Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.37%
  • Veröffentlicht 27.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:49

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.

  • EPSS 0.34%
  • Veröffentlicht 27.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:49

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is tha...

  • EPSS 0.39%
  • Veröffentlicht 27.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:49

An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().

Exploit
  • EPSS 0.24%
  • Veröffentlicht 27.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:51

An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site le...

  • EPSS 0.39%
  • Veröffentlicht 27.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:51

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (whic...

  • EPSS 0.27%
  • Veröffentlicht 27.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:56

An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki.

Exploit
  • EPSS 0.9%
  • Veröffentlicht 27.09.2020 04:15:11
  • Zuletzt bearbeitet 21.11.2024 05:19:16

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first ar...

  • EPSS 0.09%
  • Veröffentlicht 23.09.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:11

An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault,...

  • EPSS 0.11%
  • Veröffentlicht 23.09.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:11

An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not be...

  • EPSS 0.07%
  • Veröffentlicht 23.09.2020 22:15:13
  • Zuletzt bearbeitet 21.11.2024 05:18:11

An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasi...