Export limit exceeded: 343363 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (5376 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-5158 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 8.1 High
Type Confusion in V8 in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to potentially perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2024-4949 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 6.5 Medium
Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-4948 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 6.5 Medium
Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-4559 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 7.5 High
Heap buffer overflow in WebAudio in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-4331 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 8.8 High
Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-3914 2 Fedoraproject, Google 3 Fedora, Chrome, V8 2025-02-13 8.8 High
Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-3847 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 9.8 Critical
Insufficient policy enforcement in WebUI in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-3846 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 5.4 Medium
Inappropriate implementation in Prompts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-3845 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 9.8 Critical
Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass mixed content policy via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-3844 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 4.3 Medium
Inappropriate implementation in Extensions in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)
CVE-2024-3843 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 4.6 Medium
Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3841 3 Fedoraproject, Google, Microsoft 3 Fedora, Chrome, Windows 2025-02-13 7.6 High
Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to inject scripts or HTML into a privileged page via a malicious file. (Chromium security severity: Medium)
CVE-2024-3840 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 6.5 Medium
Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3833 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 8.8 High
Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-35200 2 F5, Fedoraproject 4 Nginx, Nginx Open Source, Nginx Plus and 1 more 2025-02-13 5.3 Medium
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.
CVE-2024-3515 2 Fedoraproject, Google 2 Fedora, Chrome 2025-02-13 3.7 Low
Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-34161 2 F5, Fedoraproject 4 Nginx, Nginx Open Source, Nginx Plus and 1 more 2025-02-13 5.3 Medium
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.
CVE-2024-32760 2 F5, Fedoraproject 4 Nginx, Nginx Open Source, Nginx Plus and 1 more 2025-02-13 6.5 Medium
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encoder instructions can cause NGINX worker processes to terminate or cause or other potential impact.
CVE-2024-32662 3 Fedoraproject, Freerdp, Redhat 3 Fedora, Freerdp, Enterprise Linux 2025-02-13 7.5 High
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32041 3 Fedoraproject, Freerdp, Redhat 3 Fedora, Freerdp, Enterprise Linux 2025-02-13 9.8 Critical
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.