Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
morgan vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2021-21141
Insufficient policy enforcement in File System API in Google Chrome before 88.0.4324.96 allowed a remote malicious user to bypass file extension policy via a crafted HTML page.
Google Chrome
Microsoft Edge
9.6
CVSSv3
CVE-2021-21142
Use after free in Payments in Google Chrome on Mac before 88.0.4324.146 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2021-21145
Use after free in Fonts in Google Chrome before 88.0.4324.146 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
4.3
CVSSv3
CVE-2021-21147
Inappropriate implementation in Skia in Google Chrome before 88.0.4324.146 allowed a local malicious user to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2021-21119
Use after free in Media in Google Chrome before 88.0.4324.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
9.6
CVSSv3
CVE-2021-21124
Potential user after free in Speech Recognizer in Google Chrome on Android before 88.0.4324.96 allowed a remote malicious user to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
8.8
CVSSv3
CVE-2021-21143
Heap buffer overflow in Extensions in Google Chrome before 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2021-21144
Heap buffer overflow in Tab Groups in Google Chrome before 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
9.6
CVSSv3
CVE-2021-21146
Use after free in Navigation in Google Chrome before 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 32
Fedoraproject Fedora 33
7.8
CVSSv3
CVE-2023-23583
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Intel Core I3-10100y Firmware -
Intel Core I3-10110u Firmware -
Intel Core I3-10110y Firmware -
Intel Core I3-1005g1 Firmware -
Intel Core I5-10500h Firmware -
Intel Core I5-10200h Firmware -
Intel Core I5-10310u Firmware -
Intel Core I5-10300h Firmware -
Intel Core I5-10400h Firmware -
Intel Core I5-10210u Firmware -
Intel Core I5-10210y Firmware -
Intel Core I5-10310y Firmware -
Intel Core I5-1035g1 Firmware -
Intel Core I5-1035g4 Firmware -
Intel Core I5-1035g7 Firmware -
Intel Core I7-10870h Firmware -
Intel Core I7-10610u Firmware -
Intel Core I7-10810u Firmware -
Intel Core I7-10750h Firmware -
Intel Core I7-10850h Firmware -
Intel Core I7-10875h Firmware -
Intel Core I7-10510u Firmware -
2 Github repositories
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »