Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 40 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-2625
Object lifecycle issue in V8 in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2626
Out of bounds read in Swiftshader in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2627
Use after free in Canvas in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2628
Inappropriate implementation in Downloads in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2629
Incorrect security UI in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2630
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2631
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-24246
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows malicious users to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
Qpdf Project Qpdf 11.9.0
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-1597
pgjdbc, the PostgreSQL JDBC Driver, allows malicious user to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second ...
Postgresql Postgresql Jdbc Driver
Fedoraproject Fedora 40
NA
CVE-2024-1048
A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the tempora...
Gnu Grub2 -
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Fedoraproject Fedora 40
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »