Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.18%
  • Published 05.02.2021 14:15:17
  • Last modified 21.11.2024 05:29:08

autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the ...

  • EPSS 2.5%
  • Published 02.02.2021 19:15:14
  • Last modified 21.11.2024 05:47:56

Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be inject...

  • EPSS 33.48%
  • Published 02.02.2021 07:15:14
  • Last modified 21.11.2024 06:21:12

In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative path...

Exploit
  • EPSS 0.21%
  • Published 01.02.2021 20:15:12
  • Last modified 21.11.2024 05:22:54

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punct...

Exploit
  • EPSS 0.21%
  • Published 29.01.2021 17:15:12
  • Last modified 21.11.2024 06:21:21

An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

Exploit
  • EPSS 1.38%
  • Published 27.01.2021 19:15:13
  • Last modified 21.11.2024 06:21:17

Monitorix 3.13.0 allows remote attackers to bypass Basic Authentication in a default installation (i.e., an installation without a hosts_deny option). This issue occurred because a new access-control feature was introduced without considering that so...

Exploit
  • EPSS 0.07%
  • Published 27.01.2021 08:15:10
  • Last modified 21.11.2024 06:21:11

jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.

Warning Exploit
  • EPSS 92.32%
  • Published 26.01.2021 21:15:12
  • Last modified 03.04.2025 19:47:48

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

  • EPSS 0.06%
  • Published 26.01.2021 20:15:12
  • Last modified 21.11.2024 06:21:15

An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and en...

  • EPSS 0.04%
  • Published 26.01.2021 18:16:27
  • Last modified 21.11.2024 06:20:54

In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.