Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.12%
  • Veröffentlicht 25.10.2023 18:17:43
  • Zuletzt bearbeitet 01.05.2025 19:15:56

Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.4%
  • Veröffentlicht 23.10.2023 07:15:11
  • Zuletzt bearbeitet 01.08.2025 02:03:27

Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.

  • EPSS 2.17%
  • Veröffentlicht 23.10.2023 07:15:11
  • Zuletzt bearbeitet 25.08.2025 02:09:55

When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.10.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:42:16

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.

  • EPSS 0.58%
  • Veröffentlicht 18.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:26:26

Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enable...

Warnung Exploit
  • EPSS 84.5%
  • Veröffentlicht 18.10.2023 15:15:08
  • Zuletzt bearbeitet 30.10.2025 20:11:10

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbi...

  • EPSS 26.25%
  • Veröffentlicht 18.10.2023 04:15:11
  • Zuletzt bearbeitet 13.02.2025 17:16:47

This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length th...

  • EPSS 0.4%
  • Veröffentlicht 18.10.2023 04:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:24

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity chec...

  • EPSS 0.51%
  • Veröffentlicht 18.10.2023 04:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:25

Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer...

  • EPSS 1.36%
  • Veröffentlicht 17.10.2023 22:15:13
  • Zuletzt bearbeitet 22.01.2025 16:10:07

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network acce...