Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chromium chromium vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-38082
Microsoft Edge (Chromium-based) Spoofing Vulnerability
NA
CVE-2024-38093
Microsoft Edge (Chromium-based) Spoofing Vulnerability
NA
CVE-2024-30058
Microsoft Edge (Chromium-based) Spoofing Vulnerability
NA
CVE-2024-38083
Microsoft Edge (Chromium-based) Spoofing Vulnerability
NA
CVE-2024-5830
Type Confusion in V8 in Google Chrome before 126.0.6478.54 allowed a remote malicious user to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5831
Use after free in Dawn in Google Chrome before 126.0.6478.54 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5832
Use after free in Dawn in Google Chrome before 126.0.6478.54 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5833
Type Confusion in V8 in Google Chrome before 126.0.6478.54 allowed a remote malicious user to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5834
Inappropriate implementation in Dawn in Google Chrome before 126.0.6478.54 allowed a remote malicious user to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5835
Heap buffer overflow in Tab Groups in Google Chrome before 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2023-38506
CVE-2024-37198
CVE-2023-45197
CVE-2024-38621
CVE-2024-30103
elevation of privilege
CVE-2024-0044
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »