Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2024-2625
Object lifecycle issue in V8 in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
6.5
CVSSv3
CVE-2024-2626
Out of bounds read in Swiftshader in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
8.8
CVSSv3
CVE-2024-2627
Use after free in Canvas in Google Chrome before 123.0.6312.58 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
4.3
CVSSv3
CVE-2024-2628
Inappropriate implementation in Downloads in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
4.3
CVSSv3
CVE-2024-2629
Incorrect security UI in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
6.5
CVSSv3
CVE-2024-2630
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
4.3
CVSSv3
CVE-2024-2631
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
5.5
CVSSv3
CVE-2024-24246
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows malicious users to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
Qpdf Project Qpdf 11.9.0
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
6.5
CVSSv3
CVE-2023-52160
The implementation of PEAP in wpa_supplicant up to and including 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can...
W1.fi Wpa Supplicant
Debian Debian Linux 10.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Fedoraproject Fedora 39
9.8
CVSSv3
CVE-2024-1597
pgjdbc, the PostgreSQL JDBC Driver, allows malicious user to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second ...
Postgresql Postgresql Jdbc Driver
Fedoraproject Fedora 40
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »