CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.7%
chromium is vulnerable to Use After Free. The vulnerability exists in the Navigation component, potentially allowing an attacker to exploit heap corruption via a maliciously crafted HTML page.
packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
crbug.com/1499298
lists.fedoraproject.org/archives/list/[email protected]/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
lists.fedoraproject.org/archives/list/[email protected]/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
lists.fedoraproject.org/archives/list/[email protected]/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
security-tracker.debian.org/tracker/CVE-2023-6112
security.gentoo.org/glsa/202311-11
security.gentoo.org/glsa/202312-07
security.gentoo.org/glsa/202401-34
www.debian.org/security/2023/dsa-5556
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.7%