Show filters
309 Total Results
Displaying 41-50 of 309
Sort by:
Attacker Value
Unknown

CVE-2021-20297

Disclosure Date: May 26, 2021 (last updated February 22, 2025)
A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2016-20011

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
libgrss through 0.7.0 fails to perform TLS certificate verification when downloading feeds, allowing remote attackers to manipulate the contents of feeds without detection. This occurs because of the default behavior of SoupSessionSync.
Attacker Value
Unknown

CVE-2021-33516

Disclosure Date: May 24, 2021 (last updated February 22, 2025)
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Attacker Value
Unknown

CVE-2020-36314

Disclosure Date: April 07, 2021 (last updated February 22, 2025)
fr-archive-libarchive.c in GNOME file-roller through 3.38.0, as used by GNOME Shell and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-11736.
Attacker Value
Unknown

CVE-2021-28650

Disclosure Date: March 17, 2021 (last updated February 22, 2025)
autoar-extractor.c in GNOME gnome-autoar before 0.3.1, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-36241.
Attacker Value
Unknown

CVE-2021-28153

Disclosure Date: March 11, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
Attacker Value
Unknown

CVE-2021-27218

Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Attacker Value
Unknown

CVE-2021-27219

Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
Attacker Value
Unknown

CVE-2020-14391

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.
Attacker Value
Unknown

CVE-2020-36241

Disclosure Date: February 05, 2021 (last updated February 22, 2025)
autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.