Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2024-2627
Use after free in Canvas in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
4.3
CVSSv3
CVE-2024-2628
Inappropriate implementation in Downloads in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
4.3
CVSSv3
CVE-2024-2631
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
8.8
CVSSv3
CVE-2024-2625
Object lifecycle issue in V8 in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
6.5
CVSSv3
CVE-2024-2626
Out of bounds read in Swiftshader in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
4.3
CVSSv3
CVE-2024-2629
Incorrect security UI in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
6.5
CVSSv3
CVE-2024-2630
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
5.5
CVSSv3
CVE-2024-24246
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows malicious users to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
Qpdf Project Qpdf 11.9.0
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
6.5
CVSSv3
CVE-2023-52160
The implementation of PEAP in wpa_supplicant up to and including 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can...
W1.fi Wpa Supplicant
Debian Debian Linux 10.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Fedoraproject Fedora 39
9.8
CVSSv3
CVE-2024-1597
pgjdbc, the PostgreSQL JDBC Driver, allows malicious user to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second ...
Postgresql Postgresql Jdbc Driver
Fedoraproject Fedora 40
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »