Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux desktop vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-4902
Inappropriate implementation in Input in Google Chrome before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4903
Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4904
Insufficient policy enforcement in Downloads in Google Chrome before 117.0.5938.62 allowed a remote malicious user to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4905
Inappropriate implementation in Prompts in Google Chrome before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4906
Insufficient policy enforcement in Autofill in Google Chrome before 117.0.5938.62 allowed a remote malicious user to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4907
Inappropriate implementation in Intents in Google Chrome on Android before 117.0.5938.62 allowed a remote malicious user to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4908
Inappropriate implementation in Picture in Picture in Google Chrome before 117.0.5938.62 allowed a remote malicious user to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-4909
Inappropriate implementation in Interstitials in Google Chrome before 117.0.5938.62 allowed a remote malicious user to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
NA
CVE-2023-39208
Improper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access.
Zoom Zoom
NA
CVE-2023-4863
Heap buffer overflow in libwebp in Google Chrome before 116.0.5845.187 and libwebp 1.3.2 allowed a remote malicious user to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Mozilla Firefox
Mozilla Thunderbird
Mozilla Firefox Esr
Microsoft Edge
Webmproject Libwebp
22 Github repositories
5 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »