Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 12.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-5472
Use after free in Profiles in Google Chrome before 118.0.5993.117 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 38
NA
CVE-2023-5631
Roundcube prior to 1.4.15, 1.5.x prior to 1.5.5, and 1.6.x prior to 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
Roundcube Webmail
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 39
1 Github repository
1 Article
NA
CVE-2023-45133
Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when ...
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Babeljs Babel 8.0.0
Babeljs Babel
Babeljs Babel-plugin-polyfill-regenerator
Babeljs Babel-plugin-polyfill-es-shims
Babeljs Babel-plugin-polyfill-corejs3
Babeljs Babel-plugin-polyfill-corejs2
Babeljs Babel-helper-define-polyfill-provider
Babeljs Babel-preset-env
Babeljs Babel-plugin-transform-runtime
2 Github repositories
NA
CVE-2023-5218
Use after free in Site Isolation in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
NA
CVE-2023-5473
Use after free in Cast in Google Chrome before 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5474
Heap buffer overflow in PDF in Google Chrome before 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5475
Inappropriate implementation in DevTools in Google Chrome before 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5476
Use after free in Blink History in Google Chrome before 118.0.5993.70 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5477
Inappropriate implementation in Installer in Google Chrome before 118.0.5993.70 allowed a local malicious user to bypass discretionary access control via a crafted command. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-5478
Inappropriate implementation in Autofill in Google Chrome before 118.0.5993.70 allowed a remote malicious user to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »