CVE-2023-3730
Debian Security Advisory 5456-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
El use-after-free en Grupos de Pestañas en Google Chrome antes de 115.0.5790.98 permitió a un atacante remoto que convenció a un usuario a participar en interacciones específicas de interfaz de usuario para explotar potencialmente la corrupción del montículo a través de una página HTML manipulada. (Gravedad de seguridad de Chromium: Alta)
Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. Versions greater than or equal to 120.0.6099.109 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-07-18 CVE Reserved
- 2023-07-20 CVE Published
- 2025-02-13 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ |
|
|
https://security.gentoo.org/glsa/202401-34 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2024-01-31 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 115.0.5790.98 Search vendor "Google" for product "Chrome" and version " < 115.0.5790.98" | - |
Affected
|