Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chrome os vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-2461
Use after free in OS Inputs in Google Chrome on ChromeOS before 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Fedoraproject Fedora 38
8.8
CVSSv3
CVE-2023-0128
Use after free in Overview Mode in Google Chrome on Chrome OS before 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
8.8
CVSSv3
CVE-2023-0137
Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS before 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Google Chrome
8.8
CVSSv3
CVE-2022-2742
Use after free in Exosphere in Google Chrome on Chrome OS and Lacros before 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chrome security severity: High)
Google Chrome
8.8
CVSSv3
CVE-2022-2743
Integer overflow in Window Manager in Google Chrome on Chrome OS and Lacros before 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific UI interactions to perform an out of bounds memory write via crafted UI interactions. (Chrome security severity: H...
Google Chrome
Google Chrome Os -
Google Linux And Chrome Os -
8.8
CVSSv3
CVE-2022-4176
Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros before 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)
Google Chrome
8.8
CVSSv3
CVE-2022-3658
Use after free in Feedback service on Chrome OS in Google Chrome on Chrome OS before 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
Google Chrome
8.8
CVSSv3
CVE-2022-3659
Use after free in Accessibility in Google Chrome on Chrome OS before 107.0.5304.62 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: Medium)
Google Chrome
8.8
CVSSv3
CVE-2022-3042
Use after free in PhoneHub in Google Chrome on Chrome OS before 105.0.5195.52 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 37
8.8
CVSSv3
CVE-2022-3043
Heap buffer overflow in Screen Capture in Google Chrome on Chrome OS before 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Fedora 37
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »