Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux desktop vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-5478
Inappropriate implementation in Autofill in Google Chrome before 118.0.5993.70 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5479
Inappropriate implementation in Extensions API in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5481
Inappropriate implementation in Downloads in Google Chrome before 118.0.5993.70 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5483
Inappropriate implementation in Intents in Google Chrome before 118.0.5993.70 allowed a remote malicious user to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5484
Inappropriate implementation in Navigation in Google Chrome before 118.0.5993.70 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5485
Inappropriate implementation in Autofill in Google Chrome before 118.0.5993.70 allowed a remote malicious user to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5486
Inappropriate implementation in Input in Google Chrome before 118.0.5993.70 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5218
Use after free in Site Isolation in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2023-43641
libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved t...
Lipnitsk Libcue
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
1 Github repository
1 Article
NA
CVE-2023-43799
Altair is a GraphQL Client. Prior to version 5.2.5, the Altair GraphQL Client Desktop Application does not sanitize external URLs before passing them to the underlying system. Moreover, Altair GraphQL Client also does not isolate the context of the renderer process. This affects ...
Altairgraphql Altair
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »