Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 11.0 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-6112
Use after free in Navigation in Google Chrome before 119.0.6045.159 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2023-5997
Use after free in Garbage Collection in Google Chrome before 119.0.6045.159 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 11.0
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-23583
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Intel Core I3-10100y Firmware -
Intel Core I3-10110u Firmware -
Intel Core I3-10110y Firmware -
Intel Core I3-1005g1 Firmware -
Intel Core I5-10500h Firmware -
Intel Core I5-10200h Firmware -
Intel Core I5-10310u Firmware -
Intel Core I5-10300h Firmware -
Intel Core I5-10400h Firmware -
Intel Core I5-10210u Firmware -
Intel Core I5-10210y Firmware -
Intel Core I5-10310y Firmware -
Intel Core I5-1035g1 Firmware -
Intel Core I5-1035g4 Firmware -
Intel Core I5-1035g7 Firmware -
Intel Core I7-10870h Firmware -
Intel Core I7-10610u Firmware -
Intel Core I7-10810u Firmware -
Intel Core I7-10750h Firmware -
Intel Core I7-10850h Firmware -
Intel Core I7-10875h Firmware -
Intel Core I7-10510u Firmware -
2 Github repositories
1 Article
8.8
CVSSv3
CVE-2023-5996
Use after free in WebAudio in Google Chrome before 119.0.6045.123 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 38
Fedoraproject Fedora 39
6.1
CVSSv3
CVE-2023-47272
Roundcube 1.5.x prior to 1.5.6 and 1.6.x prior to 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download).
Roundcube Webmail
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
6.1
CVSSv3
CVE-2023-5480
Inappropriate implementation in Payments in Google Chrome before 119.0.6045.105 allowed a remote malicious user to bypass XSS preventions via a malicious file. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2023-5482
Insufficient data validation in USB in Google Chrome before 119.0.6045.105 allowed a remote malicious user to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2023-5852
Use after free in Printing in Google Chrome before 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2023-5854
Use after free in Profiles in Google Chrome before 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
8.8
CVSSv3
CVE-2023-5849
Integer overflow in USB in Google Chrome before 119.0.6045.105 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »