Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux desktop vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-5218
Use after free in Site Isolation in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2023-5473
Use after free in Cast in Google Chrome before 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5474
Heap buffer overflow in PDF in Google Chrome before 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5475
Inappropriate implementation in DevTools in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5476
Use after free in Blink History in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5477
Inappropriate implementation in Installer in Google Chrome before 118.0.5993.70 allowed a local malicious user to bypass discretionary access control via a crafted command. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5478
Inappropriate implementation in Autofill in Google Chrome before 118.0.5993.70 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5479
Inappropriate implementation in Extensions API in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5481
Inappropriate implementation in Downloads in Google Chrome before 118.0.5993.70 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5483
Inappropriate implementation in Intents in Google Chrome before 118.0.5993.70 allowed a remote malicious user to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »