The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Red Hat Fedora

OpenSLP: buffer overflow
An attacker can trigger a buffer overflow of OpenSLP, in order to trigger a denial of service, and possibly to run code...
CERTFR-2019-AVI-610, CVE-2019-5544, DLA-2025-1, FEDORA-2019-1e5ae33e87, FEDORA-2019-86bceb61b3, RHSA-2019:4240-01, RHSA-2020:0199-01, USN-4919-1, VIGILANCE-VUL-31083, VMSA-2019-0022
RabbitMQ C Client: integer overflow via amqp_handle_input
An attacker can trigger an integer overflow via amqp_handle_input() of RabbitMQ C Client, in order to trigger a denial of service, and possibly to run code...
CVE-2019-18609, DLA-2022-1, FEDORA-2019-8730b65158, FEDORA-2019-dd7c8f5435, RHSA-2020:3949-01, RHSA-2020:4445-01, USN-4214-1, USN-4214-2, VIGILANCE-VUL-31073
Cyrus IMAP: privilege escalation via HTTP Request Authentication Context
An attacker can bypass restrictions via HTTP Request Authentication Context of Cyrus IMAP, in order to escalate his privileges...
CVE-2019-18928, FEDORA-2019-03be160f9c, FEDORA-2019-393e1cef4d, RHSA-2020:4655-01, VIGILANCE-VUL-31066
Oniguruma: four vulnerabilities
An attacker can use several vulnerabilities of Oniguruma...
CVE-2019-19012, CVE-2019-19203, CVE-2019-19204, CVE-2019-19246, DLA-2020-1, DLA 2431-1, DLA-2431-2, FEDORA-2019-73197ff9a0, FEDORA-2019-d942abd0d4, RHSA-2020:3662-01, RHSA-2020:5275-01, USN-4460-1, VIGILANCE-VUL-31057
GNOME Dia: infinite loop via Filename Encoding
An attacker can trigger an infinite loop via Filename Encoding of GNOME Dia, in order to trigger a denial of service...
428, CVE-2019-19451, FEDORA-2020-1fe0e08c8d, FEDORA-2020-cbc0754798, openSUSE-SU-2020:0021-1, SUSE-SU-2019:3390-1, SUSE-SU-2019:3391-1, VIGILANCE-VUL-31033
Python Pillow: denial of service via Image Files
An attacker can trigger a fatal error via Image Files of Python Pillow, in order to trigger a denial of service...
CVE-2019-16865, DSA-4631-1, FEDORA-2019-19a161d540, FEDORA-2019-e7c83bdf19, JSA11174, JSA11176, RHSA-2020:0566-01, RHSA-2020:0578-01, RHSA-2020:0580-01, USN-4272-1, VIGILANCE-VUL-31027
Jhead: out-of-bounds memory reading via ReadJpegSections
An attacker can force a read at an invalid address via ReadJpegSections() of Jhead, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2019-19035, FEDORA-2019-7efb86afdc, FEDORA-2019-948e6ebaeb, VIGILANCE-VUL-31026
FreeRADIUS: information disclosure via EAP-PWD 10 Iterations
An attacker can bypass access restrictions to data via EAP-PWD 10 Iterations of FreeRADIUS, in order to obtain sensitive information...
CVE-2019-13456, CVE-2019-20510-REJECT, FEDORA-2019-17ed521527, FEDORA-2019-ca0f5e835d, openSUSE-SU-2020:0553-1, RHSA-2020:1672-01, RHSA-2020:3984-01, SUSE-SU-2020:1023-1, SUSE-SU-2020:2391-1, VIGILANCE-VUL-31025
tnef: privilege escalation via Winmail.dat SSH Authorized Keys
An attacker can bypass restrictions via Winmail.dat SSH Authorized Keys of tnef, in order to escalate his privileges...
CVE-2019-18849, DLA-2005-1, FEDORA-2019-5f14b810f8, FEDORA-2019-815807c020, USN-4524-1, VIGILANCE-VUL-31024
grub2: denial of service via grub2-set-bootflag
An attacker can trigger a fatal error via grub2-set-bootflag of grub2, in order to trigger a denial of service...
CVE-2019-14865, FEDORA-2019-e99ebf23c8, RHSA-2020:0335-01, VIGILANCE-VUL-31023
Our database contains other pages. You can request a free trial to read them.

Display information about Red Hat Fedora: