

  • EPSS 0.33%
  • Veröffentlicht 23.04.2024 21:15:48
  • Zuletzt bearbeitet 04.02.2025 17:44:06

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` ...

  • EPSS 0.4%
  • Veröffentlicht 23.04.2024 20:15:07
  • Zuletzt bearbeitet 03.11.2025 21:16:10

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workaro...

  • EPSS 0.42%
  • Veröffentlicht 23.04.2024 20:15:07
  • Zuletzt bearbeitet 03.11.2025 21:16:10

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are a...

  • EPSS 0.53%
  • Veröffentlicht 23.04.2024 20:15:07
  • Zuletzt bearbeitet 03.11.2025 21:16:10

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

  • EPSS 1.73%
  • Veröffentlicht 23.04.2024 18:15:15
  • Zuletzt bearbeitet 03.11.2025 21:16:10

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.