navigation bar left navigation bar right

navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Fedora Core 6

This vulnerability report for Fedora Core 6 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Fedora Core 6 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Red Hat

Product Link View Here (Link to external site)

Affected By 75 Secunia advisories
195 Vulnerabilities

Monitor Product Receive alerts for this product





75 Secunia Advisories in 2003-2014

Secunia has issued a total of 75 Secunia advisories in 2003-2014 for Fedora Core 6. Currently, 11% (8 out of 75) are marked as unpatched with the most severe being rated Not critical

More information about the specific Secunia advisories affecting Fedora Core 6 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Fedora update for samba
Vendor Patch. Secunia Advisory 1 of 67 in 2007. 7,458 views.
Release Date:
2007-12-11
Secunia Advisory ID:
SA27977
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Fedora has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for kernel
Vendor Patch. Secunia Advisory 2 of 67 in 2007. 6,795 views.
Release Date:
2007-12-10
Secunia Advisory ID:
SA27922
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for xorg-x11-xfs
Vendor Patch. Secunia Advisory 3 of 67 in 2007. 6,396 views.
Release Date:
2007-12-10
Secunia Advisory ID:
SA27946
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for xorg-x11-xfs. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Fedora update for openoffice.org
Vendor Patch. Secunia Advisory 4 of 67 in 2007. 6,518 views.
Release Date:
2007-12-10
Secunia Advisory ID:
SA27972
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Fedora update for htdig
Vendor Patch. Secunia Advisory 5 of 67 in 2007. 7,431 views.
Release Date:
2007-12-04
Secunia Advisory ID:
SA27850
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Fedora has issued an update for htdig. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Fedora update for firefox
Vendor Patch. Secunia Advisory 6 of 67 in 2007. 9,066 views.
Release Date:
2007-11-29
Secunia Advisory ID:
SA27855
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks or potentially compromise a user's system. [Read More]


patched Fedora update for tetex
Vendor Patch. Secunia Advisory 7 of 67 in 2007. 9,611 views.
Release Date:
2007-11-21
Secunia Advisory ID:
SA27718
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system. [Read More]


patched Fedora update for samba
Vendor Patch. Secunia Advisory 8 of 67 in 2007. 10,238 views.
Release Date:
2007-11-16
Secunia Advisory ID:
SA27682
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Fedora has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for openldap
Vendor Patch. Secunia Advisory 9 of 67 in 2007. 9,809 views.
Release Date:
2007-11-16
Secunia Advisory ID:
SA27683
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for openldap. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Fedora update for perl
Vendor Patch. Secunia Advisory 10 of 67 in 2007. 8,388 views.
Release Date:
2007-11-13
Secunia Advisory ID:
SA27613
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for perl. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for mono
Vendor Patch. Secunia Advisory 11 of 67 in 2007. 6,794 views.
Release Date:
2007-11-12
Secunia Advisory ID:
SA27612
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Unknown
Where:
From remote
Short Description:
Fedora has issued an update for mono. This fixes a vulnerability with an unknown impact. [Read More]


patched Fedora update for cups
Vendor Patch. Secunia Advisory 12 of 67 in 2007. 8,197 views.
Release Date:
2007-11-12
Secunia Advisory ID:
SA27615
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for cups. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


patched Fedora update for cpio
Vendor Patch. Secunia Advisory 13 of 67 in 2007. 5,808 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27476
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for cpio. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for tar
Vendor Patch. Secunia Advisory 14 of 67 in 2007. 6,789 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27514
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for tar. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for thunderbird
Vendor Patch. Secunia Advisory 15 of 67 in 2007. 6,059 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27510
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for firefox
Vendor Patch. Secunia Advisory 16 of 67 in 2007. 5,099 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27513
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for libpng
Vendor Patch. Secunia Advisory 17 of 67 in 2007. 5,790 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27492
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for xen
Vendor Patch. Secunia Advisory 18 of 67 in 2007. 8,811 views.
Release Date:
2007-11-02
Secunia Advisory ID:
SA27497
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Where:
Local system
Short Description:
Fedora has issued an update for xen. This fixes a security issue, which can be exploited by malicious, local users to truncate arbitrary files. [Read More]


patched Fedora update for cups
Vendor Patch. Secunia Advisory 19 of 67 in 2007. 8,081 views.
Release Date:
2007-11-02
Secunia Advisory ID:
SA27494
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for flac
Vendor Patch. Secunia Advisory 20 of 67 in 2007. 9,682 views.
Release Date:
2007-11-02
Secunia Advisory ID:
SA27507
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for flac. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Fedora update for ruby
Vendor Patch. Secunia Advisory 21 of 67 in 2007. 7,760 views.
Release Date:
2007-10-30
Secunia Advisory ID:
SA27432
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Spoofing
Where:
From remote
Short Description:
Fedora has issued an update for ruby. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


patched Fedora update for openssh
Vendor Patch. Secunia Advisory 22 of 67 in 2007. 10,197 views.
Release Date:
2007-10-16
Secunia Advisory ID:
SA27235
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Fedora has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to inject certain data. [Read More]


patched Fedora update for openssl
Vendor Patch. Secunia Advisory 23 of 67 in 2007. 9,893 views.
Release Date:
2007-10-16
Secunia Advisory ID:
SA27217
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


patched Fedora update for hplip
Vendor Patch. Secunia Advisory 24 of 67 in 2007. 8,270 views.
Release Date:
2007-10-15
Secunia Advisory ID:
SA27232
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for hplip. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Fedora update for util-linux
Vendor Patch. Secunia Advisory 25 of 67 in 2007. 7,379 views.
Release Date:
2007-10-11
Secunia Advisory ID:
SA27188
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for util-linux. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Fedora update for kernel
Vendor Patch. Secunia Advisory 26 of 67 in 2007. 6,094 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27101
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


patched Fedora update for kdebase
Vendor Patch. Secunia Advisory 27 of 67 in 2007. 6,376 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27096
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Spoofing
Where:
From remote
Short Description:
Fedora has issued an update for kdebase. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to conduct spoofing attacks. [Read More]


patched Fedora update for xen
Vendor Patch. Secunia Advisory 28 of 67 in 2007. 6,439 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27103
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for xen. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions or gain escalated privileges. [Read More]


patched Fedora update for elinks
Vendor Patch. Secunia Advisory 29 of 67 in 2007. 5,873 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27132
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Fedora has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to disclose sensitive information. [Read More]


patched Fedora update for kdelibs
Vendor Patch. Secunia Advisory 30 of 67 in 2007. 6,448 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27090
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Spoofing
Where:
From remote
Short Description:
Fedora has issued an update for kdelibs. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


patched Fedora update for ruby
Vendor Patch. Secunia Advisory 31 of 67 in 2007. 5,678 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27044
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Spoofing
Where:
From remote
Short Description:
Fedora has issued an update for ruby. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


patched Fedora update for php
Vendor Patch. Secunia Advisory 32 of 67 in 2007. 8,532 views.
Release Date:
2007-09-25
Secunia Advisory ID:
SA26930
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Fedora has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). [Read More]


patched Fedora update for kernel
Vendor Patch. Secunia Advisory 33 of 67 in 2007. 7,242 views.
Release Date:
2007-09-25
Secunia Advisory ID:
SA26919
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Fedora update for httpd
Vendor Patch. Secunia Advisory 34 of 67 in 2007. 7,756 views.
Release Date:
2007-09-25
Secunia Advisory ID:
SA26952
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for httpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for openoffice.org
Vendor Patch. Secunia Advisory 35 of 67 in 2007. 5,928 views.
Release Date:
2007-09-19
Secunia Advisory ID:
SA26855
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Fedora update for qt
Vendor Patch. Secunia Advisory 36 of 67 in 2007. 6,214 views.
Release Date:
2007-09-19
Secunia Advisory ID:
SA26804
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for qt. This fixes some vulnerabilities, which can be exploited by malicious people to potentially conduct cross-site scripting attacks, cause a DoS (Denial of Service), or to compromise an application using the library. [Read More]


patched Fedora update for gd
Vendor Patch. Secunia Advisory 37 of 67 in 2007. 7,104 views.
Release Date:
2007-09-19
Secunia Advisory ID:
SA26856
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for gd. This fixes some vulnerabilities, which can potentially be exploited to cause a DoS (Denial of Service). [Read More]


patched Fedora update for krb5
Vendor Patch. Secunia Advisory 38 of 67 in 2007. 10,097 views.
Release Date:
2007-09-06
Secunia Advisory ID:
SA26680
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for libwpd
Vendor Patch. Secunia Advisory 39 of 67 in 2007. 9,648 views.
Release Date:
2007-03-20
Secunia Advisory ID:
SA24573
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for libwpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. [Read More]


patched Fedora Xen VNC Server Host File Disclosure Security Issue
Vendor Patch. Secunia Advisory 40 of 67 in 2007. 14,259 views.
Release Date:
2007-03-20
Secunia Advisory ID:
SA24575
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Fedora has acknowledged a security issue, which can be exploited by malicious users to gain knowledge of sensitive information. [Read More]


patched Fedora update for tcpdump
Vendor Patch. Secunia Advisory 41 of 67 in 2007. 9,924 views.
Release Date:
2007-03-19
Secunia Advisory ID:
SA24583
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for kernel
Vendor Patch. Secunia Advisory 42 of 67 in 2007. 10,500 views.
Release Date:
2007-03-15
Secunia Advisory ID:
SA24518
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and potentially gain escalated privileges. [Read More]


patched Fedora update for gnupg
Vendor Patch. Secunia Advisory 43 of 67 in 2007. 9,864 views.
Release Date:
2007-03-13
Secunia Advisory ID:
SA24489
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Fedora has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions when applications use GnuPG in an insecure manner. [Read More]


patched Fedora update for thunderbird
Vendor Patch. Secunia Advisory 44 of 67 in 2007. 12,493 views.
Release Date:
2007-03-06
Secunia Advisory ID:
SA24406
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for thunderbird. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Fedora update for kernel
Vendor Patch. Secunia Advisory 45 of 67 in 2007. 10,521 views.
Release Date:
2007-03-05
Secunia Advisory ID:
SA24400
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


patched Fedora update for firefox
Vendor Patch. Secunia Advisory 46 of 67 in 2007. 13,059 views.
Release Date:
2007-02-28
Secunia Advisory ID:
SA24320
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. [Read More]


patched Fedora update for gnucash
Vendor Patch. Secunia Advisory 47 of 67 in 2007. 8,508 views.
Release Date:
2007-02-28
Secunia Advisory ID:
SA24317
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for gnucash. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Fedora update for nspr and nss
Vendor Patch. Secunia Advisory 48 of 67 in 2007. 9,559 views.
Release Date:
2007-02-27
Secunia Advisory ID:
SA24277
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for nspr and nss. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Fedora update for php
Vendor Patch. Secunia Advisory 49 of 67 in 2007. 7,806 views.
Release Date:
2007-02-22
Secunia Advisory ID:
SA24241
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Fedora update for ekiga
Vendor Patch. Secunia Advisory 50 of 67 in 2007. 8,336 views.
Release Date:
2007-02-22
Secunia Advisory ID:
SA24228
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for ekiga. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Fedora update for spamassassin
Vendor Patch. Secunia Advisory 51 of 67 in 2007. 11,900 views.
Release Date:
2007-02-16
Secunia Advisory ID:
SA24200
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for kernel
Vendor Patch. Secunia Advisory 52 of 67 in 2007. 7,253 views.
Release Date:
2007-02-15
Secunia Advisory ID:
SA24178
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


patched Fedora update for gd
Vendor Patch. Secunia Advisory 53 of 67 in 2007. 9,078 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24143
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for gd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for samba
Vendor Patch. Secunia Advisory 54 of 67 in 2007. 10,292 views.
Release Date:
2007-02-09
Secunia Advisory ID:
SA24076
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Fedora has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Fedora update for wireshark
Vendor Patch. Secunia Advisory 55 of 67 in 2007. 10,597 views.
Release Date:
2007-02-07
Secunia Advisory ID:
SA24084
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for libsoup
Vendor Patch. Secunia Advisory 56 of 67 in 2007. 9,058 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23976
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for libsoup. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for bind
Vendor Patch. Secunia Advisory 57 of 67 in 2007. 9,822 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23974
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fedora has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for the kernel
Vendor Patch. Secunia Advisory 58 of 67 in 2007. 9,635 views.
Release Date:
2007-01-19
Secunia Advisory ID:
SA23833
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Privilege escalation
DoS
Where:
From remote
Short Description:
Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), overwrite arbitrary files, or gain escalated privileges, and by malicious people to cause a DoS. [Read More]


patched Fedora update for ed
Vendor Patch. Secunia Advisory 59 of 67 in 2007. 8,393 views.
Release Date:
2007-01-19
Secunia Advisory ID:
SA23848
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Fedora has issued an update for ed. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Fedora update for squirrelmail
Vendor Patch. Secunia Advisory 60 of 67 in 2007. 9,303 views.
Release Date:
2007-01-18
Secunia Advisory ID:
SA23811
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Fedora has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. [Read More]


patched Fedora update for fetchmail
Vendor Patch. Secunia Advisory 61 of 67 in 2007. 9,346 views.
Release Date:
2007-01-17
Secunia Advisory ID:
SA23804
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Fedora has issued an update for fetchmail. This fixes a vulnerability and a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and malicious people to gain knowledge of sensitive information. [Read More]


patched Fedora update for Avahi
Vendor Patch. Secunia Advisory 62 of 67 in 2007. 7,978 views.
Release Date:
2007-01-16
Secunia Advisory ID:
SA23782
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Fedora has issued an update for Avahi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Fedora update for w3m
Vendor Patch. Secunia Advisory 63 of 67 in 2007. 8,470 views.
Release Date:
2007-01-16
Secunia Advisory ID:
SA23792
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for w3m. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Fedora Core 6 update for mono
Vendor Patch. Secunia Advisory 64 of 67 in 2007. 8,401 views.
Release Date:
2007-01-15
Secunia Advisory ID:
SA23727
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Fedora has issued an update for mono. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


patched Fedora Core 6 update for krb5
Vendor Patch. Secunia Advisory 65 of 67 in 2007. 10,585 views.
Release Date:
2007-01-10
Secunia Advisory ID:
SA23706
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Fedora update for thunderbird
Vendor Patch. Secunia Advisory 66 of 67 in 2007. 13,784 views.
Release Date:
2007-01-05
Secunia Advisory ID:
SA23618
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Fedora has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a user's system. [Read More]


patched Fedora update for openoffice.org
Vendor Patch. Secunia Advisory 67 of 67 in 2007. 10,070 views.
Release Date:
2007-01-05
Secunia Advisory ID:
SA23620
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Fedora has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


unpatched Fedora Core ReiserFS sync Memory Corruption Vulnerability
Unpatched. Secunia Advisory 1 of 8 in 2006. 8,949 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23093
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


unpatched Fedora Core minix File System Denial of Service Vulnerability
Unpatched. Secunia Advisory 2 of 8 in 2006. 12,435 views.
Release Date:
2006-11-20
Secunia Advisory ID:
SA23034
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


unpatched Fedora Core "init_journal()" Denial of Service
Unpatched. Secunia Advisory 3 of 8 in 2006. 8,272 views.
Release Date:
2006-11-16
Secunia Advisory ID:
SA22886
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


unpatched Fedora Core SELinux "superblock_doinit()" Denial of Service
Unpatched. Secunia Advisory 4 of 8 in 2006. 10,765 views.
Release Date:
2006-11-15
Secunia Advisory ID:
SA22887
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


unpatched Fedora Core Ext2 File System Denial of Service Vulnerability
Unpatched. Secunia Advisory 5 of 8 in 2006. 12,623 views.
Release Date:
2006-11-13
Secunia Advisory ID:
SA22837
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service) [Read More]


unpatched Fedora Core Ext3 File System Denial of Service Vulnerability
Unpatched. Secunia Advisory 6 of 8 in 2006. 11,377 views.
Release Date:
2006-11-13
Secunia Advisory ID:
SA22776
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service) [Read More]


unpatched Fedora Core "zlib_inflate()" Denial of Service Vulnerability
Unpatched. Secunia Advisory 7 of 8 in 2006. 11,105 views.
Release Date:
2006-11-08
Secunia Advisory ID:
SA22767
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


unpatched Fedora Core ISO9660 Local Denial of Service
Unpatched. Secunia Advisory 8 of 8 in 2006. 11,624 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22746
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Fedora Core 6 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+