Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedora vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2019-14745
In radare2 prior to 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to improper handling ...
Radare Radare2
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Fedoraproject Fedora 31
1 Github repository
410
VMScore
CVE-2021-31607
In SaltStack Salt 2016.9 up to and including 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master...
Saltstack Salt
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
605
VMScore
CVE-2008-2575
cbrPager prior to 0.9.17 allows user-assisted remote malicious users to execute arbitrary commands via shell metacharacters in a (1) ZIP (aka .cbz) or (2) RAR (aka .cbr) archive filename.
Jcoppens Cbrpager
Fedoraproject Fedora 9
Fedoraproject Fedora 8
Fedoraproject Fedora 7
NA
CVE-2022-3123
Cross-site Scripting (XSS) - Reflected in GitHub repository splitbrain/dokuwiki before 2022-07-31a.
Dokuwiki Dokuwiki
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
445
VMScore
CVE-2021-27923
Pillow prior to 8.1.1 allows malicious users to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
Python Pillow
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
NA
CVE-2024-2625
Object lifecycle issue in V8 in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2626
Out of bounds read in Swiftshader in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2627
Use after free in Canvas in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2628
Inappropriate implementation in Downloads in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-2629
Incorrect security UI in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »