Vulnerabilities > Fedoraproject > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-06-04 | CVE-2021-30515 | Use After Free vulnerability in multiple products Use after free in File API in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2021-06-04 | CVE-2021-30516 | Out-of-bounds Write vulnerability in multiple products Heap buffer overflow in History in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2021-06-04 | CVE-2021-30517 | Type Confusion vulnerability in multiple products Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2021-06-04 | CVE-2021-30518 | Out-of-bounds Write vulnerability in multiple products Heap buffer overflow in Reader Mode in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2021-06-04 | CVE-2021-30519 | Use After Free vulnerability in multiple products Use after free in Payments in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious payments app to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2021-06-04 | CVE-2021-30520 | Use After Free vulnerability in multiple products Use after free in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2021-06-04 | CVE-2021-28091 | Improper Verification of Cryptographic Signature vulnerability in multiple products Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature. | 7.5 |
2021-06-02 | CVE-2021-32625 | Integer Overflow or Wraparound vulnerability in multiple products Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. | 8.8 |
2021-06-02 | CVE-2021-28676 | Infinite Loop vulnerability in multiple products An issue was discovered in Pillow before 8.2.0. | 7.5 |
2021-06-02 | CVE-2021-28677 | An issue was discovered in Pillow before 8.2.0. | 7.5 |