Fedoraproject

Fedora

5326 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.5%
  • Veröffentlicht 19.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:26

Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 1.23%
  • Veröffentlicht 19.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:26

Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 2.49%
  • Veröffentlicht 19.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:26

Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.

  • EPSS 1.62%
  • Veröffentlicht 19.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:26

Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 1.5%
  • Veröffentlicht 19.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:26

Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.13%
  • Veröffentlicht 19.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:26

An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.

  • EPSS 0.08%
  • Veröffentlicht 19.02.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:35

QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memo...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 17.02.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:46

An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_layer4_v6() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Deni...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 17.02.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:46

An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a D...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 17.02.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:47

An issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Servic...