[FEDORA-2014-11582] Fedora 19: mediawiki
Severity
High
Affected Packages
1
CVEs
8
- (bug 69008) SECURITY: Enhance CSS filtering in SVG files. Filter <style> elements; normalize style elements and attributes before filtering; add checks for attributes that contain css; add unit tests for html5sec and reported bugs.
- (bug 65998) Make MySQLi work with non-standard socket.
- (bug 66986) GlobalVarConfig shouldn't throw exceptions for null-valued config settings.
Package | Affected Version |
---|---|
pkg:rpm/fedora/mediawiki?distro=fedora-19 | < 1.23.4.1.fc19 |
- ID
- FEDORA-2014-11582
- Severity
- high
- Severity from
- CVE-2013-6453
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2014-11582
- Published
-
2014-10-06T05:04:38
(10 years ago) - Modified
-
2014-10-06T05:04:38
(10 years ago) - Rights
- Copyright 2014 Red Hat, Inc.
- Other Advisories
-
- DSA-2891-1
- DSA-3036-1
- FEDORA-2014-11717
- FEDORA-2014-11727
- FEDORA-2014-12262
- FEDORA-2014-12263
- FEDORA-2014-16020
- FEDORA-2014-16033
- FEDORA-2014-17228
- FEDORA-2014-17264
- FEDORA-2014-1745
- FEDORA-2014-1802
- FEDORA-2014-3338
- FEDORA-2014-3344
- FEDORA-2014-4478
- FEDORA-2014-4511
- FEDORA-2014-5684
- FEDORA-2014-5691
- FEDORA-2014-6961
- FEDORA-2014-6962
- FEDORA-2014-7779
- FEDORA-2014-7805
- FEDORA-2014-9548
- FEDORA-2014-9583
- FEDORA-2015-5569
- GLSA-201502-04
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1146515 | Bug #1146515 - CVE-2014-7199 mediawiki: security update | https://bugzilla.redhat.com/show_bug.cgi?id=1146515 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/mediawiki?distro=fedora-19 | fedora | mediawiki | < 1.23.4.1.fc19 | fedora-19 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |