Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 20.03.2024 17:15:07
  • Zuletzt bearbeitet 26.03.2025 15:15:49

Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

  • EPSS 0.52%
  • Veröffentlicht 20.03.2024 17:15:07
  • Zuletzt bearbeitet 21.11.2024 09:10:09

Use after free in Canvas in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

  • EPSS 0.18%
  • Veröffentlicht 20.03.2024 17:15:07
  • Zuletzt bearbeitet 21.11.2024 09:10:10

Inappropriate implementation in Downloads in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)

  • EPSS 0.21%
  • Veröffentlicht 20.03.2024 17:15:07
  • Zuletzt bearbeitet 13.03.2025 19:15:44

Incorrect security UI in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)

  • EPSS 0.12%
  • Veröffentlicht 20.03.2024 17:15:07
  • Zuletzt bearbeitet 17.03.2025 17:15:26

Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)

  • EPSS 0.17%
  • Veröffentlicht 20.03.2024 17:15:07
  • Zuletzt bearbeitet 29.03.2025 00:15:21

Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)

Exploit
  • EPSS 0.79%
  • Veröffentlicht 20.03.2024 16:15:07
  • Zuletzt bearbeitet 04.11.2025 22:15:55

latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

  • EPSS 0.26%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 13.01.2026 15:03:22

PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding reques...

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 13.01.2026 14:50:49

Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.

  • EPSS 0.07%
  • Veröffentlicht 20.03.2024 11:15:08
  • Zuletzt bearbeitet 04.11.2025 19:16:05

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, tradit...