Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.39%
  • Veröffentlicht 29.02.2024 01:44:16
  • Zuletzt bearbeitet 17.09.2025 20:29:23

yyjson through 0.8.0 has a double free, leading to remote code execution in some cases, because the pool_free function lacks loop checks. (pool_free is part of the pool series allocator, along with pool_malloc and pool_realloc.)

Exploit
  • EPSS 0.31%
  • Veröffentlicht 29.02.2024 01:43:57
  • Zuletzt bearbeitet 19.12.2024 20:20:38

Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 29.66%
  • Veröffentlicht 29.02.2024 01:43:57
  • Zuletzt bearbeitet 19.12.2024 20:20:25

Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 2.7%
  • Veröffentlicht 28.02.2024 20:15:41
  • Zuletzt bearbeitet 14.02.2025 15:31:24

YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb"...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 27.02.2024 15:15:07
  • Zuletzt bearbeitet 12.05.2025 13:07:50

libLAS 1.8.1 contains a memory leak vulnerability in /libLAS/apps/ts2las.cpp.

  • EPSS 3.16%
  • Veröffentlicht 27.02.2024 02:15:06
  • Zuletzt bearbeitet 28.05.2025 16:15:32

diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file, such as ../.ssh/id_rsa, may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is truste...

  • EPSS 0.21%
  • Veröffentlicht 26.02.2024 16:27:58
  • Zuletzt bearbeitet 19.12.2024 19:38:28

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, specially crafted traffic can cause a heap use after free if the ruleset uses the http.request_header or http.respo...

  • EPSS 0.06%
  • Veröffentlicht 26.02.2024 16:27:58
  • Zuletzt bearbeitet 19.12.2024 19:30:33

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, the rules inspecting HTTP2 headers can get bypassed by crafted traffic. The vulnerability has been patched in 7.0.3...

  • EPSS 0.05%
  • Veröffentlicht 26.02.2024 16:27:58
  • Zuletzt bearbeitet 23.04.2025 16:18:17

Splinefont in FontForge through 20230101 allows command injection via crafted filenames.

  • EPSS 0.65%
  • Veröffentlicht 26.02.2024 16:27:58
  • Zuletzt bearbeitet 23.04.2025 16:18:54

Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.