Fedoraproject

Fedora

5335 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 11.01.2023 01:15:10
  • Zuletzt bearbeitet 07.04.2025 19:15:51

In the GrowthExperiments extension for MediaWiki through 1.39, the growthmanagementorlist API allows blocked users (blocked in ApiManageMentorList) to enroll as mentors or edit any of their mentorship-related properties.

  • EPSS 0.55%
  • Veröffentlicht 10.01.2023 22:15:14
  • Zuletzt bearbeitet 08.04.2025 19:15:46

A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial

  • EPSS 0.56%
  • Veröffentlicht 10.01.2023 22:15:14
  • Zuletzt bearbeitet 21.11.2024 07:43:02

.NET Denial of Service Vulnerability

  • EPSS 0.22%
  • Veröffentlicht 10.01.2023 08:15:10
  • Zuletzt bearbeitet 07.04.2025 19:15:51

An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.

Exploit
  • EPSS 0.38%
  • Veröffentlicht 10.01.2023 08:15:10
  • Zuletzt bearbeitet 07.04.2025 19:15:51

An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widg...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 04.01.2023 16:15:09
  • Zuletzt bearbeitet 17.01.2025 20:15:26

Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.

Exploit
  • EPSS 40.5%
  • Veröffentlicht 24.12.2022 04:15:08
  • Zuletzt bearbeitet 21.11.2024 07:30:15

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of key...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 23.12.2022 15:15:15
  • Zuletzt bearbeitet 21.11.2024 07:26:45

A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the U...

  • EPSS 0.21%
  • Veröffentlicht 19.12.2022 16:15:10
  • Zuletzt bearbeitet 02.04.2025 18:33:53

After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free).

  • EPSS 0.16%
  • Veröffentlicht 16.12.2022 15:15:09
  • Zuletzt bearbeitet 07.08.2025 19:26:18

An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.