Vulnerabilities (CVE)

Filtered by vendor Fedoraproject Subscribe
Total 5399 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-38013 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2025-01-02 N/A 7.5 HIGH
.NET Core and Visual Studio Denial of Service Vulnerability
CVE-2022-29145 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2025-01-02 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-29117 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2025-01-02 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-23267 2 Fedoraproject, Microsoft 6 Fedora, .net, .net Core and 3 more 2025-01-02 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-26134 2 Agronholm, Fedoraproject 2 Cbor2, Fedora 2025-01-02 N/A 7.5 HIGH
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.
CVE-2023-33170 2 Fedoraproject, Microsoft 3 Fedora, .net, Visual Studio 2022 2025-01-01 N/A 8.1 HIGH
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
CVE-2024-3056 3 Fedoraproject, Podman Project, Redhat 4 Fedora, Podman, Enterprise Linux and 1 more 2024-12-27 N/A 7.7 HIGH
A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.
CVE-2018-20060 2 Fedoraproject, Python 2 Fedora, Urllib3 2024-12-27 5.0 MEDIUM 9.8 CRITICAL
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
CVE-2024-5498 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Use after free in Presentation API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5497 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Out of bounds memory access in Browser UI in Google Chrome prior to 125.0.6422.141 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5496 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Use after free in Media Session in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5495 3 Fedoraproject, Google, Microsoft 3 Fedora, Chrome, Windows 2024-12-26 N/A 8.8 HIGH
Use after free in Dawn in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5494 3 Fedoraproject, Google, Microsoft 3 Fedora, Chrome, Windows 2024-12-26 N/A 8.8 HIGH
Use after free in Dawn in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5493 3 Canonical, Fedoraproject, Google 3 Ubuntu Linux, Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Heap buffer overflow in WebRTC in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-6292 3 Fedoraproject, Google, Microsoft 3 Fedora, Chrome, Windows 2024-12-26 N/A 8.8 HIGH
Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-6291 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Use after free in Swiftshader in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-6290 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5499 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-26 N/A 8.8 HIGH
Out of bounds write in Streams API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CVE-2024-6293 3 Fedoraproject, Google, Microsoft 3 Fedora, Chrome, Windows 2024-12-26 N/A 8.8 HIGH
Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-4331 2 Fedoraproject, Google 2 Fedora, Chrome 2024-12-20 N/A 8.8 HIGH
Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)