Summary
Detail | |||
---|---|---|---|
Vendor | Fedoraproject | First view | 2018-07-06 |
Product | Fedora | Last view | 2022-06-02 |
Version | 34 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:fedoraproject:fedora |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2022-06-02 | CVE-2022-1949 | An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data. |
6.8 | 2022-06-02 | CVE-2022-1789 | With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference. |
9.8 | 2022-05-29 | CVE-2022-1927 | Buffer Over-read in GitHub repository vim/vim prior to 8.2. |
7.8 | 2022-05-27 | CVE-2022-1897 | Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. |
9.8 | 2022-05-18 | CVE-2022-30600 | A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed. |
9.8 | 2022-05-18 | CVE-2022-30599 | A flaw was found in moodle where an SQL injection risk was identified in Badges code relating to configuring criteria. |
4.3 | 2022-05-18 | CVE-2022-30598 | A flaw was found in moodle where global search results could include author information on some activities where a user may not otherwise have access to it. |
5.3 | 2022-05-18 | CVE-2022-30597 | A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field. |
5.4 | 2022-05-18 | CVE-2022-30596 | A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk. |
7.8 | 2022-05-17 | CVE-2022-1769 | Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974. |
7.8 | 2022-05-17 | CVE-2022-1733 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968. |
5.5 | 2022-05-12 | CVE-2022-1674 | NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input. |
7.5 | 2022-05-10 | CVE-2022-29117 | .NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-23267, CVE-2022-29145. |
7.8 | 2022-05-07 | CVE-2022-1616 | Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution |
7.5 | 2022-05-06 | CVE-2022-24884 | ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged signatures. Both the `ecdsautil verify` CLI command and the libecdsautil library are affected. The issue has been fixed in ecdsautils 0.4.1. All older versions of ecdsautils (including versions before the split into a library and a CLI utility) are vulnerable. |
9.1 | 2022-05-06 | CVE-2022-1053 | Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1, |
7.8 | 2022-05-04 | CVE-2022-27470 | SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file. |
5.5 | 2022-05-04 | CVE-2022-20796 | On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. |
7.5 | 2022-05-04 | CVE-2022-20785 | On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available. |
7.5 | 2022-05-04 | CVE-2022-20771 | On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available. |
7.5 | 2022-05-04 | CVE-2022-20770 | On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available. |
4.3 | 2022-04-29 | CVE-2022-0984 | Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges. |
5.5 | 2022-04-27 | CVE-2022-24736 | Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules. |
7.8 | 2022-04-27 | CVE-2022-24735 | Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua script execution environment in Redis provides some measures that prevent a script from creating side effects that persist and can affect the execution of the same, or different script, at a later time. Several weaknesses of these measures have been publicly known for a long time, but they had no security impact as the Redis security model did not endorse the concept of users or privileges. With the introduction of ACLs in Redis 6.0, these weaknesses can be exploited by a less privileged users to inject Lua code that will execute at a later time, when a privileged user executes a Lua script. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules. |
5.5 | 2022-04-27 | CVE-2022-1507 | chafa: NULL Pointer Dereference in function gif_internal_decode_frame at libnsgif.c:599 allows attackers to cause a denial of service (crash) via a crafted input file. in GitHub repository hpjansson/chafa prior to 1.10.2. chafa: NULL Pointer Dereference in function gif_internal_decode_frame at libnsgif.c:599 allows attackers to cause a denial of service (crash) via a crafted input file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (136) | CWE-416 | Use After Free |
10% (95) | CWE-787 | Out-of-bounds Write |
5% (47) | CWE-125 | Out-of-bounds Read |
4% (42) | CWE-476 | NULL Pointer Dereference |
3% (35) | CWE-190 | Integer Overflow or Wraparound |
3% (33) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
3% (32) | CWE-20 | Improper Input Validation |
3% (31) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
3% (30) | CWE-502 | Deserialization of Untrusted Data |
3% (28) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (23) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (16) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (16) | CWE-122 | Heap-based Buffer Overflow |
1% (16) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
1% (15) | CWE-287 | Improper Authentication |
1% (15) | CWE-200 | Information Exposure |
1% (15) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (12) | CWE-295 | Certificate Issues |
1% (11) | CWE-415 | Double Free |
1% (11) | CWE-362 | Race Condition |
1% (10) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (10) | CWE-346 | Origin Validation Error |
1% (10) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
1% (9) | CWE-269 | Improper Privilege Management |
1% (9) | CWE-203 | Information Exposure Through Discrepancy |
SAINT Exploits
Description | Link |
---|---|
Apache Log4j JNDI message lookup vulnerability | More info here |
Apache HTTP Server path traversal | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-18 | TRUFFLEHUNTER TALOS-2021-1238 attack attempt RuleID : 57135 - Type : BROWSER-WEBKIT - Revision : 1 |
2021-02-18 | TRUFFLEHUNTER TALOS-2021-1238 attack attempt RuleID : 57134 - Type : BROWSER-WEBKIT - Revision : 1 |
2021-02-18 | TRUFFLEHUNTER TALOS-2021-1229 attack attempt RuleID : 57046 - Type : BROWSER-WEBKIT - Revision : 1 |
2021-02-18 | TRUFFLEHUNTER TALOS-2021-1229 attack attempt RuleID : 57045 - Type : BROWSER-WEBKIT - Revision : 1 |
2021-01-28 | TRUFFLEHUNTER TALOS-2021-1226 attack attempt RuleID : 56995 - Type : FILE-OTHER - Revision : 1 |
2021-01-28 | TRUFFLEHUNTER TALOS-2021-1226 attack attempt RuleID : 56994 - Type : FILE-OTHER - Revision : 1 |
2020-12-23 | TRUFFLEHUNTER TALOS-2020-1215 attack attempt RuleID : 56724 - Type : FILE-OTHER - Revision : 1 |
2020-12-23 | TRUFFLEHUNTER TALOS-2020-1215 attack attempt RuleID : 56723 - Type : FILE-OTHER - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1187 attack attempt RuleID : 56510 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1187 attack attempt RuleID : 56509 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1186 attack attempt RuleID : 56508 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1186 attack attempt RuleID : 56507 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1188 attack attempt RuleID : 56308 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1188 attack attempt RuleID : 56307 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1189 attack attempt RuleID : 56298 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1189 attack attempt RuleID : 56297 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1185 attack attempt RuleID : 56275 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | TRUFFLEHUNTER TALOS-2020-1185 attack attempt RuleID : 56211 - Type : SERVER-WEBAPP - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-10 | Name: The remote Debian host is missing a security update. File: debian_DLA-1631.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-f73869d61e.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-a2e9bd6eae.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-50075276e8.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-18f3eff32b.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-0f5e6e9957.nasl - Type: ACT_GATHER_INFO |
2018-12-11 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1406.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4351.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Fedora host is missing a security update. File: fedora_2018-daee493feb.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Fedora host is missing a security update. File: fedora_2018-46b92c9064.nasl - Type: ACT_GATHER_INFO |
2018-11-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-1591.nasl - Type: ACT_GATHER_INFO |
2018-11-23 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_b036fabaedd811e8b3b700e04c1ea73d.nasl - Type: ACT_GATHER_INFO |
2018-11-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO |
2018-08-07 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4266.nasl - Type: ACT_GATHER_INFO |
2018-08-03 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZA-2018-049.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote Fedora host is missing a security update. File: fedora_2018-8484550fff.nasl - Type: ACT_GATHER_INFO |