Fedoraproject » Fedora » 36 : Security Vulnerabilities

cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
Max Base Score
7.3
Published 2023-05-02
Updated 2023-05-11
EPSS 0.13%
The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
Max Base Score
5.3
Published 2023-05-02
Updated 2023-05-11
EPSS 1.50%
A Segmentation fault caused by a floating point exception exists in libheif 1.15.1 using crafted heif images via the heif::Fraction::round() function in box.cc, which causes a denial of service.
Max Base Score
6.5
Published 2023-05-05
Updated 2023-05-11
EPSS 0.05%
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
Max Base Score
6.5
Published 2023-04-18
Updated 2023-06-01
EPSS 0.16%
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Max Base Score
5.3
Published 2023-03-31
Updated 2023-05-30
EPSS 0.11%
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
Max Base Score
5.3
Published 2023-03-31
Updated 2023-05-30
EPSS 0.11%
Dino before 0.2.3, 0.3.x before 0.3.2, and 0.4.x before 0.4.2 allows attackers to modify the personal bookmark store via a crafted message. The attacker can change the display of group chats or force a victim to join a group chat; the victim may then be tricked into disclosing sensitive information.
Max Base Score
7.1
Published 2023-03-24
Updated 2023-04-02
EPSS 0.06%
Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
Max Base Score
4.3
Published 2023-03-23
Updated 2023-04-07
EPSS 0.05%
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
Max Base Score
9.8
Published 2023-03-23
Updated 2023-03-31
EPSS 0.27%
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
Max Base Score
5.5
Published 2023-03-30
Updated 2023-04-21
EPSS 0.05%
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
Max Base Score
5.9
Published 2023-03-30
Updated 2023-06-06
EPSS 0.08%
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
Max Base Score
5.9
Published 2023-03-30
Updated 2023-06-29
EPSS 0.06%
Sudo before 1.9.13p2 has a double free in the per-command chroot feature.
Max Base Score
7.2
Published 2023-02-28
Updated 2023-04-13
EPSS 0.08%
libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lys_parse_mem at lys_parse_mem.c.
Max Base Score
5.3
Published 2023-04-03
Updated 2023-09-26
EPSS 0.05%
hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Max Base Score
7.5
Published 2023-02-04
Updated 2023-07-25
EPSS 0.08%
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Max Base Score
7.5
Published 2023-02-17
Updated 2023-08-12
EPSS 0.07%
An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
Max Base Score
6.5
Published 2023-02-23
Updated 2023-04-18
EPSS 0.05%
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
Max Base Score
6.5
Published 2023-01-14
Updated 2023-05-03
EPSS 0.10%
A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
Max Base Score
5.5
Published 2023-01-12
Updated 2023-01-23
EPSS 0.04%
A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
Max Base Score
5.5
Published 2023-01-12
Updated 2023-01-23
EPSS 0.04%
Open redirect vulnerability in pgAdmin 4 versions prior to v6.14 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
Max Base Score
6.1
Published 2023-01-17
Updated 2023-02-02
EPSS 0.07%
.NET Denial of Service Vulnerability
Max Base Score
7.5
Published 2023-01-10
Updated 2023-04-27
EPSS 0.06%
A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.
Max Base Score
4.4
Published 2023-04-25
Updated 2023-08-19
EPSS 0.04%
Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Max Base Score
8.8
Published 2023-04-19
Updated 2023-05-02
EPSS 0.24%

CVE-2023-2136

Known Exploited Vulnerability
Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Max Base Score
9.6
Published 2023-04-19
Updated 2023-05-02
EPSS 0.55%
KEV Added 2023-04-21
657 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!