Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chrome vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2024-1059
Use after free in Peer Connection in Google Chrome before 121.0.6167.139 allowed a remote malicious user to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2024-1060
Use after free in Canvas in Google Chrome before 121.0.6167.139 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2024-1077
Use after free in Network in Google Chrome before 121.0.6167.139 allowed a remote malicious user to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
7.5
CVSSv3
CVE-2024-0804
Insufficient policy enforcement in iOS Security UI in Google Chrome before 121.0.6167.85 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
4.3
CVSSv3
CVE-2024-0805
Inappropriate implementation in Downloads in Google Chrome before 121.0.6167.85 allowed a remote malicious user to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2024-0806
Use after free in Passwords in Google Chrome before 121.0.6167.85 allowed a remote malicious user to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2024-0807
Use after free in Web Audio in Google Chrome before 121.0.6167.85 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
9.8
CVSSv3
CVE-2024-0808
Integer underflow in WebUI in Google Chrome before 121.0.6167.85 allowed a remote malicious user to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
4.3
CVSSv3
CVE-2024-0809
Inappropriate implementation in Autofill in Google Chrome before 121.0.6167.85 allowed a remote malicious user to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 38
Fedoraproject Fedora 39
4.3
CVSSv3
CVE-2024-0810
Insufficient policy enforcement in DevTools in Google Chrome before 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Medium)
Google Chrome
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »