Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.73%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:22:30

An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-b...

  • EPSS 0.46%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:23:24

In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.

  • EPSS 0.64%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:27:47

In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.

Exploit
  • EPSS 93.85%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

Exploit
  • EPSS 90.95%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.

  • EPSS 6.82%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.

  • EPSS 0.3%
  • Veröffentlicht 26.02.2021 23:15:11
  • Zuletzt bearbeitet 18.12.2025 15:15:48

A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacke...

  • EPSS 0.39%
  • Veröffentlicht 26.02.2021 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:47:54

Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.25.0, requests to user provided domains were not restricted to...

  • EPSS 0.58%
  • Veröffentlicht 26.02.2021 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:47:54

Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.25.0, a malicious homeserver could redirect requests to their ...

  • EPSS 0.1%
  • Veröffentlicht 26.02.2021 03:15:12
  • Zuletzt bearbeitet 21.11.2024 05:14:51

Missing initialization of a variable in the TPM2 source may allow a privileged user to potentially enable an escalation of privilege via local access. This affects tpm2-tss before 3.0.1 and before 2.4.3.