Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-20315

EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-20315

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
加锁机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat CentOS Stream 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat CentOS Stream是美国红帽(Red Hat)公司的 开发之前持续交付的发行版,定位为 Fedora Linux 和 RHEL 之间的中游。 Red Hat CentOS Stream 8存在安全漏洞,该漏洞允许物理攻击者可利用该漏洞访问一个锁定的系统,以锁定用户的身份杀死现有的应用程序,并启动新的应用程序,即使会话仍然被锁定。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-gnome-shell gnome-shell 3.32.2-40.el8 -

II. Public POCs for CVE-2021-20315

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-20315

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-02-18 · 67 CVEs total

CVE-2022-252999.8 CRITICALArbitrary File Write
CVE-2021-237027.6 HIGHPrototype Pollution
CVE-2022-252987.5 HIGHPath Traversal
CVE-2021-46062MingSoft MCMS 安全漏洞
CVE-2022-25134TotoLink routers 命令注入漏洞
CVE-2022-25135TotoLink routers 命令注入漏洞
CVE-2022-25133TotoLink routers 命令注入漏洞
CVE-2021-46110Online Shopping Portal 安全漏洞
CVE-2021-46082Moxa Tn-5900 安全漏洞
CVE-2021-46063MingSoft MCMS 代码代码注入漏洞
CVE-2021-40841LiveConfig 路径遍历漏洞
CVE-2021-46037MingSoft MCMS 安全漏洞
CVE-2021-46036MingSoft MCMS 代码问题漏洞
CVE-2021-30650Broadcom Symantec Layer7 API Management OAuth Toolkit跨站脚本漏洞
CVE-2020-8242Packet Tide ExpressionEngine 安全漏洞
CVE-2021-3657Sourceforge mbsync 缓冲区错误漏洞
CVE-2021-3947QEMU 缓冲区错误漏洞
CVE-2021-3930QEMU 安全漏洞
CVE-2021-20325Red Hat Enterprise Linux 代码问题漏洞
CVE-2021-20322Linux kernel 安全特征问题漏洞

Showing top 20 of 67 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-20315

No comments yet


Leave a comment