Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.89%
  • Veröffentlicht 12.06.2020 16:15:10
  • Zuletzt bearbeitet 21.11.2024 05:32:13

In affected versions of WordPress, when uploading themes, the name of the theme folder can be crafted in a way that could lead to JavaScript execution in /wp-admin on the themes page. This does require an admin to upload the theme, and is low severit...

  • EPSS 2.42%
  • Veröffentlicht 12.06.2020 16:15:10
  • Zuletzt bearbeitet 21.11.2024 05:32:13

In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged b...

  • EPSS 11.11%
  • Veröffentlicht 11.06.2020 15:15:16
  • Zuletzt bearbeitet 21.11.2024 04:53:05

In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product...

  • EPSS 9.45%
  • Veröffentlicht 11.06.2020 15:15:15
  • Zuletzt bearbeitet 21.11.2024 04:53:03

In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploita...

  • EPSS 0.21%
  • Veröffentlicht 10.06.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:24:29

A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for cod...

Exploit
  • EPSS 1.87%
  • Veröffentlicht 09.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:02:16

Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson....

Exploit
  • EPSS 0.7%
  • Veröffentlicht 09.06.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 04:56:00

A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.

  • EPSS 0.87%
  • Veröffentlicht 09.06.2020 03:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:15

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. include/rcmail_output_html.php allows XSS via the username template object.

Warnung Exploit
  • EPSS 82.69%
  • Veröffentlicht 09.06.2020 03:15:11
  • Zuletzt bearbeitet 04.11.2025 15:00:43

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.

Exploit
  • EPSS 1.57%
  • Veröffentlicht 09.06.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:02:14

Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session ...