Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 12.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-2879
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
Wireshark Wireshark
Debian Debian Linux 10.0
Debian Debian Linux 12.0
NA
CVE-2023-4763
Use after free in Networks in Google Chrome before 116.0.5845.179 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4764
Incorrect security UI in BFCache in Google Chrome before 116.0.5845.179 allowed a remote malicious user to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-41900
Jetty is a Java based web server and servlet engine. Versions 9.4.21 up to and including 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an alre...
Eclipse Jetty
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5473
Use after free in Cast in Google Chrome before 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5474
Heap buffer overflow in PDF in Google Chrome before 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5476
Use after free in Blink History in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5477
Inappropriate implementation in Installer in Google Chrome before 118.0.5993.70 allowed a local malicious user to bypass discretionary access control via a crafted command. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5478
Inappropriate implementation in Autofill in Google Chrome before 118.0.5993.70 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5479
Inappropriate implementation in Extensions API in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »