Vulnerabilities > Fedoraproject > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-16 | CVE-2023-2722 | Use After Free vulnerability in multiple products Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-05-16 | CVE-2023-2723 | Use After Free vulnerability in multiple products Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-05-16 | CVE-2023-2724 | Type Confusion vulnerability in multiple products Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-05-16 | CVE-2023-2725 | Use After Free vulnerability in multiple products Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-05-16 | CVE-2023-2726 | Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. | 8.8 |
2023-05-09 | CVE-2023-2156 | Reachable Assertion vulnerability in multiple products A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. | 7.5 |
2023-05-09 | CVE-2023-31490 | An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function. | 7.5 |
2023-05-09 | CVE-2023-31137 | Integer Underflow (Wrap or Wraparound) vulnerability in multiple products MaraDNS is open-source software that implements the Domain Name System (DNS). | 7.5 |
2023-05-03 | CVE-2023-2460 | Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. | 7.1 |
2023-05-03 | CVE-2023-2461 | Use After Free vulnerability in multiple products Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. | 8.8 |