Vulnerabilities > Fedoraproject
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-23 | CVE-2023-4430 | Use After Free vulnerability in multiple products Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-08-23 | CVE-2023-4431 | Out-of-bounds Read vulnerability in multiple products Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 8.1 |
2023-08-22 | CVE-2020-27418 | Use After Free vulnerability in Fedoraproject Fedora Linux Kernel 5.9.0 A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function. | 4.4 |
2023-08-22 | CVE-2021-29390 | Out-of-bounds Write vulnerability in multiple products libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c. | 7.1 |
2023-08-22 | CVE-2022-48064 | Allocation of Resources Without Limits or Throttling vulnerability in multiple products GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. | 5.5 |
2023-08-22 | CVE-2022-48065 | Memory Leak vulnerability in multiple products GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c. | 5.5 |
2023-08-22 | CVE-2022-48541 | Memory Leak vulnerability in multiple products A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the "identify -help" command. | 7.1 |
2023-08-16 | CVE-2023-20197 | Infinite Loop vulnerability in multiple products A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. | 7.5 |
2023-08-15 | CVE-2023-4349 | Use After Free vulnerability in multiple products Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-08-15 | CVE-2023-4350 | Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 6.5 |