Vulnerabilities > Fedoraproject
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-29 | CVE-2023-38802 | Improper Validation of Integrity Check Value vulnerability in multiple products FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation). | 7.5 |
2023-08-29 | CVE-2023-41358 | NULL Pointer Dereference vulnerability in multiple products An issue was discovered in FRRouting FRR through 9.0. | 7.5 |
2023-08-29 | CVE-2023-41359 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in FRRouting FRR through 9.0. | 9.1 |
2023-08-29 | CVE-2023-41360 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in FRRouting FRR through 9.0. | 9.1 |
2023-08-25 | CVE-2023-40587 | Path Traversal vulnerability in multiple products Pyramid is an open source Python web framework. | 5.3 |
2023-08-25 | CVE-2023-38201 | A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. | 6.5 |
2023-08-23 | CVE-2023-3899 | Incorrect Authorization vulnerability in multiple products A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. | 7.8 |
2023-08-23 | CVE-2023-4427 | Out-of-bounds Read vulnerability in multiple products Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 8.1 |
2023-08-23 | CVE-2023-4428 | Out-of-bounds Read vulnerability in multiple products Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 8.1 |
2023-08-23 | CVE-2023-4429 | Use After Free vulnerability in multiple products Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |