Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fedoraproject fedora 37 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-4155
A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the ...
Linux Linux Kernel -
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2023-4900
Inappropriate implementation in Custom Tabs in Google Chrome on Android before 117.0.5938.62 allowed a remote malicious user to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4901
Inappropriate implementation in Prompts in Google Chrome before 117.0.5938.62 allowed a remote malicious user to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4902
Inappropriate implementation in Input in Google Chrome before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4903
Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4904
Insufficient policy enforcement in Downloads in Google Chrome before 117.0.5938.62 allowed a remote malicious user to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4905
Inappropriate implementation in Prompts in Google Chrome before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4906
Insufficient policy enforcement in Autofill in Google Chrome before 117.0.5938.62 allowed a remote malicious user to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4907
Inappropriate implementation in Intents in Google Chrome on Android before 117.0.5938.62 allowed a remote malicious user to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4908
Inappropriate implementation in Picture in Picture in Google Chrome before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »