Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.35%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.

Exploit
  • EPSS 3.11%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.

Exploit
  • EPSS 1.35%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.

Exploit
  • EPSS 2.27%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 3.06%
  • Veröffentlicht 18.09.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:38:35

Node.js < 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.

  • EPSS 0.18%
  • Veröffentlicht 18.09.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:38:35

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

  • EPSS 0.26%
  • Veröffentlicht 18.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:29

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multit...

  • EPSS 0.12%
  • Veröffentlicht 17.09.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:39:41

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

  • EPSS 0.28%
  • Veröffentlicht 16.09.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:08

A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in fil...

  • EPSS 0.12%
  • Veröffentlicht 16.09.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.