Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux desktop vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-5218
Use after free in Site Isolation in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
6.3
CVSSv3
CVE-2023-5473
Use after free in Cast in Google Chrome before 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
8.8
CVSSv3
CVE-2023-5474
Heap buffer overflow in PDF in Google Chrome before 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
6.5
CVSSv3
CVE-2023-5475
Inappropriate implementation in DevTools in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Debian Debian Linux 11.0
Debian Debian Linux 12.0
8.8
CVSSv3
CVE-2023-5476
Use after free in Blink History in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
4.3
CVSSv3
CVE-2023-5477
Inappropriate implementation in Installer in Google Chrome before 118.0.5993.70 allowed a local malicious user to bypass discretionary access control via a crafted command. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
4.3
CVSSv3
CVE-2023-5478
Inappropriate implementation in Autofill in Google Chrome before 118.0.5993.70 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
6.5
CVSSv3
CVE-2023-5479
Inappropriate implementation in Extensions API in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
6.5
CVSSv3
CVE-2023-5481
Inappropriate implementation in Downloads in Google Chrome before 118.0.5993.70 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
6.5
CVSSv3
CVE-2023-5483
Inappropriate implementation in Intents in Google Chrome before 118.0.5993.70 allowed a remote malicious user to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »