we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of Fedora
Fedora vulnerability: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to execute code on victim's computer.
Fedora vulnerability: denial of service via VT-d MSI
An attacker, who is located in a guest system, can remap interruptions of a device, in order to trigger a denial of service.
Fedora vulnerability: buffer overflow of tiff2pdf t2p_write_pdf_page
An attacker can invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.
Fedora vulnerability: execution of a Shell command
An attacker can use a special https uri, in applications including Snoopy, in order to execute a Shell command.
Fedora vulnerability: PHP code execution
An authenticated attacker can use two vulnerabilities of phpMyAdmin, in order to execute PHP code.
Display other vulnerabilities of Fedora described by Vigil@nce...
Display information about Fedora:
. Vigil@nce is a service from
Orange Business Services