Fedoraproject Fedora vulnerabilities

5,277 known vulnerabilities affecting fedoraproject/fedora.

Total CVEs
5,277
CISA KEV
84
actively exploited
Public exploits
147
Exploited in wild
101
Severity breakdown
CRITICAL514HIGH2325MEDIUM2265LOW173

Vulnerabilities

Page 29 of 264
CVE-2023-39364MEDIUMCVSS 5.4v37v382023-09-05
CVE-2023-39364 [MEDIUM] CWE-601 CVE-2023-39364: Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, user Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, users with console access can be redirected to an arbitrary website after a change password performed via a specifically crafted URL. The `auth_changepassword.php` file accepts `ref` as a URL parameter and reflects it in the form used to perform the chang
nvd
CVE-2023-39512MEDIUMCVSS 4.8v37v382023-09-05
CVE-2023-39512 [MEDIUM] CWE-79 CVE-2023-39512: Cacti is an open source operational monitoring and fault management framework. Affected versions are Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's b
nvd
CVE-2023-39366MEDIUMCVSS 4.8v37v382023-09-05
CVE-2023-39366 [MEDIUM] CWE-79 CVE-2023-39366: Cacti is an open source operational monitoring and fault management framework. Affected versions are Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser
nvd
CVE-2023-39365MEDIUMCVSS 6.3v37v382023-09-05
CVE-2023-39365 [MEDIUM] CWE-89 CVE-2023-39365: Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Reg Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this v
nvd
CVE-2023-39516MEDIUMCVSS 4.8v37v382023-09-05
CVE-2023-39516 [MEDIUM] CWE-79 CVE-2023-39516: Cacti is an open source operational monitoring and fault management framework. Affected versions are Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's b
nvd
CVE-2023-4750HIGHCVSS 7.8v37v38+1 more2023-09-04
CVE-2023-4750 [HIGH] CWE-416 CVE-2023-4750: Use After Free in GitHub repository vim/vim prior to 9.0.1857. Use After Free in GitHub repository vim/vim prior to 9.0.1857.
nvd
CVE-2023-4733HIGHCVSS 7.8v37v38+1 more2023-09-04
CVE-2023-4733 [HIGH] CWE-416 CVE-2023-4733: Use After Free in GitHub repository vim/vim prior to 9.0.1840. Use After Free in GitHub repository vim/vim prior to 9.0.1840.
nvd
CVE-2023-4752HIGHCVSS 7.8v37v38+1 more2023-09-04
CVE-2023-4752 [HIGH] CWE-416 CVE-2023-4752: Use After Free in GitHub repository vim/vim prior to 9.0.1858. Use After Free in GitHub repository vim/vim prior to 9.0.1858.
nvd
CVE-2023-36328CRITICALCVSS 9.8v37v38+1 more2023-09-01
CVE-2023-36328 [CRITICAL] CWE-190 CVE-2023-36328: Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667a Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS).
nvd
CVE-2023-40569CRITICALCVSS 9.8v37v38+1 more2023-08-31
CVE-2023-40569 [CRITICAL] CWE-787 CVE-2023-40569: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.
nvd
CVE-2023-40186CRITICALCVSS 9.8v37v38+1 more2023-08-31
CVE-2023-40186 [CRITICAL] CWE-190 CVE-2023-40186: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done
nvd
CVE-2023-40188CRITICALCVSS 9.1v37v38+1 more2023-08-31
CVE-2023-40188 [CRITICAL] CWE-125 CVE-2023-40188: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_LumaToYUV444` function. This Out-Of-Bounds Read occurs because processing is done on the `in` variable without checking if it contains data of sufficient length. Insufficie
nvd
CVE-2023-39353CRITICALCVSS 9.1v37v38+1 more2023-08-31
CVE-2023-39353 [CRITICAL] CWE-125 CVE-2023-39353: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile->quantIdxY`, `tile->quantIdxCb`, and `tile->quantIdxCr`. As a result crafted
nvd
CVE-2023-39356CRITICALCVSS 9.1v37v38+1 more2023-08-31
CVE-2023-39356 [CRITICAL] CWE-125 CVE-2023-39356: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a missing offset validation may lead to an Out Of Bound Read in the function `gdi_multi_opaque_rect`. In particular there is no code to validate if the value `multi_opaque_rect->numRectangles` is less than 45. Looping thro
nvd
CVE-2023-40181CRITICALCVSS 9.1v37v38+1 more2023-08-31
CVE-2023-40181 [CRITICAL] CWE-125 CVE-2023-40181: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a cra
nvd
CVE-2023-40567CRITICALCVSS 9.8v37v38+1 more2023-08-31
CVE-2023-40567 [CRITICAL] CWE-787 CVE-2023-40567: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `clear_decompress_bands_data` function in which there is no offset validation. Abuse of this vulnerability may lead to an out of bounds write. This issue has been addressed in vers
nvd
CVE-2023-39352CRITICALCVSS 9.8v37v38+1 more2023-08-31
CVE-2023-39352 [CRITICAL] CWE-787 CVE-2023-39352: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect->left` and `rect->top` are exactly equal to `surface->width` and `surface->height`. eg. `rect->left` == `s
nvd
CVE-2023-39351HIGHCVSS 7.5v37v38+1 more2023-08-31
CVE-2023-39351 [HIGH] CWE-476 CVE-2023-39351: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX (rfx) handling. Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numT
nvd
CVE-2023-40589HIGHCVSS 7.5v37v38+1 more2023-08-31
CVE-2023-40589 [HIGH] CWE-120 CVE-2023-40589: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache lic FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.
nvd
CVE-2023-20900HIGHCVSS 7.5v37v38+1 more2023-08-31
CVE-2023-20900 [HIGH] CWE-294 CVE-2023-20900: A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMwar A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.c
nvd