Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 15 vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2019-5813
Use after free in V8 in Google Chrome before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle-15
Opensuse Leap 15.1
383
VMScore
CVE-2019-5814
Insufficient policy enforcement in Blink in Google Chrome before 74.0.3729.108 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports Sle-15
Opensuse Leap 15.1
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
383
VMScore
CVE-2019-5818
Uninitialized data in media in Google Chrome before 74.0.3729.108 allowed a remote malicious user to obtain potentially sensitive information from process memory via a crafted video file.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports Sle-15
Opensuse Leap 15.1
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
392
VMScore
CVE-2019-5819
Insufficient data validation in developer tools in Google Chrome on OS X before 74.0.3729.108 allowed a local malicious user to execute arbitrary code via a crafted string copied to clipboard.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports Sle-15
Opensuse Leap 15.1
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Debian Debian Linux 10.0
605
VMScore
CVE-2019-5820
Integer overflow in PDFium in Google Chrome before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports Sle-15
Opensuse Leap 15.1
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
605
VMScore
CVE-2019-5821
Integer overflow in PDFium in Google Chrome before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
606
VMScore
CVE-2019-5822
Inappropriate implementation in Blink in Google Chrome before 74.0.3729.108 allowed a remote malicious user to bypass same origin policy via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
516
VMScore
CVE-2019-5823
Insufficient policy enforcement in service workers in Google Chrome before 74.0.3729.108 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle-15
Opensuse Leap 15.1
605
VMScore
CVE-2019-5824
Parameter passing error in media in Google Chrome before 74.0.3729.131 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
605
VMScore
CVE-2019-5828
Object lifecycle issue in ServiceWorker in Google Chrome before 75.0.3770.80 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »