Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-1868
This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
NA
CVE-2024-1867
This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
NA
CVE-2024-35140
IBM Security Verify Access Docker 10.0.0 up to and including 10.0.6 could allow a local user to escalate their privileges due to improper certificate validation. IBM X-Force ID: 292416.
NA
CVE-2024-35142
IBM Security Verify Access Docker 10.0.0 up to and including 10.0.6 could allow a local user to escalate their privileges due to execution of unnecessary privileges. IBM X-Force ID: 292418.
NA
CVE-2024-22338
IBM Security Verify Access OIDC Provider 22.09 up to and including 23.03 could disclose sensitive information to a local user due to hazardous input validation. IBM X-Force ID: 279978.
NA
CVE-2024-5494
Use after free in Dawn in Google Chrome before 125.0.6422.141 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5495
Use after free in Dawn in Google Chrome before 125.0.6422.141 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5496
Use after free in Media Session in Google Chrome before 125.0.6422.141 allowed a remote malicious user to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5497
Out of bounds memory access in Keyboard Inputs in Google Chrome before 125.0.6422.141 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
NA
CVE-2024-5498
Use after free in Presentation API in Google Chrome before 125.0.6422.141 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »