Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.31%
  • Published 11.11.2023 01:15:07
  • Last modified 11.06.2025 15:15:26

Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.

  • EPSS 2.16%
  • Published 11.11.2023 01:15:07
  • Last modified 21.11.2024 08:29:25

Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.

  • EPSS 0.09%
  • Published 09.11.2023 22:15:11
  • Last modified 21.11.2024 08:41:58

When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.

  • EPSS 0.07%
  • Published 09.11.2023 20:15:11
  • Last modified 21.11.2024 08:41:59

Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.

  • EPSS 1.31%
  • Published 09.11.2023 20:15:10
  • Last modified 21.11.2024 08:41:59

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

  • EPSS 0.1%
  • Published 09.11.2023 20:15:10
  • Last modified 21.11.2024 08:41:59

The course upload preview contained an XSS risk for users uploading unsafe data.

  • EPSS 0.28%
  • Published 09.11.2023 20:15:10
  • Last modified 21.11.2024 08:41:59

Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.

  • EPSS 0.26%
  • Published 09.11.2023 20:15:10
  • Last modified 21.11.2024 08:41:59

Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.

  • EPSS 1.07%
  • Published 09.11.2023 20:15:10
  • Last modified 21.11.2024 08:41:59

In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code ex...

  • EPSS 1.83%
  • Published 09.11.2023 20:15:09
  • Last modified 21.11.2024 08:41:58

A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.