Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ui desktop vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-30579
Use after free in UI framework in Google Chrome before 92.0.4515.107 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
4.6
CVSSv2
CVE-2021-30594
Use after free in Page Info UI in Google Chrome before 92.0.4515.131 allowed a remote malicious user to potentially exploit heap corruption via physical access to the device.
Google Chrome
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
4.6
CVSSv2
CVE-2021-30597
Use after free in Browser UI in Google Chrome on Chrome before 92.0.4515.131 allowed a remote malicious user to potentially exploit heap corruption via physical access to the device.
Google Chrome
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
4.3
CVSSv2
CVE-2021-30596
Incorrect security UI in Navigation in Google Chrome on Android before 92.0.4515.131 allowed a remote malicious user to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
4.3
CVSSv2
CVE-2020-6502
Incorrect implementation in permissions in Google Chrome before 80.0.3987.87 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
NA
CVE-2024-2628
Inappropriate implementation in Downloads in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-1676
Inappropriate implementation in Navigation in Google Chrome before 122.0.6261.57 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
NA
CVE-2024-2631
Inappropriate implementation in iOS in Google Chrome before 123.0.6312.58 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Fedoraproject Fedora 40
NA
CVE-2024-3844
Inappropriate implementation in Extensions in Google Chrome before 124.0.6367.60 allowed a remote malicious user to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)
NA
CVE-2024-3843
Insufficient data validation in Downloads in Google Chrome before 124.0.6367.60 allowed a remote malicious user to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »