Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 38 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-39358
Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability exists which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file....
Cacti Cacti
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2023-39359
Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability exists which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `graphs.php` file. When ...
Cacti Cacti
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2023-39366
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by admini...
Cacti Cacti
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2024-0222
Use after free in ANGLE in Google Chrome before 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2024-0223
Heap buffer overflow in ANGLE in Google Chrome before 120.0.6099.199 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2024-0224
Use after free in WebAudio in Google Chrome before 120.0.6099.199 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2024-0225
Use after free in WebGPU in Google Chrome before 120.0.6099.199 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2024-1077
Use after free in Network in Google Chrome before 121.0.6167.139 allowed a remote malicious user to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2024-1283
Heap buffer overflow in Skia in Google Chrome before 121.0.6167.160 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2024-1284
Use after free in Mojo in Google Chrome before 121.0.6167.160 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »