Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.32%
  • Veröffentlicht 15.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:54

Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.72%
  • Veröffentlicht 15.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:54

Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 1.41%
  • Veröffentlicht 15.08.2023 18:15:11
  • Zuletzt bearbeitet 05.05.2025 16:15:49

Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 1.37%
  • Veröffentlicht 15.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:54

Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 1.97%
  • Veröffentlicht 15.08.2023 18:15:11
  • Zuletzt bearbeitet 05.05.2025 16:15:49

Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 39.28%
  • Veröffentlicht 15.08.2023 18:15:11
  • Zuletzt bearbeitet 05.05.2025 16:15:49

Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.96%
  • Veröffentlicht 15.08.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:34:54

Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.13%
  • Veröffentlicht 15.08.2023 16:15:11
  • Zuletzt bearbeitet 08.05.2025 16:15:23

A vulnerability has been discovered in Node.js version 20, specifically within the experimental permission model. This flaw relates to improper handling of Buffers in file system APIs causing a traversal path to bypass when verifying file permissions...

  • EPSS 0.08%
  • Veröffentlicht 15.08.2023 16:15:11
  • Zuletzt bearbeitet 08.05.2025 16:15:23

The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active ...

  • EPSS 0.07%
  • Veröffentlicht 15.08.2023 16:15:10
  • Zuletzt bearbeitet 03.07.2025 14:15:24

`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary director...