Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chromium chromium vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-1205
Multiple unspecified vulnerabilities in Google Chrome prior to 40.0.2214.91 allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Google Chrome
Chromium Chromium
8.8
CVSSv3
CVE-2023-1531
Use after free in ANGLE in Google Chrome before 111.0.5563.110 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Chromium Chromium 112.0.5592.0
8.8
CVSSv3
CVE-2021-31982
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge Chromium
8.3
CVSSv3
CVE-2022-30127
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge Chromium
8.3
CVSSv3
CVE-2022-30128
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge Chromium
8.3
CVSSv3
CVE-2022-33636
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Microsoft Edge Chromium
1 Article
9.6
CVSSv3
CVE-2022-33649
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge Chromium
1 Article
5.7
CVSSv3
CVE-2023-28261
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge Chromium
6.1
CVSSv3
CVE-2023-28286
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge Chromium
7.5
CVSSv3
CVE-2022-29144
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge Chromium
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »