Vulnerabilities > Fedoraproject > Fedora > 40

DATE CVE VULNERABILITY TITLE RISK
2024-04-15 CVE-2024-31497 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in multiple products
In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures.
5.9
2024-04-10 CVE-2024-3157 Out-of-bounds Write vulnerability in multiple products
Out of bounds memory access in Compositing in Google Chrome prior to 123.0.6312.122 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via specific UI gestures.
network
low complexity
google fedoraproject CWE-787
critical
9.6
2024-04-10 CVE-2024-3515 Use After Free vulnerability in multiple products
Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
6.5
2024-04-10 CVE-2024-3516 Out-of-bounds Write vulnerability in multiple products
Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-787
6.5
2024-04-04 CVE-2024-27316 HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response.
network
low complexity
apache fedoraproject netapp
7.5
2024-04-04 CVE-2024-30260 Incorrect Authorization vulnerability in multiple products
Undici is an HTTP/1.1 client, written from scratch for Node.js.
network
low complexity
nodejs fedoraproject CWE-863
4.3
2024-04-04 CVE-2024-30261 Undici is an HTTP/1.1 client, written from scratch for Node.js.
network
low complexity
nodejs fedoraproject
3.5
2024-04-02 CVE-2024-3209 A vulnerability was found in UPX up to 4.2.2.
network
low complexity
upx fedoraproject
critical
9.8
2024-03-26 CVE-2024-2883 Use After Free vulnerability in multiple products
Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2024-03-26 CVE-2024-2885 Use After Free vulnerability in multiple products
Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8