Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google security research vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-4352
Type confusion in V8 in Google Chrome before 116.0.5845.96 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Google Chrome
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
5.5
CVSSv3
CVE-2020-0009
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is ...
Google Android -
Debian Debian Linux 8.0
7.8
CVSSv3
CVE-2019-1999
In binder_alloc_free_page of binder_alloc.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. ...
Google Android -
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 19.04
1 EDB exploit
1 Article
8.8
CVSSv3
CVE-2018-0986
A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows D...
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Security Essentials -
Microsoft Forefront Endpoint Protection 2010 -
Microsoft Intune Endpoint Protection -
Microsoft System Center Endpoint Protection
Microsoft System Center Endpoint Protection 2012
Microsoft Windows Defender -
1 EDB exploit
2 Articles
5.5
CVSSv3
CVE-2017-8535
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 20...
Microsoft Windows Defender -
Microsoft Endpoint Protection -
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Forefront Endpoint Protection -
Microsoft Forefront Endpoint Protection 2010
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection -
Microsoft Windows Intune Endpoint Protection
1 EDB exploit
1 Article
5.5
CVSSv3
CVE-2017-8536
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 20...
Microsoft Windows Defender -
Microsoft Endpoint Protection -
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Forefront Endpoint Protection -
Microsoft Forefront Endpoint Protection 2010
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection -
Microsoft Windows Intune Endpoint Protection
1 EDB exploit
1 Article
5.5
CVSSv3
CVE-2017-8537
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 20...
Microsoft Windows Defender -
Microsoft Endpoint Protection -
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Forefront Endpoint Protection -
Microsoft Forefront Endpoint Protection 2010
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection -
Microsoft Windows Intune Endpoint Protection
1 EDB exploit
1 Article
8.8
CVSSv3
CVE-2020-16009
Inappropriate implementation in V8 in Google Chrome before 86.0.4240.183 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Microsoft Edge Chromium
Microsoft Edge
Cefsharp Cefsharp
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
2 Articles
7.8
CVSSv3
CVE-2018-6084
Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS before 66.0.3359.117 allowed a local malicious user to execute arbitrary code via an executable file.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
1 EDB exploit
5.5
CVSSv3
CVE-2023-20593
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an malicious user to potentially access sensitive information.
Xen Xen 4.15.0
Xen Xen 4.17.0
Xen Xen 4.16.0
Xen Xen 4.14.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Amd Ryzen 3 3100 Firmware -
Amd Ryzen 3 3300x Firmware -
Amd Ryzen 5 3500 Firmware -
Amd Ryzen 5 3500x Firmware -
Amd Ryzen 5 3600 Firmware -
Amd Ryzen 5 3600x Firmware -
Amd Ryzen 5 3600xt Firmware -
Amd Ryzen 7 3700x Firmware -
Amd Ryzen 7 3800x Firmware -
Amd Ryzen 7 3800xt Firmware -
Amd Ryzen 9 3900 Firmware -
Amd Ryzen 9 3900x Firmware -
Amd Ryzen 9 3900xt Firmware -
Amd Ryzen 9 3950x Firmware -
Amd Ryzen 9 Pro 3900 Firmware -
2 Github repositories
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »