Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 29 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-10190
A vulnerability exists in DNS resolver component of knot resolver through version 3.2.0 prior to 4.1.0 which allows remote malicious users to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation fa...
Nic Knot Resolver
Fedoraproject Fedora 29
Fedoraproject Fedora 30
5
CVSSv2
CVE-2019-10191
A vulnerability exists in DNS resolver of knot resolver before version 4.1.0 which allows remote malicious users to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.
Nic Knot Resolver
Fedoraproject Fedora 29
Fedoraproject Fedora 30
6.5
CVSSv2
CVE-2019-3871
A vulnerability was found in PowerDNS Authoritative Server prior to 4.0.7 and prior to 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denia...
Powerdns Authoritative Server
Fedoraproject Fedora 28
Fedoraproject Fedora 29
4.3
CVSSv2
CVE-2018-18407
A heap-based buffer over-read exists in the tcpreplay-edit binary of Tcpreplay 4.3.0 beta1, during the incremental checksum operation. The issue gets triggered in the function csum_replace4() in incremental_checksum.h, causing a denial of service.
Broadcom Tcpreplay 4.3.0
Fedoraproject Fedora 28
Fedoraproject Fedora 29
7.5
CVSSv2
CVE-2018-18408
A use-after-free exists in the tcpbridge binary of Tcpreplay 4.3.0 beta1. The issue gets triggered in the function post_args() at tcpbridge.c, causing a denial of service or possibly unspecified other impact.
Broadcom Tcpreplay 4.3.0
Fedoraproject Fedora 28
Fedoraproject Fedora 29
5
CVSSv2
CVE-2019-1010142
scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work.
Scapy Scapy 2.4.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
5
CVSSv2
CVE-2019-10897
In Wireshark 3.0.0, the IEEE 802.11 dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-ieee80211.c by detecting cases in which the bit offset does not advance.
Wireshark Wireshark 3.0.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
5
CVSSv2
CVE-2019-10898
In Wireshark 3.0.0, the GSUP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gsm_gsup.c by rejecting an invalid Information Element length.
Wireshark Wireshark 3.0.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
5
CVSSv2
CVE-2019-10900
In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely.
Wireshark Wireshark 3.0.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
5
CVSSv2
CVE-2019-10902
In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely.
Wireshark Wireshark 3.0.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »