Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 15 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2019-5836
Heap buffer overflow in ANGLE in Google Chrome before 75.0.3770.80 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
4.3
CVSSv2
CVE-2019-5837
Resource size information leakage in Blink in Google Chrome before 75.0.3770.80 allowed a remote malicious user to leak cross-origin data via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
4.3
CVSSv2
CVE-2019-5838
Insufficient policy enforcement in extensions API in Google Chrome before 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports Sle-15
Opensuse Leap 15.1
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Debian Debian Linux 10.0
4.3
CVSSv2
CVE-2019-5839
Excessive data validation in URL parser in Google Chrome before 75.0.3770.80 allowed a remote attacker who convinced a user to input a URL to bypass website URL validation via a crafted URL.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle-15
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
4.3
CVSSv2
CVE-2019-5840
Incorrect security UI in popup blocker in Google Chrome on iOS before 75.0.3770.80 allowed a remote malicious user to bypass navigation restrictions via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle-15
4.3
CVSSv2
CVE-2019-5805
Use-after-free in PDFium in Google Chrome before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted PDF file.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle-15
Opensuse Leap 15.1
6.8
CVSSv2
CVE-2019-5806
Integer overflow in ANGLE in Google Chrome on Windows before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle-15
Opensuse Leap 15.1
6.8
CVSSv2
CVE-2019-5807
Object lifetime issue in V8 in Google Chrome before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle-15
Opensuse Leap 15.1
6.8
CVSSv2
CVE-2019-5808
Use after free in Blink in Google Chrome before 74.0.3729.108 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 42.3
Debian Debian Linux 10.0
Opensuse Leap 15.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle-15
Opensuse Leap 15.1
4.3
CVSSv2
CVE-2019-5818
Uninitialized data in media in Google Chrome before 74.0.3729.108 allowed a remote malicious user to obtain potentially sensitive information from process memory via a crafted video file.
Google Chrome
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports Sle-15
Opensuse Leap 15.1
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »