Vulnerabilities > Fedoraproject > Fedora > 39
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-25 | CVE-2023-40587 | Pyramid is an open source Python web framework. | 5.3 |
2023-08-23 | CVE-2023-4427 | Out-of-bounds Read vulnerability in multiple products Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 8.1 |
2023-08-23 | CVE-2023-4428 | Out-of-bounds Read vulnerability in multiple products Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 8.1 |
2023-08-23 | CVE-2023-4429 | Use After Free vulnerability in multiple products Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-08-23 | CVE-2023-4430 | Use After Free vulnerability in multiple products Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-08-23 | CVE-2023-4431 | Out-of-bounds Read vulnerability in multiple products Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 8.1 |
2023-08-22 | CVE-2021-29390 | Out-of-bounds Write vulnerability in multiple products libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c. | 7.1 |
2023-08-22 | CVE-2022-48065 | Memory Leak vulnerability in multiple products GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c. | 5.5 |
2023-08-22 | CVE-2022-48541 | Memory Leak vulnerability in multiple products A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the "identify -help" command. | 7.1 |
2023-08-11 | CVE-2022-27635 | Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |