Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.18%
  • Veröffentlicht 05.02.2021 14:15:17
  • Zuletzt bearbeitet 21.11.2024 05:29:08

autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the ...

  • EPSS 2.5%
  • Veröffentlicht 02.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:47:56

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be inject...

  • EPSS 33.48%
  • Veröffentlicht 02.02.2021 07:15:14
  • Zuletzt bearbeitet 21.11.2024 06:21:12

In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative path...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 01.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:54

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punct...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 29.01.2021 17:15:12
  • Zuletzt bearbeitet 21.11.2024 06:21:21

An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

Exploit
  • EPSS 1.38%
  • Veröffentlicht 27.01.2021 19:15:13
  • Zuletzt bearbeitet 21.11.2024 06:21:17

Monitorix 3.13.0 allows remote attackers to bypass Basic Authentication in a default installation (i.e., an installation without a hosts_deny option). This issue occurred because a new access-control feature was introduced without considering that so...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 27.01.2021 08:15:10
  • Zuletzt bearbeitet 21.11.2024 06:21:11

jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.

Warnung Exploit
  • EPSS 92.32%
  • Veröffentlicht 26.01.2021 21:15:12
  • Zuletzt bearbeitet 03.04.2025 19:47:48

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

  • EPSS 0.06%
  • Veröffentlicht 26.01.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 06:21:15

An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and en...

  • EPSS 0.04%
  • Veröffentlicht 26.01.2021 18:16:27
  • Zuletzt bearbeitet 21.11.2024 06:20:54

In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.