Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedora vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2020-6518
Use after free in developer tools in Google Chrome before 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.2
Opensuse Backports Sle 15.0
828
VMScore
CVE-2020-6520
Buffer overflow in Skia in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
828
VMScore
CVE-2020-6523
Out of bounds write in Skia in Google Chrome before 84.0.4147.89 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Debian Debian Linux 10.0
Opensuse Leap 15.1
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.2
Opensuse Backports Sle 15.0
828
VMScore
CVE-2019-14889
A flaw was found with the libssh API function ssh_scp_new() in versions prior to 0.9.3 and prior to 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way w...
Libssh Libssh
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 19.10
Opensuse Leap 15.1
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 8.0
Oracle Mysql Workbench
1 Github repository
828
VMScore
CVE-2019-18425
An issue exists in Xen up to and including 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table ...
Xen Xen
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Opensuse Leap 15.0
828
VMScore
CVE-2019-2126
In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Version...
Google Android 7.1.2
Google Android 7.0
Google Android 8.0
Google Android 7.1.1
Google Android 8.1
Google Android 9.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 19.04
Opensuse Leap 15.1
828
VMScore
CVE-2019-7443
KDE KAuth prior to 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth uninten...
Kde Kauth
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Backports -
Fedoraproject Fedora 28
Fedoraproject Fedora 29
828
VMScore
CVE-2016-6299
The scm plug-in in mock might allow malicious users to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file.
Fedoraproject Fedora 25
Fedoraproject Fedora 24
Fedoraproject Fedora 23
Mock Project Scm Plugin -
828
VMScore
CVE-2015-8106
Format string vulnerability in the CmdKeywords function in funct1.c in latex2rtf prior to 2.3.10 allows remote malicious users to execute arbitrary code via format string specifiers in the \keywords command in a crafted TeX file.
Latex2rtf Project Latex2rtf 2.3.8
Fedoraproject Fedora 22
Fedoraproject Fedora 24
Fedoraproject Fedora 23
828
VMScore
CVE-2015-8540
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 up to and including 0.99, 1.0.x prior to 1.0.66, 1.1.x and 1.2.x prior to 1.2.56, 1.3.x and 1.4.x prior to 1.4.19, and 1.5.x prior to 1.5.26 allows remote malicious users to have unspecified impact v...
Redhat Enterprise Linux Desktop Supplementary 6.0
Redhat Enterprise Linux Server Supplementary 6.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Workstation Supplementary 6.0
Redhat Enterprise Linux Server Supplementary 5.0
Redhat Enterprise Linux Desktop Supplementary 5.0
Libpng Libpng 1.2.14
Libpng Libpng 1.2.45
Libpng Libpng 1.2.46
Libpng Libpng 1.2.33
Libpng Libpng 1.2.16
Libpng Libpng 1.2.35
Libpng Libpng 1.2.29
Libpng Libpng 1.2.26
Libpng Libpng 1.2.54
Libpng Libpng 1.2.7
Libpng Libpng 1.2.43
Libpng Libpng 1.2.2
Libpng Libpng 1.2.4
Libpng Libpng 1.2.22
Libpng Libpng 1.2.39
Libpng Libpng 1.2.48
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »