Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Published 18.12.2020 08:15:15
  • Last modified 21.11.2024 05:27:22

An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don't exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing s...

Exploit
  • EPSS 93.68%
  • Published 16.12.2020 01:15:12
  • Last modified 23.05.2025 16:53:23

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data fro...

Exploit
  • EPSS 90.7%
  • Published 16.12.2020 01:15:12
  • Last modified 23.05.2025 16:54:02

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrar...

Exploit
  • EPSS 0.43%
  • Published 15.12.2020 21:15:15
  • Last modified 21.11.2024 05:27:14

jsonparser 1.0.0 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a GET call.

  • EPSS 0.06%
  • Published 15.12.2020 18:15:15
  • Last modified 21.11.2024 05:24:04

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created...

  • EPSS 0.07%
  • Published 15.12.2020 18:15:15
  • Last modified 21.11.2024 05:24:04

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid wil...

  • EPSS 0.06%
  • Published 15.12.2020 18:15:15
  • Last modified 21.11.2024 05:24:04

An issue was discovered in Xen through 4.14.x. A guest may access xenstore paths via absolute paths containing a full pathname, or via a relative path, which implicitly includes /local/domain/$DOMID for their own domain id. Management tools must acce...

  • EPSS 0.06%
  • Published 15.12.2020 18:15:15
  • Last modified 21.11.2024 05:24:05

An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by ...

  • EPSS 0.06%
  • Published 15.12.2020 18:15:15
  • Last modified 21.11.2024 05:24:05

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that wa...

  • EPSS 0.06%
  • Published 15.12.2020 18:15:15
  • Last modified 21.11.2024 05:24:05

An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems usin...