Google Chrome is a web browser from Google, Inc. A code issue vulnerability exists in versions prior to Google Chrome 111.0.5563.64, which stems from a weak policy enforcement issue in the Web Payments API component. The vulnerability can be exploited by remote attackers to bypass navigation restrictions via crafted HTML pages.
{"ubuntucve": [{"lastseen": "2023-06-04T13:12:16", "description": "Insufficient policy enforcement in Web Payments API in Google Chrome prior\nto 111.0.5563.64 allowed a remote attacker to bypass navigation\nrestrictions via a crafted HTML page. (Chromium security severity: Medium)\n\n#### Notes\n\nAuthor| Note \n---|--- \n[alexmurray](<https://launchpad.net/~alexmurray>) | The Debian chromium source package is called chromium-browser in Ubuntu \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | starting with Ubuntu 19.10, the chromium-browser package is just a script that installs the Chromium snap\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-03-07T00:00:00", "type": "ubuntucve", "title": "CVE-2023-1224", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1224"], "modified": "2023-03-07T00:00:00", "id": "UB:CVE-2023-1224", "href": "https://ubuntu.com/security/CVE-2023-1224", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2023-06-04T17:35:01", "description": "Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-03-07T22:15:00", "type": "cve", "title": "CVE-2023-1224", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1224"], "modified": "2023-03-11T02:38:00", "cpe": [], "id": "CVE-2023-1224", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1224", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "debiancve": [{"lastseen": "2023-06-04T18:09:46", "description": "Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-03-07T22:15:00", "type": "debiancve", "title": "CVE-2023-1224", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1224"], "modified": "2023-03-07T22:15:00", "id": "DEBIANCVE:CVE-2023-1224", "href": "https://security-tracker.debian.org/tracker/CVE-2023-1224", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "veracode": [{"lastseen": "2023-06-04T19:58:35", "description": "Google Chrome is vulnerable to Authentication Bypass. The vulnerability exists due to the insufficient policy enforcement in Web Payments API, which allows an attacker to bypass navigation restrictions via a crafted HTML page. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-03-18T13:47:28", "type": "veracode", "title": "Authentication Bypass", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1224"], "modified": "2023-03-20T01:53:29", "id": "VERACODE:39850", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-39850/summary", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "mscve": [{"lastseen": "2023-06-04T18:33:07", "description": "This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](<https://chromereleases.googleblog.com/2023>) for more information.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-03-13T07:00:00", "type": "mscve", "title": "Chromium: CVE-2023-1224 Insufficient policy enforcement in Web Payments API", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1224"], "modified": "2023-03-13T07:00:00", "id": "MS:CVE-2023-1224", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-1224", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2023-05-23T15:11:51", "description": "The version of Microsoft Edge installed on the remote Windows host is prior to 111.0.1661.41 / 110.0.1587.69. It is, therefore, affected by multiple vulnerabilities as referenced in the March 13, 2023 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-15T00:00:00", "type": "nessus", "title": "Microsoft Edge (Chromium) < 111.0.1661.41 / 110.0.1587.69 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-05-23T00:00:00", "cpe": ["cpe:/a:microsoft:edge"], "id": "MICROSOFT_EDGE_CHROMIUM_111_0_1661_41.NASL", "href": "https://www.tenable.com/plugins/nessus/172572", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172572);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/23\");\n\n script_cve_id(\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1228\",\n \"CVE-2023-1229\",\n \"CVE-2023-1230\",\n \"CVE-2023-1231\",\n \"CVE-2023-1232\",\n \"CVE-2023-1233\",\n \"CVE-2023-1234\",\n \"CVE-2023-1235\",\n \"CVE-2023-1236\"\n );\n script_xref(name:\"IAVA\", value:\"2023-A-0131-S\");\n\n script_name(english:\"Microsoft Edge (Chromium) < 111.0.1661.41 / 110.0.1587.69 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has an web browser installed that is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Microsoft Edge installed on the remote Windows host is prior to 111.0.1661.41 / 110.0.1587.69. It is,\ntherefore, affected by multiple vulnerabilities as referenced in the March 13, 2023 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a\n remote attacker who had compromised the renderer process to obtain potentially sensitive information from\n process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed\n an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer\n via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium\n security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium\n security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to obtain potentially sensitive information\n from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote\n attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?245dfb65\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1213\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1216\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1222\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1224\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1229\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1232\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1234\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1235\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1236\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Microsoft Edge version 111.0.1661.41 / 110.0.1587.69 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-1218\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2023-1222\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/03/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_edge_chromium_installed.nbin\", \"smb_hotfixes.nasl\");\n script_require_keys(\"installed_sw/Microsoft Edge (Chromium)\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nvar app_info = vcf::get_app_info(app:'Microsoft Edge (Chromium)', win_local:TRUE);\n\nvar productname = get_kb_item(\"SMB/ProductName\");\nif (\"Windows Server 2012\" >< productname)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nvar extended = FALSE;\nif (app_info['Channel'] == 'extended') extended = TRUE;\n\nvar constraints;\nif (extended) {\n\tconstraints = [\n \t\t{ 'fixed_version' : '110.0.1587.69' }\n\t];\n} else {\n\tconstraints = [\n \t\t{ 'fixed_version' : '111.0.1661.41' }\n\t];\n};\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:44:44", "description": "The remote Ubuntu 18.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5949-1 advisory.\n\n - Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0928)\n\n - Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0929)\n\n - Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0930)\n\n - Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0931)\n\n - Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) (CVE-2023-0933)\n\n - Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) (CVE-2023-0941)\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-14T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS : Chromium vulnerabilities (USN-5949-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1224", "CVE-2023-1226", "CVE-2023-1229", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-04-11T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:chromium-browser", "p-cpe:/a:canonical:ubuntu_linux:chromium-browser-l10n", "p-cpe:/a:canonical:ubuntu_linux:chromium-chromedriver", "p-cpe:/a:canonical:ubuntu_linux:chromium-codecs-ffmpeg", "p-cpe:/a:canonical:ubuntu_linux:chromium-codecs-ffmpeg-extra"], "id": "UBUNTU_USN-5949-1.NASL", "href": "https://www.tenable.com/plugins/nessus/172511", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5949-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172511);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/11\");\n\n script_cve_id(\n \"CVE-2023-0928\",\n \"CVE-2023-0929\",\n \"CVE-2023-0930\",\n \"CVE-2023-0931\",\n \"CVE-2023-0933\",\n \"CVE-2023-0941\",\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1224\",\n \"CVE-2023-1226\",\n \"CVE-2023-1229\",\n \"CVE-2023-1232\",\n \"CVE-2023-1233\",\n \"CVE-2023-1235\",\n \"CVE-2023-1236\"\n );\n script_xref(name:\"USN\", value:\"5949-1\");\n script_xref(name:\"IAVA\", value:\"2023-A-0131-S\");\n\n script_name(english:\"Ubuntu 18.04 LTS : Chromium vulnerabilities (USN-5949-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 18.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe USN-5949-1 advisory.\n\n - Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-0928)\n\n - Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0929)\n\n - Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-0930)\n\n - Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0931)\n\n - Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) (CVE-2023-0933)\n\n - Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n (CVE-2023-0941)\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium\n security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to obtain potentially sensitive information\n from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote\n attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5949-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-0941\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2023-1222\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/02/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:chromium-browser-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:chromium-chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:chromium-codecs-ffmpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:chromium-codecs-ffmpeg-extra\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2023 Canonical, Inc. / NASL script (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! preg(pattern:\"^(18\\.04)$\", string:os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '18.04', 'pkgname': 'chromium-browser', 'pkgver': '111.0.5563.64-0ubuntu0.18.04.5'},\n {'osver': '18.04', 'pkgname': 'chromium-browser-l10n', 'pkgver': '111.0.5563.64-0ubuntu0.18.04.5'},\n {'osver': '18.04', 'pkgname': 'chromium-chromedriver', 'pkgver': '111.0.5563.64-0ubuntu0.18.04.5'},\n {'osver': '18.04', 'pkgname': 'chromium-codecs-ffmpeg', 'pkgver': '111.0.5563.64-0ubuntu0.18.04.5'},\n {'osver': '18.04', 'pkgname': 'chromium-codecs-ffmpeg-extra', 'pkgver': '111.0.5563.64-0ubuntu0.18.04.5'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'chromium-browser / chromium-browser-l10n / chromium-chromedriver / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:46:08", "description": "The remote Fedora 36 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2023-015e4d696d advisory.\n\n - Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0927)\n\n - Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0928)\n\n - Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0929)\n\n - Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0930)\n\n - Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0931)\n\n - Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0932)\n\n - Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) (CVE-2023-0933)\n\n - Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) (CVE-2023-0941)\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-18T00:00:00", "type": "nessus", "title": "Fedora 36 : chromium (2023-015e4d696d)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-04-11T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:36", "p-cpe:/a:fedoraproject:fedora:chromium"], "id": "FEDORA_2023-015E4D696D.NASL", "href": "https://www.tenable.com/plugins/nessus/172671", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n##\n# The descriptive text and package checks in this plugin were\n# extracted from Fedora Security Advisory FEDORA-2023-015e4d696d\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172671);\n script_version(\"1.1\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/11\");\n\n script_cve_id(\n \"CVE-2023-0927\",\n \"CVE-2023-0928\",\n \"CVE-2023-0929\",\n \"CVE-2023-0930\",\n \"CVE-2023-0931\",\n \"CVE-2023-0932\",\n \"CVE-2023-0933\",\n \"CVE-2023-0941\",\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1225\",\n \"CVE-2023-1226\",\n \"CVE-2023-1227\"\n );\n script_xref(name:\"FEDORA\", value:\"2023-015e4d696d\");\n\n script_name(english:\"Fedora 36 : chromium (2023-015e4d696d)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Fedora host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Fedora 36 host has a package installed that is affected by multiple vulnerabilities as referenced in the\nFEDORA-2023-015e4d696d advisory.\n\n - Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote\n attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted\n HTML page. (Chromium security severity: High) (CVE-2023-0927)\n\n - Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-0928)\n\n - Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0929)\n\n - Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-0930)\n\n - Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0931)\n\n - Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who\n convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-0932)\n\n - Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) (CVE-2023-0933)\n\n - Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n (CVE-2023-0941)\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a\n remote attacker who had compromised the renderer process to obtain potentially sensitive information from\n process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a\n remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who\n convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted\n UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2023-015e4d696d\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected chromium package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-0941\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/02/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:36\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Fedora Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Fedora' >!< os_release) audit(AUDIT_OS_NOT, 'Fedora');\nvar os_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Fedora');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^36([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Fedora 36', 'Fedora ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Fedora', cpu);\n\nvar pkgs = [\n {'reference':'chromium-111.0.5563.64-1.fc36', 'release':'FC36', 'rpm_spec_vers_cmp':TRUE, 'allowmaj':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && _release) {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'chromium');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:44:26", "description": "The remote Fedora 37 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2023-1cf9c4477b advisory.\n\n - Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0927)\n\n - Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0928)\n\n - Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0929)\n\n - Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0930)\n\n - Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0931)\n\n - Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0932)\n\n - Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) (CVE-2023-0933)\n\n - Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) (CVE-2023-0941)\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-11T00:00:00", "type": "nessus", "title": "Fedora 37 : chromium (2023-1cf9c4477b)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-04-11T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:37", "p-cpe:/a:fedoraproject:fedora:chromium"], "id": "FEDORA_2023-1CF9C4477B.NASL", "href": "https://www.tenable.com/plugins/nessus/172480", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n##\n# The descriptive text and package checks in this plugin were\n# extracted from Fedora Security Advisory FEDORA-2023-1cf9c4477b\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172480);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/11\");\n\n script_cve_id(\n \"CVE-2023-0927\",\n \"CVE-2023-0928\",\n \"CVE-2023-0929\",\n \"CVE-2023-0930\",\n \"CVE-2023-0931\",\n \"CVE-2023-0932\",\n \"CVE-2023-0933\",\n \"CVE-2023-0941\",\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1225\",\n \"CVE-2023-1226\",\n \"CVE-2023-1227\"\n );\n script_xref(name:\"FEDORA\", value:\"2023-1cf9c4477b\");\n script_xref(name:\"IAVA\", value:\"2023-A-0131-S\");\n\n script_name(english:\"Fedora 37 : chromium (2023-1cf9c4477b)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Fedora host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Fedora 37 host has a package installed that is affected by multiple vulnerabilities as referenced in the\nFEDORA-2023-1cf9c4477b advisory.\n\n - Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote\n attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted\n HTML page. (Chromium security severity: High) (CVE-2023-0927)\n\n - Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-0928)\n\n - Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0929)\n\n - Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-0930)\n\n - Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0931)\n\n - Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who\n convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-0932)\n\n - Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially\n exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) (CVE-2023-0933)\n\n - Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n (CVE-2023-0941)\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a\n remote attacker who had compromised the renderer process to obtain potentially sensitive information from\n process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a\n remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who\n convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted\n UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2023-1cf9c4477b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected chromium package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-0941\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/02/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:37\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Fedora Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Fedora' >!< os_release) audit(AUDIT_OS_NOT, 'Fedora');\nvar os_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Fedora');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^37([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Fedora 37', 'Fedora ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Fedora', cpu);\n\nvar pkgs = [\n {'reference':'chromium-111.0.5563.64-1.fc37', 'release':'FC37', 'rpm_spec_vers_cmp':TRUE, 'allowmaj':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && _release) {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'chromium');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:44:04", "description": "The version of Google Chrome installed on the remote Windows host is prior to 111.0.5563.64. It is, therefore, affected by multiple vulnerabilities as referenced in the 2023_03_stable-channel-update-for-desktop advisory.\n\n - Use after free in Swiftshader. (CVE-2023-1213)\n\n - Type Confusion in V8. (CVE-2023-1214)\n\n - Type Confusion in CSS. (CVE-2023-1215)\n\n - Use after free in DevTools. (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting. (CVE-2023-1217)\n\n - Use after free in WebRTC. (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics. (CVE-2023-1219)\n\n - Heap buffer overflow in UMA. (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API. (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API. (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill. (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API. (CVE-2023-1224, CVE-2023-1226)\n\n - Insufficient policy enforcement in Navigation. (CVE-2023-1225)\n\n - Use after free in Core. (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents. (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts. (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs. (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill. (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing. (CVE-2023-1232, CVE-2023-1233)\n\n - Inappropriate implementation in Intents. (CVE-2023-1234)\n\n - Type Confusion in DevTools. (CVE-2023-1235)\n\n - Inappropriate implementation in Internals. (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-07T00:00:00", "type": "nessus", "title": "Google Chrome < 111.0.5563.64 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-04-11T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_111_0_5563_64.NASL", "href": "https://www.tenable.com/plugins/nessus/172221", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172221);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/11\");\n\n script_cve_id(\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1225\",\n \"CVE-2023-1226\",\n \"CVE-2023-1227\",\n \"CVE-2023-1228\",\n \"CVE-2023-1229\",\n \"CVE-2023-1230\",\n \"CVE-2023-1231\",\n \"CVE-2023-1232\",\n \"CVE-2023-1233\",\n \"CVE-2023-1234\",\n \"CVE-2023-1235\",\n \"CVE-2023-1236\"\n );\n script_xref(name:\"IAVA\", value:\"2023-A-0123-S\");\n\n script_name(english:\"Google Chrome < 111.0.5563.64 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is prior to 111.0.5563.64. It is, therefore, affected\nby multiple vulnerabilities as referenced in the 2023_03_stable-channel-update-for-desktop advisory.\n\n - Use after free in Swiftshader. (CVE-2023-1213)\n\n - Type Confusion in V8. (CVE-2023-1214)\n\n - Type Confusion in CSS. (CVE-2023-1215)\n\n - Use after free in DevTools. (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting. (CVE-2023-1217)\n\n - Use after free in WebRTC. (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics. (CVE-2023-1219)\n\n - Heap buffer overflow in UMA. (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API. (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API. (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill. (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API. (CVE-2023-1224, CVE-2023-1226)\n\n - Insufficient policy enforcement in Navigation. (CVE-2023-1225)\n\n - Use after free in Core. (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents. (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts. (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs. (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill. (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing. (CVE-2023-1232, CVE-2023-1233)\n\n - Inappropriate implementation in Intents. (CVE-2023-1234)\n\n - Type Confusion in DevTools. (CVE-2023-1235)\n\n - Inappropriate implementation in Internals. (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?83e395f3\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1411210\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1412487\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1417176\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1417649\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1412658\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1413628\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1415328\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1417185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1385343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1403515\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1398579\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1403539\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1408799\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1013080\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1348791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1365100\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1160485\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1404230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1274887\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1346924\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1045681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1404621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1404704\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1374518\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 111.0.5563.64 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-1227\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/03/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\ninclude('google_chrome_version.inc');\n\nget_kb_item_or_exit('SMB/Google_Chrome/Installed');\nvar installs = get_kb_list('SMB/Google_Chrome/*');\n\ngoogle_chrome_check_version(installs:installs, fix:'111.0.5563.64', severity:SECURITY_HOLE, xss:FALSE, xsrf:FALSE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:44:42", "description": "The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5371 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-10T00:00:00", "type": "nessus", "title": "Debian DSA-5371-1 : chromium - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-04-11T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:11.0", "p-cpe:/a:debian:debian_linux:chromium", "p-cpe:/a:debian:debian_linux:chromium-common", "p-cpe:/a:debian:debian_linux:chromium-driver", "p-cpe:/a:debian:debian_linux:chromium-l10n", "p-cpe:/a:debian:debian_linux:chromium-sandbox", "p-cpe:/a:debian:debian_linux:chromium-shell"], "id": "DEBIAN_DSA-5371.NASL", "href": "https://www.tenable.com/plugins/nessus/172448", "sourceData": "#%NASL_MIN_LEVEL 80900\n#\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dsa-5371. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172448);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/11\");\n\n script_cve_id(\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1225\",\n \"CVE-2023-1226\",\n \"CVE-2023-1227\",\n \"CVE-2023-1228\",\n \"CVE-2023-1229\",\n \"CVE-2023-1230\",\n \"CVE-2023-1231\",\n \"CVE-2023-1232\",\n \"CVE-2023-1233\",\n \"CVE-2023-1234\",\n \"CVE-2023-1235\",\n \"CVE-2023-1236\"\n );\n script_xref(name:\"IAVA\", value:\"2023-A-0131-S\");\n\n script_name(english:\"Debian DSA-5371-1 : chromium - security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the\ndsa-5371 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a\n remote attacker who had compromised the renderer process to obtain potentially sensitive information from\n process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a\n remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who\n convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted\n UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed\n an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer\n via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium\n security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium\n security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to obtain potentially sensitive information\n from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote\n attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/chromium\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/security/2023/dsa-5371\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1213\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1216\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1222\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1224\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1225\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1226\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1227\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1229\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1232\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1234\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1235\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2023-1236\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/bullseye/chromium\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the chromium packages.\n\nFor the stable distribution (bullseye), these problems have been fixed in version 111.0.5563.64-1~deb11u1.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-1227\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/03/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-driver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-sandbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-shell\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:11.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar debian_release = get_kb_item('Host/Debian/release');\nif ( isnull(debian_release) ) audit(AUDIT_OS_NOT, 'Debian');\ndebian_release = chomp(debian_release);\nif (! preg(pattern:\"^(11)\\.[0-9]+\", string:debian_release)) audit(AUDIT_OS_NOT, 'Debian 11.0', 'Debian ' + debian_release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '11.0', 'prefix': 'chromium', 'reference': '111.0.5563.64-1~deb11u1'},\n {'release': '11.0', 'prefix': 'chromium-common', 'reference': '111.0.5563.64-1~deb11u1'},\n {'release': '11.0', 'prefix': 'chromium-driver', 'reference': '111.0.5563.64-1~deb11u1'},\n {'release': '11.0', 'prefix': 'chromium-l10n', 'reference': '111.0.5563.64-1~deb11u1'},\n {'release': '11.0', 'prefix': 'chromium-sandbox', 'reference': '111.0.5563.64-1~deb11u1'},\n {'release': '11.0', 'prefix': 'chromium-shell', 'reference': '111.0.5563.64-1~deb11u1'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var _release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (_release && prefix && reference) {\n if (deb_check(release:_release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'chromium / chromium-common / chromium-driver / chromium-l10n / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:43:25", "description": "The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2023:0068-1 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-14T00:00:00", "type": "nessus", "title": "openSUSE 15 Security Update : chromium (openSUSE-SU-2023:0068-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-04-11T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium", "cpe:/o:novell:opensuse:15.4"], "id": "OPENSUSE-2023-0068-1.NASL", "href": "https://www.tenable.com/plugins/nessus/172507", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# openSUSE Security Update openSUSE-SU-2023:0068-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(172507);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/11\");\n\n script_cve_id(\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1225\",\n \"CVE-2023-1226\",\n \"CVE-2023-1227\",\n \"CVE-2023-1228\",\n \"CVE-2023-1229\",\n \"CVE-2023-1230\",\n \"CVE-2023-1231\",\n \"CVE-2023-1232\",\n \"CVE-2023-1233\",\n \"CVE-2023-1234\",\n \"CVE-2023-1235\",\n \"CVE-2023-1236\"\n );\n script_xref(name:\"IAVA\", value:\"2023-A-0131-S\");\n\n script_name(english:\"openSUSE 15 Security Update : chromium (openSUSE-SU-2023:0068-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nopenSUSE-SU-2023:0068-1 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a\n remote attacker who had compromised the renderer process to obtain potentially sensitive information from\n process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a\n remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who\n convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted\n UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed\n an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer\n via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium\n security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium\n security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to obtain potentially sensitive information\n from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote\n attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1236)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1209040\");\n # https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4USJJ6HOC5UIZQM6PHWKEVPCFAFN3DO/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a19e55d0\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1213\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1216\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1222\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1224\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1225\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1226\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1227\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1229\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1232\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1234\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1235\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1236\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected chromedriver and / or chromium packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-1227\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/03/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/03/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.4\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/SuSE/release');\nif (isnull(os_release) || os_release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, 'openSUSE');\nvar _os_ver = pregmatch(pattern: \"^SUSE([\\d.]+)\", string:os_release);\nif (isnull(_os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');\n_os_ver = _os_ver[1];\nif (os_release !~ \"^(SUSE15\\.4)$\") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.4', os_release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + _os_ver, cpu);\n\nvar pkgs = [\n {'reference':'chromedriver-111.0.5563.64-bp154.2.73.1', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'chromedriver-111.0.5563.64-bp154.2.73.1', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'chromium-111.0.5563.64-bp154.2.73.1', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'chromium-111.0.5563.64-bp154.2.73.1', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var _cpu = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && _release) {\n if (rpm_check(release:_release, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'chromedriver / chromium');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T12:51:05", "description": "The remote openSUSE 15 host has a package installed that is affected by multiple vulnerabilities as referenced in the openSUSE-SU-2023:0114-1 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low) (CVE-2023-1236)\n\n - Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1528)\n\n - Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High) (CVE-2023-1529)\n\n - Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1530)\n\n - Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1531)\n\n - Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1532)\n\n - Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1533)\n\n - Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1534)\n\n - Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2033)\n\n - Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2133, CVE-2023-2134)\n\n - Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2135)\n\n - Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n (Chromium security severity: High) (CVE-2023-2136)\n\n - Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-2137)\n\n - Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) (CVE-2023-2721)\n\n - Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity:\n High) (CVE-2023-2722)\n\n - Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2723)\n\n - Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2724)\n\n - Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n (Chromium security severity: High) (CVE-2023-2725)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-2726)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-05-28T00:00:00", "type": "nessus", "title": "openSUSE 15 Security Update : opera (openSUSE-SU-2023:0114-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236", "CVE-2023-1528", "CVE-2023-1529", "CVE-2023-1530", "CVE-2023-1531", "CVE-2023-1532", "CVE-2023-1533", "CVE-2023-1534", "CVE-2023-2033", "CVE-2023-2133", "CVE-2023-2134", "CVE-2023-2135", "CVE-2023-2136", "CVE-2023-2137", "CVE-2023-2721", "CVE-2023-2722", "CVE-2023-2723", "CVE-2023-2724", "CVE-2023-2725", "CVE-2023-2726"], "modified": "2023-05-28T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:opera", "cpe:/o:novell:opensuse:15.4"], "id": "OPENSUSE-2023-0114-1.NASL", "href": "https://www.tenable.com/plugins/nessus/176441", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The package checks in this plugin were extracted from\n# openSUSE Security Update openSUSE-SU-2023:0114-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(176441);\n script_version(\"1.0\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/28\");\n\n script_cve_id(\n \"CVE-2023-1213\",\n \"CVE-2023-1214\",\n \"CVE-2023-1215\",\n \"CVE-2023-1216\",\n \"CVE-2023-1217\",\n \"CVE-2023-1218\",\n \"CVE-2023-1219\",\n \"CVE-2023-1220\",\n \"CVE-2023-1221\",\n \"CVE-2023-1222\",\n \"CVE-2023-1223\",\n \"CVE-2023-1224\",\n \"CVE-2023-1225\",\n \"CVE-2023-1226\",\n \"CVE-2023-1227\",\n \"CVE-2023-1228\",\n \"CVE-2023-1229\",\n \"CVE-2023-1230\",\n \"CVE-2023-1231\",\n \"CVE-2023-1232\",\n \"CVE-2023-1233\",\n \"CVE-2023-1234\",\n \"CVE-2023-1235\",\n \"CVE-2023-1236\",\n \"CVE-2023-1528\",\n \"CVE-2023-1529\",\n \"CVE-2023-1530\",\n \"CVE-2023-1531\",\n \"CVE-2023-1532\",\n \"CVE-2023-1533\",\n \"CVE-2023-1534\",\n \"CVE-2023-2033\",\n \"CVE-2023-2133\",\n \"CVE-2023-2134\",\n \"CVE-2023-2135\",\n \"CVE-2023-2136\",\n \"CVE-2023-2137\",\n \"CVE-2023-2721\",\n \"CVE-2023-2722\",\n \"CVE-2023-2723\",\n \"CVE-2023-2724\",\n \"CVE-2023-2725\",\n \"CVE-2023-2726\"\n );\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2023/05/08\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2023/05/12\");\n\n script_name(english:\"openSUSE 15 Security Update : opera (openSUSE-SU-2023:0114-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote openSUSE 15 host has a package installed that is affected by multiple vulnerabilities as referenced in the\nopenSUSE-SU-2023:0114-1 advisory.\n\n - Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1213)\n\n - Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1214)\n\n - Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1215)\n\n - Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a\n crafted HTML page. (Chromium security severity: High) (CVE-2023-1216)\n\n - Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a\n remote attacker who had compromised the renderer process to obtain potentially sensitive information from\n process memory via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1217)\n\n - Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1218)\n\n - Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1219)\n\n - Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1220)\n\n - Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a\n crafted Chrome Extension. (Chromium security severity: Medium) (CVE-2023-1221)\n\n - Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1222)\n\n - Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1223)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1224)\n\n - Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a\n remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-1225)\n\n - Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1226)\n\n - Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who\n convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted\n UI interaction. (Chromium security severity: Medium) (CVE-2023-1227)\n\n - Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1228)\n\n - Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity:\n Medium) (CVE-2023-1229)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed\n an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer\n via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-1230)\n\n - Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium\n security severity: Medium) (CVE-2023-1231)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a\n remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium\n security severity: Low) (CVE-2023-1232)\n\n - Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an\n attacker who convinced a user to install a malicious extension to obtain potentially sensitive information\n from API via a crafted Chrome Extension. (Chromium security severity: Low) (CVE-2023-1233)\n\n - Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a\n remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1234)\n\n - Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction.\n (Chromium security severity: Low) (CVE-2023-1235)\n\n - Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote\n attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)\n (CVE-2023-1236)\n\n - Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1528)\n\n - Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker\n to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)\n (CVE-2023-1529)\n\n - Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1530)\n\n - Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-1531)\n\n - Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1532)\n\n - Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n (CVE-2023-1533)\n\n - Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-1534)\n\n - Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2033)\n\n - Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a\n remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security\n severity: High) (CVE-2023-2133, CVE-2023-2134)\n\n - Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who\n convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted\n HTML page. (Chromium security severity: High) (CVE-2023-2135)\n\n - Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had\n compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n (Chromium security severity: High) (CVE-2023-2136)\n\n - Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)\n (CVE-2023-2137)\n\n - Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to\n potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n (CVE-2023-2721)\n\n - Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote\n attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity:\n High) (CVE-2023-2722)\n\n - Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had\n compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium\n security severity: High) (CVE-2023-2723)\n\n - Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially\n exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-2724)\n\n - Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a\n user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n (Chromium security severity: High) (CVE-2023-2725)\n\n - Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an\n attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML\n page. (Chromium security severity: Medium) (CVE-2023-2726)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOK6KL3HWOEESQP5YYTJH4ANDT2XMQRU/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?23e9bf76\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1213\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1214\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1216\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1217\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1221\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1222\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1224\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1225\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1226\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1227\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1229\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1231\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1232\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1233\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1234\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1235\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1236\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1528\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1529\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1531\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1532\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1533\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-1534\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2033\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2133\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2134\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2135\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2136\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2137\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2721\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2722\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2723\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2724\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2725\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2023-2726\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected opera package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2023-2725\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2023-1529\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2023/03/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/05/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/05/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:opera\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.4\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/SuSE/release');\nif (isnull(os_release) || os_release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, 'openSUSE');\nvar _os_ver = pregmatch(pattern: \"^SUSE([\\d.]+)\", string:os_release);\nif (isnull(_os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');\n_os_ver = _os_ver[1];\nif (os_release !~ \"^(SUSE15\\.4)$\") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.4', os_release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + _os_ver, cpu);\n\nvar pkgs = [\n {'reference':'opera-99.0.4788.13-lp154.2.47.1', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var _cpu = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && _release) {\n if (rpm_check(release:_release, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'opera');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "kaspersky": [{"lastseen": "2023-06-04T18:26:30", "description": "### *Detect date*:\n03/13/2023\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, gain privileges, spoof user interface, execute arbitrary code.\n\n### *Affected products*:\nMicrosoft Edge (Chromium-based) \nMicrosoft Edge (Chromium-based) Extended Stable\n\n### *Solution*:\nInstall necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option) \n[Microsoft Edge update settings](<https://support.microsoft.com/en-us/topic/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1>)\n\n### *Original advisories*:\n[CVE-2023-1233](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1233>) \n[CVE-2023-1220](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1220>) \n[CVE-2023-1228](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1228>) \n[CVE-2023-1229](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1229>) \n[CVE-2023-1219](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1219>) \n[CVE-2023-1214](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1214>) \n[CVE-2023-1236](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1236>) \n[CVE-2023-1234](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1234>) \n[CVE-2023-1224](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1224>) \n[CVE-2023-1217](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1217>) \n[CVE-2023-1223](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1223>) \n[CVE-2023-1231](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1231>) \n[CVE-2023-1222](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1222>) \n[CVE-2023-1213](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1213>) \n[CVE-2023-1221](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1221>) \n[CVE-2023-1218](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1218>) \n[CVE-2023-1230](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1230>) \n[CVE-2023-1216](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1216>) \n[CVE-2023-1235](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1235>) \n[CVE-2023-1215](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1215>) \n[CVE-2023-1232](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1232>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Edge](<https://threats.kaspersky.com/en/product/Microsoft-Edge/>)\n\n### *CVE-IDS*:\n[CVE-2023-1229](<https://vulners.com/cve/CVE-2023-1229>)5.0Critical \n[CVE-2023-1224](<https://vulners.com/cve/CVE-2023-1224>)5.0Critical \n[CVE-2023-1218](<https://vulners.com/cve/CVE-2023-1218>)5.0Critical \n[CVE-2023-1230](<https://vulners.com/cve/CVE-2023-1230>)5.0Critical \n[CVE-2023-1223](<https://vulners.com/cve/CVE-2023-1223>)5.0Critical \n[CVE-2023-1216](<https://vulners.com/cve/CVE-2023-1216>)5.0Critical \n[CVE-2023-1217](<https://vulners.com/cve/CVE-2023-1217>)5.0Critical \n[CVE-2023-1215](<https://vulners.com/cve/CVE-2023-1215>)5.0Critical \n[CVE-2023-1220](<https://vulners.com/cve/CVE-2023-1220>)5.0Critical \n[CVE-2023-1231](<https://vulners.com/cve/CVE-2023-1231>)5.0Critical \n[CVE-2023-1233](<https://vulners.com/cve/CVE-2023-1233>)5.0Critical \n[CVE-2023-1236](<https://vulners.com/cve/CVE-2023-1236>)5.0Critical \n[CVE-2023-1222](<https://vulners.com/cve/CVE-2023-1222>)5.0Critical \n[CVE-2023-1221](<https://vulners.com/cve/CVE-2023-1221>)5.0Critical \n[CVE-2023-1232](<https://vulners.com/cve/CVE-2023-1232>)5.0Critical \n[CVE-2023-1214](<https://vulners.com/cve/CVE-2023-1214>)5.0Critical \n[CVE-2023-1234](<https://vulners.com/cve/CVE-2023-1234>)5.0Critical \n[CVE-2023-1219](<https://vulners.com/cve/CVE-2023-1219>)5.0Critical \n[CVE-2023-1235](<https://vulners.com/cve/CVE-2023-1235>)5.0Critical \n[CVE-2023-1228](<https://vulners.com/cve/CVE-2023-1228>)5.0Critical \n[CVE-2023-1213](<https://vulners.com/cve/CVE-2023-1213>)5.0Critical\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-13T00:00:00", "type": "kaspersky", "title": "KLA48544 Multiple vulnerabilities in Microsoft Browser", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-28T00:00:00", "id": "KLA48544", "href": "https://threats.kaspersky.com/en/vulnerability/KLA48544/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:26:32", "description": "### *Detect date*:\n03/07/2023\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.\n\n### *Affected products*:\nGoogle Chrome earlier than 111.0.5563.65\n\n### *Solution*:\nUpdate to the latest version \n[Download Google Chrome](<https://www.google.com/chrome/>)\n\n### *Original advisories*:\n[Stable Channel Update for Desktop](<https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2023-1229](<https://vulners.com/cve/CVE-2023-1229>)5.0Critical \n[CVE-2023-1224](<https://vulners.com/cve/CVE-2023-1224>)5.0Critical \n[CVE-2023-1218](<https://vulners.com/cve/CVE-2023-1218>)5.0Critical \n[CVE-2023-1230](<https://vulners.com/cve/CVE-2023-1230>)5.0Critical \n[CVE-2023-1225](<https://vulners.com/cve/CVE-2023-1225>)5.0Critical \n[CVE-2023-1223](<https://vulners.com/cve/CVE-2023-1223>)5.0Critical \n[CVE-2023-1216](<https://vulners.com/cve/CVE-2023-1216>)5.0Critical \n[CVE-2023-1226](<https://vulners.com/cve/CVE-2023-1226>)5.0Critical \n[CVE-2023-1217](<https://vulners.com/cve/CVE-2023-1217>)5.0Critical \n[CVE-2023-1215](<https://vulners.com/cve/CVE-2023-1215>)5.0Critical \n[CVE-2023-1220](<https://vulners.com/cve/CVE-2023-1220>)5.0Critical \n[CVE-2023-1231](<https://vulners.com/cve/CVE-2023-1231>)5.0Critical \n[CVE-2023-1233](<https://vulners.com/cve/CVE-2023-1233>)5.0Critical \n[CVE-2023-1236](<https://vulners.com/cve/CVE-2023-1236>)5.0Critical \n[CVE-2023-1222](<https://vulners.com/cve/CVE-2023-1222>)5.0Critical \n[CVE-2023-1221](<https://vulners.com/cve/CVE-2023-1221>)5.0Critical \n[CVE-2023-1232](<https://vulners.com/cve/CVE-2023-1232>)5.0Critical \n[CVE-2023-1227](<https://vulners.com/cve/CVE-2023-1227>)5.0Critical \n[CVE-2023-1214](<https://vulners.com/cve/CVE-2023-1214>)5.0Critical \n[CVE-2023-1234](<https://vulners.com/cve/CVE-2023-1234>)5.0Critical \n[CVE-2023-1219](<https://vulners.com/cve/CVE-2023-1219>)5.0Critical \n[CVE-2023-1235](<https://vulners.com/cve/CVE-2023-1235>)5.0Critical \n[CVE-2023-1228](<https://vulners.com/cve/CVE-2023-1228>)5.0Critical \n[CVE-2023-1213](<https://vulners.com/cve/CVE-2023-1213>)5.0Critical", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-07T00:00:00", "type": "kaspersky", "title": "KLA48512 Multiple vulnerabilities in Google Chrome", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-09T00:00:00", "id": "KLA48512", "href": "https://threats.kaspersky.com/en/vulnerability/KLA48512/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2023-06-04T19:14:16", "description": "## Releases\n\n * Ubuntu 18.04 ESM\n\n## Packages\n\n * chromium-browser \\- Chromium web browser, open-source version of Chrome\n\nIt was discovered that Chromium could be made to write out of bounds in \nseveral components. A remote attacker could possibly use this issue to \ncorrupt memory via a crafted HTML page, resulting in a denial of service, \nor possibly execute arbitrary code. (CVE-2023-0930, CVE-2023-1219, \nCVE-2023-1220, CVE-2023-1222)\n\nIt was discovered that Chromium contained an integer overflow in the PDF \ncomponent. A remote attacker could possibly use this issue to corrupt \nmemory via a crafted PDF file, resulting in a denial of service, or \npossibly execute arbitrary code. (CVE-2023-0933)\n\nIt was discovered that Chromium did not properly manage memory in several \ncomponents. A remote attacker could possibly use this issue to corrupt \nmemory via a crafted HTML page, resulting in a denial of service, or \npossibly execute arbitrary code. (CVE-2023-0941, CVE-2023-0928, \nCVE-2023-0929, CVE-2023-0931, CVE-2023-1213, CVE-2023-1216, CVE-2023-1218)\n\nIt was discovered that Chromium did not correctly distinguish data types \nin several components. A remote attacker could possibly use this issue to \ncorrupt memory via a crafted HTML page, resulting in a denial of service, \nor possibly execute arbitrary code. (CVE-2023-1214, CVE-2023-1215, \nCVE-2023-1235)\n\nIt was discovered that Chromium insufficiently enforced policies. An \nattacker could possibly use this issue to bypass navigation restrictions. \n(CVE-2023-1221, CVE-2023-1224)\n\nIt was discovered that Chromium insufficiently enforced policies in Web \nPayments API. A remote attacker could possibly use this issue to bypass \ncontent security policy via a crafted HTML page. (CVE-2023-1226)\n\nIt was discovered that Chromium contained an inappropriate implementation \nin the Permission prompts component. A remote attacker could possibly use \nthis issue to bypass navigation restrictions via a crafted HTML page. \n(CVE-2023-1229)\n\nIt was discovered that Chromium insufficiently enforced policies in \nResource Timing component. A remote attacker could possibly use this issue \nto obtain sensitive information. (CVE-2023-1232, CVE-2023-1233)\n\nIt was discovered that Chromium contained an inappropriate implementation \nin the Internals component. A remote attacker could possibly use this \nissue to spoof the origin of an iframe via a crafted HTML page. \n(CVE-2023-1236)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-13T00:00:00", "type": "ubuntu", "title": "Chromium vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1224", "CVE-2023-1226", "CVE-2023-1229", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-13T00:00:00", "id": "USN-5949-1", "href": "https://ubuntu.com/security/notices/USN-5949-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2023-06-04T18:36:56", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-12T00:45:17", "type": "fedora", "title": "[SECURITY] Fedora 37 Update: chromium-111.0.5563.64-1.fc37", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-12T00:45:17", "id": "FEDORA:8276430AA072", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/JRNBRQWGS6YZAKAPHQUSILGGHFU3UMXF/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-18T05:05:40", "type": "fedora", "title": "[SECURITY] Fedora 36 Update: chromium-111.0.5563.64-1.fc36", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-18T05:05:40", "id": "FEDORA:4595F3076698", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/YM6EDH5D3R4Z7YVHCNVBT53LLWUOSJSR/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "The Advanced Linux Sound Architecture (ALSA) provides audio and MIDI functionality to the Linux operating system. This package includes plugins for ALSA. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:04", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: alsa-plugins-1.2.7.1-5.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:04", "id": "FEDORA:13FE630A689B", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IRG7HWBDJ5SS3SM2UN7RXJ3MYG5CEYHS/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Attract-Mode is a graphical frontend for command line emulators such as MAM E, MESS, and Nestopia. It hides the underlying operating system and is intended to be controlled with a joystick, gamepad or spin dial, making it ideal for use in arcade cabinet setups. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:06", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: attract-mode-2.6.2-6.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:06", "id": "FEDORA:085FD309FD79", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BCEFB3ELUBRF2K2FMSIE5D6QN5KQ37CY/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Blender is the essential software solution you need for 3D, from modeling, animation, rendering and post-production to interactive creation and playba ck. Professionals and novices can easily and inexpensively publish stand-alone, secure, multi-platform content to the web, CD-ROMs, and other media. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:08", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: blender-3.4.1-16.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:08", "id": "FEDORA:A0261309FD79", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CELCEZDO3ERUV3JC5ZYJROUQP5PWBANI/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Chromaprint library is the core component of the AcoustID project. It's a client-side library that implements a custom algorithm for extracting fingerprints from raw audio sources. The library exposes a simple C API. The documentation for the C API can be found in the main header file. License for binaries is GPLv2+ but source code is MIT + LGPLv2+ ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:11", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: chromaprint-1.5.1-8.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:11", "id": "FEDORA:4591630A0711", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NA6SMRAM37FQM6DOAFDXXSTCS2T2DGID/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "This package provides essential plugins for the Audacious audio player. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:07", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: audacious-plugins-4.3-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:07", "id": "FEDORA:5A39630A08E8", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/RSWWFVOCZRMMOAPFQVY53GZLL3FBMMOT/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:12", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: chromium-111.0.5563.64-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:12", "id": "FEDORA:8700030A0376", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BDFRV5JSGI45APKJS5WE7USEG3D5E2FE/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Celestia is a real-time space simulation which lets you experience the universe in three dimensions. Celestia does not confine you to the surface of the Earth, it allows you to travel throughout the solar system, to any of over 100,000 stars, or even beyond the galaxy. Travel in Celestia is seamless; the exponential zoom feature lets you explore space across a huge range of scales, from galaxy clusters down to spacecraft only a few meters across. A 'point-and-goto' interface makes it simple to navigate through the universe to the object you want to visit. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:09", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: celestia-1.7.0~20230305ebfcdb1-4.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:09", "id": "FEDORA:EA14130A0710", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/767PXWBBBK5QU7CKSPMMNDRW6TUMYBRQ/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "FFmpeg is a leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. It supports the most obscure ancient formats up to t he cutting edge. No matter if they were designed by some standards committee, the community or a corporation. This build of ffmpeg is limited in the number of codecs supported. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:13", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: ffmpeg-6.0-1.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:13", "id": "FEDORA:BF66C30A0376", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FTSFKF7VKRUQBG3BV5JUKE7ZZLGPI34D/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "KDE ffmpegthumbnailer service. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:15", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: ffmpegthumbs-22.12.3-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:15", "id": "FEDORA:0862C30A6357", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LJ2FEN4SGT2XC3JOQUL7VMIHAVPC64ZX/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Guacamole is an HTML5 remote desktop gateway. Guacamole provides access to desktop environments using remote desktop prot ocols like VNC and RDP. A centralized server acts as a tunnel and proxy, allowing access to multiple desktops through a web browser. No browser plugins are needed, and no client software needs to be installed . The client requires nothing more than a web browser supporting HTML5 and AJAX. The main web application is provided by the \"guacamole-client\" package. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:17", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: guacamole-server-1.5.0-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:17", "id": "FEDORA:D92BD309FF1C", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4BJO7ZWH3WVDKLL33ONS4D2NFAHSZPYH/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "GStreamer is a streaming media framework, based on graphs of filters which operate on media data. Applications using this library can do anything from real-time sound processing to playing videos, and just about anything else media-related. Its plugin-based architecture means that new data types or processing capabilities can be added simply by installing new plugins. This package provides FFmpeg/LibAV GStreamer plugin. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:16", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: gstreamer1-plugin-libav-1.22.0-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:16", "id": "FEDORA:82B0B30A3AE9", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BABP3VYE4WJKUDAAPYIPQKEVVHLLTQHU/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "This is a metapackage for installing all INDI 3rdparty drivers at once. You probably don't want to install everything, but just pick the drivers you need from the appropriate subpackage. We currently ship the following drivers: - indi-3rdparty-aagcloudwatcher-ng - indi-3rdparty-aok - indi-3rdparty-apogee - indi-3rdparty-astrolink4 - indi-3rdparty-astromechfoc - indi-3rdparty-avalon - indi-3rdparty-beefocus - indi-3rdparty-bresserexos2 - indi-3rdparty-celestronaux - indi-3rdparty-dreamfocuser - indi-3rdparty-eqmod - indi-3rdparty-fli - indi-3rdparty-gphoto - indi-3rdparty-gpsd - indi-3rdparty-gpsnmea - indi-3rdparty-armadillo-platypus - indi-3rdparty-maxdome - indi-3rdparty-mgen - indi-3rdparty-nexdome - indi-3rdparty-nightscape - indi-3rdparty-orionssg3 - indi-3rdparty-rtklib - indi-3rdparty-shelyak - indi-3rdparty-spectracyber - indi-3rdparty-starbook - indi-3rdparty-starbook-ten - indi-3rdparty-sx - indi-3rdparty-talon6 - indi-3rdparty-webcam - indi-3rdparty-weewx-json ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:21", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: indi-3rdparty-drivers-2.0.0-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:21", "id": "FEDORA:086A1309FF1C", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QAXUPQO66RZDV6ESLMFBMYWCL465BDGI/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Open source video player built with Qt/QML and libmpv. Features: + play online videos, through youtube-dl; + supports youtube playlists; + toggle playlist with mouse-over, playlist overlays the video; + auto skip chapter containing certain words; + configurable shortcuts and mouse buttons; + quick jump to next chapter by middle click on progress bar. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:19", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: haruna-0.10.3-3.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:19", "id": "FEDORA:826DA309FF1C", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SXEVXB44BHY24L7FJEMB5EWEUXIAXNJS/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "This is a metapackage for installing all INDI 3rdparty libraries at once. You probably don't want to install everything, but just pick the libraries you need from the appropriate subpackage. We currently ship the following libraries: - indi-3rdparty-libapogee - indi-3rdparty-libfli ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:22", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: indi-3rdparty-libraries-2.0.0-1.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:22", "id": "FEDORA:8273B30A1F08", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SRMVI6R3KSPITKDWM2V4PTGWYXUB43EU/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "K3b provides a comfortable user interface to perform most CD/DVD burning tasks. While the experienced user can take influence in all steps of the burning process the beginner may find comfort in the automatic settings and the reasonable k3b defaults which allow a quick start. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:24", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: k3b-22.12.3-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:24", "id": "FEDORA:0874430A0733", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQWHG3YKYF6IYU4SGEPXALXKXMZ3IKMV/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "It is developed in C++ and it's main use target is QML components. As it's what's been useful, this framework focuses on graphical PipeWire features. If it was necessary, these could be included. At the moment we offer two main components: - KPipeWire: offers the main components to connect to and render PipeWire into your app. - KPipeWireRecord: using FFmpeg, helps to record a PipeWire video stream into a file. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:25", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: kpipewire-5.27.2-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:25", "id": "FEDORA:6E8313083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZSALKXS3LAIUFUDD5UO7ZDX7UNRJQUUS/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "KStars is a Desktop Planetarium. It provides an accurate graphical simulation of the night sky, from any location on Earth, at any date and time. The display includes up to 100 million stars, 13,000 deep-sky object s, all 8 planets, the Sun and Moon, and thousands of comets and asteroids. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:26", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: kstars-3.6.3-1.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:26", "id": "FEDORA:BC53230A0376", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7CPNNFR7D4YPAC44I2BZ5NSYRFXF64X3/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "INDI is a distributed control protocol designed to operate astronomical instrumentation. INDI is small, flexible, easy to parse, and scalable. It supports common DCS functions such as remote control, data acquisition, monitoring, and a lot more. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:28", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: libindi-2.0.0-3.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:28", "id": "FEDORA:08477309FD79", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/MT4LGRSWPKOQ4XDBLGXTTCR6GJPHS3F4/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "loudgain is a versatile ReplayGain 2.0 loudness normalizer, based on the EBU R128/ITU BS.1770 standard (-18 LUFS) and supports FLAC/Ogg/MP2/MP3/MP4/M4A/ALAC/Opus/ASF/WMA/WAV/WavPack/AIFF/APE audio files. It uses the well-known mp3gain commandline syntax but will never modify the actual audio data. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:29", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: loudgain-0.6.8-13.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:29", "id": "FEDORA:455F83083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XCKB3WKZS5JAAFOCZARPEVZOZOJRBCWP/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Mpv is a movie player based on MPlayer and mplayer2. It supports a wide var iety of video file formats, audio and video codecs, and subtitle types. Special input URL types are available to read input from a variety of sources other than disk files. Depending on platform, a variety of different video and au dio output methods are supported. Mpv has an OpenGL, Vulkan, and D3D11 based video output that is capable of many features loved by videophiles, such as video scaling with popular high qual ity algorithms, color management, frame timing, interpolation, HDR, and more. While mpv strives for minimalism and provides no real GUI, it has a small controller on top of the video for basic control. Mpv can leverage most hardware decoding APIs on all platforms. Hardware decoding can be enabled at runtime on demand. Powerful scripting capabilities can make the player do almost anything. The re is a large selection of user scripts on the wiki. A straightforward C API was designed from the ground up to make mpv usable as a library and facilitate easy integration into other applications. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:31", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: mpv-0.35.1-3.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:31", "id": "FEDORA:BF67D30A0376", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LI7BE32M7PS53RDLN3S33XIEXOWZBROM/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "MLT is an open source multimedia framework, designed and developed for television broadcasting. It provides a toolkit for broadcasters, video editors,media players, transcoders, web streamers and many more types of applications. The functionality of the system is provided via an assortment of ready to use tools, xml authoring components, and an extendible plug-in based API. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:30", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: mlt-7.14.0-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:30", "id": "FEDORA:826E43083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/6KAFXTJ6DI3CIQB7XQTZXEG7DCKGNIXE/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:56", "description": "Notcurses facilitates the creation of modern TUI programs, making full use of Unicode and 24-bit TrueColor. It presents an API similar to that of Curses, and rides atop Terminfo. This package includes C and C++ shared libraries. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:34", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: notcurses-3.0.8-6.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:34", "id": "FEDORA:827CD3083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/YMETXCBDKLU34FBJ2KSS5AJDO56LTOXC/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "PHD2 is telescope guiding software that simplifies the process of tracking a guide star, letting you concentrate on other aspects of deep-sky imaging or spectroscopy. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:37", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: phd2-2.6.11^dev4^20230212a205f63-1.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:37", "id": "FEDORA:0859030A0711", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/6TMRR6Z5NZ2DT3US7OBUENAKTXHPQFNR/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": " This is a liberally licensed VNC server library that's intended to be fast and neat. Note: This is a beta release, so the interface is not yet stable. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:33", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: neatvnc-0.6.0-2.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:33", "id": "FEDORA:3277230A1F08", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/632IKTPEW2DES6OHXTTAX6NLXTXKEVLR/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "This program is an audio-player, written with help of Qt library. The user interface is similar to winamp or xmms. Main opportunities: \t* Winamp and xmms skins support \t* plugins support \t* MPEG1 layer 2/3 support \t* Ogg Vorbis support \t* native FLAC support \t* WavePack support \t* ModPlug support \t* PCM WAVE support \t* CD Audio support \t* CUE sheet support \t* ALSA sound output \t* JACK sound output \t* OSS sound output \t* PipeWire output \t* Last.fm/Libre.fm scrobbler \t* D-Bus support \t* Spectrum Analyzer \t* projectM visualization \t* sample rate conversion \t* bs2b dsp effect \t* streaming support \t* removable device detection \t* MPRIS support \t* global hotkey support \t* lyrics support ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:38", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: qmmp-2.1.2-4.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:38", "id": "FEDORA:456783083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/5LMR7KIRJHXVZ4N4AHRY3V27O647UPDI/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "Plugin pack is a set of extra plugins for Qmmp. * FFap - enhanced Monkey's Audio (APE) decoder (24-bit samples and embedded cue support) * FFVideo - video playback engine based on FFmpeg library * ModPlug - module player with use of the libmodplug library * SRC - sample rate converter * Goom - audio visualization based on goom project * Ytb - audio playback from YouTube (uses yt-dlp or youtube-dl) ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:39", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: qmmp-plugin-pack-2.1.0-5.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:39", "id": "FEDORA:827043083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XQ3ZTI5FM3YNAKFBYN56S434NJAUJUZC/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "FFmpeg version of headers required to interface with Nvidias codec APIs. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:35", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: nv-codec-headers-12.0.16.0-1.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:35", "id": "FEDORA:BF8483083D3A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/AHZI45I3FZVLAE5NH4BNQQQLZZNIHAAH/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "The Qt Multimedia module provides a rich feature set that enables you to easily take advantage of a platforms multimedia capabilites and hardware. This ranges from the playback and recording of audio and video content to the use of available devices like cameras and radios. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:40", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: qt6-qtmultimedia-6.4.2-4.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:40", "id": "FEDORA:BF90430A6E20", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/OCG2BI3VPS6OBZAKBI75CUZMU3RU4CEJ/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "Qt6 - QtWebEngine components. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:42", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: qt6-qtwebengine-6.4.2-4.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:42", "id": "FEDORA:0852B30A073F", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZFYFAJGRURSDJU3J2IDMKXRCS527KGDJ/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "Siril is an image processing tool specially tailored for noise reduction and improving the signal/noise ratio of an image from multiple captures, as required in astronomy. Siril can align automatically or manually, stack and enhance pictures from various file formats, even images sequences (movies a nd SER files) ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:44", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: siril-1.0.6-6.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:44", "id": "FEDORA:9894F309FD79", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/R2DD7BKLCGGHPVHKYUJ7MEVTWXBZ3FA7/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "unpaper is a post-processing tool for scanned sheets of paper, especially f or book pages that have been scanned from previously created photocopies. The main purpose is to make scanned book pages better readable on screen after conversion to PDF. Additionally, unpaper might be useful to enhance the quality of scanned pages before performing optical character recognition (O CR). unpaper tries to clean scanned images by removing dark edges that appeared through scanning or copying on areas outside the actual page content (e.g. dark areas between the left-hand-side and the right-hand-side of a double-sided book-page scan). The program also tries to detect misaligned centering and rotation of pages and will automatically straighten each page by rotating it to the correct angle. This process is called \"deskewing\". ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:47", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: unpaper-7.0.0-7.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:47", "id": "FEDORA:0886630A6A30", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CCVH4VLBERYPB45PH3RBHKS5D44RFVKG/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "libretro is an API that exposes generic audio/video/input callbacks. A fron tend for libretro (such as RetroArch) handles video output, audio output, input and application lifecycle. A libretro core written in portable C or C++ can run seamlessly on many platforms with very little to no porting effort. While RetroArch is the reference frontend for libretro, several other proje cts have used the libretro interface to include support for emulators and/or ga me engines. libretro is completely open and free for anyone to use. To download and install more libretro cores please read included README.Fed ora file: $ xdg-open /usr/share/doc/retroarch/README.fedora.md ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:43", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: retroarch-1.15.0-4.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:43", "id": "FEDORA:456DC309FF1C", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3KYOI3MFURR42P7E2QA2ZOKTM4RHMILD/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "Stellarium is a real-time 3D photo-realistic nightsky renderer. It can generate images of the sky as seen through the Earth's atmosphere with more than one hundred thousand stars from the Hipparcos Catalogue, constellations, planets, major satellites and nebulas. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:45", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: stellarium-1.2-8.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:45", "id": "FEDORA:BF951309DE01", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NDWRSRMF4CFLLXXYVOCS5FQXTWZNVK5Y/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "wf-recorder is a utility program for screen recording of wlroots-based compositors (more specifically, those that support wlr-screencopy-v1 and xdg-output). ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:48", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: wf-recorder-0.3.1-0.3.20221225gita9725f7.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:48", "id": "FEDORA:73CDD309DE01", "href": "", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-04T18:36:57", "description": "This package contains the Xine library. It can be used to play back various media, decode multimedia files from local disk drives, and display multimedia streamed over the Internet. It interprets many of the most common multimedia formats available - and some uncommon formats, too. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-14T00:24:49", "type": "fedora", "title": "[SECURITY] Fedora 38 Update: xine-lib-1.2.13-1.fc38", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-0927", "CVE-2023-0928", "CVE-2023-0929", "CVE-2023-0930", "CVE-2023-0931", "CVE-2023-0932", "CVE-2023-0933", "CVE-2023-0941", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227"], "modified": "2023-03-14T00:24:49", "id": "FEDORA:BBF52309DE01", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FH77LIZOTVVJREGBRY453MVXXLX2QXMM/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2023-03-10T01:05:25", "description": "\nMultiple security issues were discovered in Chromium, which could result\nin the execution of arbitrary code, denial of service or information\ndisclosure.\n\n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 111.0.5563.64-1~deb11u1.\n\n\nWe recommend that you upgrade your chromium packages.\n\n\nFor the detailed security status of chromium please refer to\nits security tracker page at:\n[\\\nhttps://security-tracker.debian.org/tracker/chromium](https://security-tracker.debian.org/tracker/chromium)\n\n\n", "cvss3": {}, "published": "2023-03-09T00:00:00", "type": "osv", "title": "chromium - security update", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-10T01:05:23", "id": "OSV:DSA-5371-1", "href": "https://osv.dev/vulnerability/DSA-5371-1", "cvss": {"score": 0.0, "vector": "NONE"}}], "debian": [{"lastseen": "2023-06-03T18:10:08", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5371-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nMarch 09, 2023 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium\nCVE ID : CVE-2023-1213 CVE-2023-1214 CVE-2023-1215 CVE-2023-1216 \n CVE-2023-1217 CVE-2023-1218 CVE-2023-1219 CVE-2023-1220 \n CVE-2023-1221 CVE-2023-1222 CVE-2023-1223 CVE-2023-1224 \n CVE-2023-1225 CVE-2023-1226 CVE-2023-1227 CVE-2023-1228 \n CVE-2023-1229 CVE-2023-1230 CVE-2023-1231 CVE-2023-1232 \n CVE-2023-1233 CVE-2023-1234 CVE-2023-1235 CVE-2023-1236\n\nMultiple security issues were discovered in Chromium, which could result\nin the execution of arbitrary code, denial of service or information\ndisclosure.\n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 111.0.5563.64-1~deb11u1.\n\nWe recommend that you upgrade your chromium packages.\n\nFor the detailed security status of chromium please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-09T19:25:21", "type": "debian", "title": "[SECURITY] [DSA 5371-1] chromium security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-09T19:25:21", "id": "DEBIAN:DSA-5371-1:764AC", "href": "https://lists.debian.org/debian-security-announce/2023/msg00060.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2023-06-04T18:31:19", "description": "\n\nChrome Releases reports:\n\nThis update includes 40 security fixes:\n\n[1411210] High CVE-2023-1213: Use after free in Swiftshader. Reported by Jaehun Jeong(@n3sk) of Theori on 2023-01-30\n[1412487] High CVE-2023-1214: Type Confusion in V8. Reported by Man Yue Mo of GitHub Security Lab on 2023-02-03\n[1417176] High CVE-2023-1215: Type Confusion in CSS. Reported by Anonymous on 2023-02-17\n[1417649] High CVE-2023-1216: Use after free in DevTools. Reported by Ganjiang Zhou(@refrain_areu) of ChaMd5-H1 team on 2023-02-21\n[1412658] High CVE-2023-1217: Stack buffer overflow in Crash reporting. Reported by sunburst of Ant Group Tianqiong Security Lab on 2023-02-03\n[1413628] High CVE-2023-1218: Use after free in WebRTC. Reported by Anonymous on 2023-02-07\n[1415328] High CVE-2023-1219: Heap buffer overflow in Metrics. Reported by Sergei Glazunov of Google Project Zero on 2023-02-13\n[1417185] High CVE-2023-1220: Heap buffer overflow in UMA. Reported by Sergei Glazunov of Google Project Zero on 2023-02-17\n[1385343] Medium CVE-2023-1221: Insufficient policy enforcement in Extensions API. Reported by Ahmed ElMasry on 2022-11-16\n[1403515] Medium CVE-2023-1222: Heap buffer overflow in Web Audio API. Reported by Cassidy Kim(@cassidy6564) on 2022-12-24\n[1398579] Medium CVE-2023-1223: Insufficient policy enforcement in Autofill. Reported by Ahmed ElMasry on 2022-12-07\n[1403539] Medium CVE-2023-1224: Insufficient policy enforcement in Web Payments API. Reported by Thomas Orlita on 2022-12-25\n[1408799] Medium CVE-2023-1225: Insufficient policy enforcement in Navigation. Reported by Roberto Ffrench-Davis @Lihaft on 2023-01-20\n[1013080] Medium CVE-2023-1226: Insufficient policy enforcement in Web Payments API. Reported by Anonymous on 2019-10-10\n[1348791] Medium CVE-2023-1227: Use after free in Core. Reported by @ginggilBesel on 2022-07-31\n[1365100] Medium CVE-2023-1228: Insufficient policy enforcement in Intents. Reported by Axel Chong on 2022-09-18\n[1160485] Medium CVE-2023-1229: Inappropriate implementation in Permission prompts. Reported by Thomas Orlita on 2020-12-20\n[1404230] Medium CVE-2023-1230: Inappropriate implementation in WebApp Installs. Reported by Axel Chong on 2022-12-30\n[1274887] Medium CVE-2023-1231: Inappropriate implementation in Autofill. Reported by Yan Zhu, Brave on 2021-11-30\n[1346924] Low CVE-2023-1232: Insufficient policy enforcement in Resource Timing. Reported by Sohom Datta on 2022-07-24\n[1045681] Low CVE-2023-1233: Insufficient policy enforcement in Resource Timing. Reported by Soroush Karami on 2020-01-25\n[1404621] Low CVE-2023-1234: Inappropriate implementation in Intents. Reported by Axel Chong on 2023-01-03\n[1404704] Low CVE-2023-1235: Type Confusion in DevTools. Reported by raven at KunLun lab on 2023-01-03\n[1374518] Low CVE-2023-1236: Inappropriate implementation in Internals. Reported by Alesandro Ortiz on 2022-10-14\n\n\n\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-08T00:00:00", "type": "freebsd", "title": "chromium -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-08T00:00:00", "id": "D357F6BB-0AF4-4AC9-B096-EEEC183AD829", "href": "https://vuxml.freebsd.org/freebsd/d357f6bb-0af4-4ac9-b096-eeec183ad829.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "mageia": [{"lastseen": "2023-06-04T19:14:16", "description": "High CVE-2023-1213: Use after free in Swiftshader. Reported by Jaehun Jeong(@n3sk) of Theori on 2023-01-30 High CVE-2023-1214: Type Confusion in V8. Reported by Man Yue Mo of GitHub Security Lab on 2023-02-03 High CVE-2023-1215: Type Confusion in CSS. Reported by Anonymous on 2023-02-17 High CVE-2023-1216: Use after free in DevTools. Reported by Ganjiang Zhou(@refrain_areu) of ChaMd5-H1 team on 2023-02-21 High CVE-2023-1217: Stack buffer overflow in Crash reporting. Reported by sunburst of Ant Group Tianqiong Security Lab on 2023-02-03 High CVE-2023-1218: Use after free in WebRTC. Reported by Anonymous on 2023-02-07 High CVE-2023-1219: Heap buffer overflow in Metrics. Reported by Sergei Glazunov of Google Project Zero on 2023-02-13 High CVE-2023-1220: Heap buffer overflow in UMA. Reported by Sergei Glazunov of Google Project Zero on 2023-02-17 Medium CVE-2023-1221: Insufficient policy enforcement in Extensions API. Reported by Ahmed ElMasry on 2022-11-16 Medium CVE-2023-1222: Heap buffer overflow in Web Audio API. Reported by Cassidy Kim(@cassidy6564) on 2022-12-24 Medium CVE-2023-1223: Insufficient policy enforcement in Autofill. Reported by Ahmed ElMasry on 2022-12-07 Medium CVE-2023-1224: Insufficient policy enforcement in Web Payments API. Reported by Thomas Orlita on 2022-12-25 Medium CVE-2023-1225: Insufficient policy enforcement in Navigation. Reported by Roberto Ffrench-Davis @Lihaft on 2023-01-20 Medium CVE-2023-1226: Insufficient policy enforcement in Web Payments API. Reported by Anonymous on 2019-10-10 Medium CVE-2023-1227: Use after free in Core. Reported by @ginggilBesel on 2022-07-31 Medium CVE-2023-1228: Insufficient policy enforcement in Intents. Reported by Axel Chong on 2022-09-18 Medium CVE-2023-1229: Inappropriate implementation in Permission prompts. Reported by Thomas Orlita on 2020-12-20 Medium CVE-2023-1230: Inappropriate implementation in WebApp Installs. Reported by Axel Chong on 2022-12-30 Medium CVE-2023-1231: Inappropriate implementation in Autofill. Reported by Yan Zhu, Brave on 2021-11-30 Low CVE-2023-1232: Insufficient policy enforcement in Resource Timing. Reported by Sohom Datta on 2022-07-24 Low CVE-2023-1233: Insufficient policy enforcement in Resource Timing. Reported by Soroush Karami on 2020-01-25 Low CVE-2023-1234: Inappropriate implementation in Intents. Reported by Axel Chong on 2023-01-03 Low CVE-2023-1235: Type Confusion in DevTools. Reported by raven at KunLun lab on 2023-01-03 Low CVE-2023-1236: Inappropriate implementation in Internals. Reported by Alesandro Ortiz on 2022-10-14 \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-11T19:00:39", "type": "mageia", "title": "Updated chromium-browser-stable packages fix security vulnerability\n", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-11T19:00:39", "id": "MGASA-2023-0090", "href": "https://advisories.mageia.org/MGASA-2023-0090.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "chrome": [{"lastseen": "2023-06-04T20:04:22", "description": "The Chrome team is delighted to announce the promotion of Chrome 111 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.\n\n\n\nChrome 111.0.5563.64 (Linux and Mac), 111.0.5563.64/.65( Windows) contains a number of fixes and improvements -- a list of changes is available in the[ log](<https://chromium.googlesource.com/chromium/src/+log/110.0.5481.178..111.0.5563.65?pretty=fuller&n=10000>). Watch out for upcoming[ ](<https://chrome.blogspot.com/>)[Chrome](<https://chrome.blogspot.com/>) and[ Chromium](<https://blog.chromium.org/>) blog posts about new features and big efforts delivered in 111.\n\n\n\n\nSecurity Fixes and Rewards\n\nNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed.\n\n\n\n\nThis update includes [40](<https://bugs.chromium.org/p/chromium/issues/list?can=1&q=type%3Abug-security+os%3DAndroid%2Cios%2Clinux%2Cmac%2Cwindows%2Call%2Cchrome+label%3ARelease-0-M111>) security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the [Chrome Security Page](<https://sites.google.com/a/chromium.org/dev/Home/chromium-security>) for more information.\n\n\n\n\n[$15000][[1411210](<https://crbug.com/1411210>)] High CVE-2023-1213: Use after free in Swiftshader. Reported by Jaehun Jeong(@n3sk) of Theori on 2023-01-30\n\n[$10000][[1412487](<https://crbug.com/1412487>)] High CVE-2023-1214: Type Confusion in V8. Reported by Man Yue Mo of GitHub Security Lab on 2023-02-03\n\n[$7000][[1417176](<https://crbug.com/1417176>)] High CVE-2023-1215: Type Confusion in CSS. Reported by Anonymous on 2023-02-17\n\n[$4000][[1417649](<https://crbug.com/1417649>)] High CVE-2023-1216: Use after free in DevTools. Reported by Ganjiang Zhou(@refrain_areu) of ChaMd5-H1 team on 2023-02-21\n\n[$3000][[1412658](<https://crbug.com/1412658>)] High CVE-2023-1217: Stack buffer overflow in Crash reporting. Reported by sunburst of Ant Group Tianqiong Security Lab on 2023-02-03\n\n[$3000][[1413628](<https://crbug.com/1413628>)] High CVE-2023-1218: Use after free in WebRTC. Reported by Anonymous on 2023-02-07\n\n[$TBD][[1415328](<https://crbug.com/1415328>)] High CVE-2023-1219: Heap buffer overflow in Metrics. Reported by Sergei Glazunov of Google Project Zero on 2023-02-13\n\n[$TBD][[1417185](<https://crbug.com/1417185>)] High CVE-2023-1220: Heap buffer overflow in UMA. Reported by Sergei Glazunov of Google Project Zero on 2023-02-17\n\n[$10000][[1385343](<https://crbug.com/1385343>)] Medium CVE-2023-1221: Insufficient policy enforcement in Extensions API. Reported by Ahmed ElMasry on 2022-11-16\n\n[$7000][[1403515](<https://crbug.com/1403515>)] Medium CVE-2023-1222: Heap buffer overflow in Web Audio API. Reported by Cassidy Kim(@cassidy6564) on 2022-12-24\n\n[$5000][[1398579](<https://crbug.com/1398579>)] Medium CVE-2023-1223: Insufficient policy enforcement in Autofill. Reported by Ahmed ElMasry on 2022-12-07\n\n[$5000][[1403539](<https://crbug.com/1403539>)] Medium CVE-2023-1224: Insufficient policy enforcement in Web Payments API. Reported by Thomas Orlita on 2022-12-25\n\n[$5000][[1408799](<https://crbug.com/1408799>)] Medium CVE-2023-1225: Insufficient policy enforcement in Navigation. Reported by Roberto Ffrench-Davis @Lihaft on 2023-01-20\n\n[$3000][[1013080](<https://crbug.com/1013080>)] Medium CVE-2023-1226: Insufficient policy enforcement in Web Payments API. Reported by Anonymous on 2019-10-10\n\n[$3000][[1348791](<https://crbug.com/1348791>)] Medium CVE-2023-1227: Use after free in Core. Reported by @ginggilBesel on 2022-07-31\n\n[$3000][[1365100](<https://crbug.com/1365100>)] Medium CVE-2023-1228: Insufficient policy enforcement in Intents. Reported by Axel Chong on 2022-09-18\n\n[$2000][[1160485](<https://crbug.com/1160485>)] Medium CVE-2023-1229: Inappropriate implementation in Permission prompts. Reported by Thomas Orlita on 2020-12-20\n\n[$2000][[1404230](<https://crbug.com/1404230>)] Medium CVE-2023-1230: Inappropriate implementation in WebApp Installs. Reported by Axel Chong on 2022-12-30\n\n[$NA][[1274887](<https://crbug.com/1274887>)] Medium CVE-2023-1231: Inappropriate implementation in Autofill. Reported by Kirtikumar Anandrao Ramchandani via Yan Zhu of Brave on 2021-11-30\n\n[$2000][[1346924](<https://crbug.com/1346924>)] Low CVE-2023-1232: Insufficient policy enforcement in Resource Timing. Reported by Sohom Datta on 2022-07-24\n\n[$1000][[1045681](<https://crbug.com/1045681>)] Low CVE-2023-1233: Insufficient policy enforcement in Resource Timing. Reported by Soroush Karami on 2020-01-25\n\n[$1000][[1404621](<https://crbug.com/1404621>)] Low CVE-2023-1234: Inappropriate implementation in Intents. Reported by Axel Chong on 2023-01-03\n\n[$1000][[1404704](<https://crbug.com/1404704>)] Low CVE-2023-1235: Type Confusion in DevTools. Reported by raven at KunLun lab on 2023-01-03\n\n[$TBD][[1374518](<https://crbug.com/1374518>)] Low CVE-2023-1236: Inappropriate implementation in Internals. Reported by Alesandro Ortiz on 2022-10-14\n\n\n\n\nWe would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. \n\nAs usual, our ongoing internal security work was responsible for a wide range of fixes:\n\n * [[1422099](<https://crbug.com/1422099>)] Various fixes from internal audits, fuzzing and other initiatives\n\n\nMany of our security bugs are detected using [AddressSanitizer](<https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer>), [MemorySanitizer](<https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer>), [UndefinedBehaviorSanitizer](<https://www.chromium.org/developers/testing/undefinedbehaviorsanitizer>), [Control Flow Integrity](<https://sites.google.com/a/chromium.org/dev/developers/testing/control-flow-integrity>), [libFuzzer](<https://sites.google.com/a/chromium.org/dev/developers/testing/libfuzzer>), or [AFL](<https://github.com/google/afl>).\n\n\n\n\nInterested in switching release channels? Find out how [here](<https://www.chromium.org/getting-involved/dev-channel>). If you find a new issue, please let us know by [filing a bug](<https://crbug.com/>). The [community help forum](<https://support.google.com/chrome/community>) is also a great place to reach out for help or learn about common issues.\n\n\n\n\n\n\n\n\nPrudhvikumar Bommana\n\nGoogle Chrome", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-03-07T00:00:00", "type": "chrome", "title": "Stable Channel Update for Desktop", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1225", "CVE-2023-1226", "CVE-2023-1227", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236"], "modified": "2023-03-07T00:00:00", "id": "GCSA-131074219889509822", "href": "https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "rapid7blog": [{"lastseen": "2023-03-15T02:15:25", "description": "\n\nMicrosoft is offering fixes for 101 security issues for [March 2023 Patch Tuesday](<https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar>), including two zero-day vulnerabilities; the most interesting of the two zero-day vulnerabilities is a flaw in Outlook which allows an attacker to authenticate against arbitrary remote resources as another user.\n\n[CVE-2023-23397](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23397>) describes a Critical Elevation of Privilege vulnerability affecting Outlook for Windows, which is concerning for several reasons. Microsoft has detected in-the-wild exploitation by a Russia-based threat actor targeting government, military, and critical infrastructure targets in Europe.\n\nAn attacker could use a specially-crafted email to cause Outlook to send NTLM authentication messages to an attacker-controlled SMB share, and can then use that information to authenticate against other services offering NTLM authentication. Given the network attack vector, the ubiquity of SMB shares, and the lack of user interaction required, an attacker with a suitable existing foothold on a network may well consider this vulnerability a prime candidate for lateral movement.\n\nThe vulnerability was discovered by Microsoft Threat Intelligence, who have published a Microsoft Security Research Center[ blog post](<https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/>) describing the issue in detail, and which provides a Microsoft script and accompanying documentation to[ detect if an asset has been compromised using CVE-2023-23397](<https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/>).\n\nCurrent self-hosted versions of Outlook \u2013 including Microsoft 365 Apps for Enterprise \u2013 are vulnerable to CVE-2023-23397, but Microsoft-hosted online services (e.g., Microsoft 365) are not vulnerable. Microsoft has calculated a CVSSv3 base score of 9.8.\n\nThe other zero-day vulnerability this month,[ CVE-2023-24880](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24880>), describes a Security Feature Bypass in Windows SmartScreen, which is part of Microsoft\u2019s slate of endpoint protection offerings. A specially crafted file could avoid receiving Mark of the Web and thus dodge the enhanced scrutiny usually applied to files downloaded from the internet.\n\nAlthough Microsoft has seen in-the-wild exploitation, and original reporter [Google TAG has linked CVE-2023-24880 to delivery of Magniber malware](<https://blog.google/threat-analysis-group/magniber-ransomware-actors-used-a-variant-of-microsoft-smartscreen-bypass/>), Microsoft has assessed it as only Moderate severity \u2013 the only one this month \u2013 and assigned it a relatively low CVSSv3 base score of 5.4; the low impact ratings and requirement for user interaction contribute to the lower scoring. This vulnerability thus has the unusual distinction of being both an exploited-in-the-wild zero-day vulnerability and also the lowest-ranked vulnerability on Microsoft's severity scale in this month's Patch Tuesday. Only more recent versions of Windows are affected: Windows 10 and 11, as well as Server 2016 onwards.\n\nA further five critical Remote Code Execution (RCE) vulnerabilities are patched this month in Windows low-level components. Three of these are assessed as Exploitation More Likely, and most of them affect a wide range of Windows versions, with the exception of [CVE-2023-23392](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23392>) which affects only Windows 11 and Windows Server 2022. Only assets where HTTP/3 has been enabled are potentially vulnerable \u2013 it is disabled by default \u2013 yet Microsoft still assesses this vulnerability as Exploitation More Likely, perhaps because HTTP endpoints are typically accessible.\n\n[CVE-2023-21708](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21708>) is a Remote Procedure Call (RPC) vulnerability with a base CVSSv3 of 9.8. Microsoft recommends blocking TCP port 135 at the perimeter as a mitigation; given the perennial nature of RPC vulnerabilities, defenders will know that this has always been good advice.\n\nAnother veteran class of vulnerability makes a return this month: [CVE-2023-23415](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23415>) describes an attack involving a fragmented packet inside the header of another ICMP packet. Insufficient validation of ICMP packets has been a source of vulnerabilities since the dawn of time; the original and still-infamous Ping of Death vulnerability, which affected a wide range of vendors and operating systems, was one of the first vulnerabilities ever to be assigned a CVE, [way back in 1999](<https://nvd.nist.gov/vuln/detail/CVE-1999-0128>).\n\nRounding out the remaining Critical RCE vulnerabilities this month are a [malicious certificate attack](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23416>) leading to Arbitrary Code Execution (ACE), and an [attack against Windows Remote Access Server (RAS)](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23404>) which happily requires the attacker to win a race condition and is thus harder to exploit.\n\nMicrosoft has addressed two related vulnerabilities introduced via the Trusted Platform Module (TPM) 2.0 reference implementation code published by the Trusted Computing Group industry alliance. [CVE-2023-1017](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-1017>) is an out-of-bounds write, and [CVE-2023-1018](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-1018>) is an out-of-bounds read. Both may be triggered without elevated privileges, and may allow an attacker to access or modify highly-privileged information inside the TPM itself. Defenders managing non-Microsoft assets should note that a wide range of vendors including widely used Linux distros are also affected by this pair of vulnerabilities.\n\nAdmins who still remember the aptly-named PrintNightmare vulnerability from the summer of 2021 may well raise a wary eyebrow at this month\u2019s batch of 18 fixes for the Microsoft PostScript and PCL6 Class Printer Driver, but there\u2019s no sign that any of these are cause for the same level of concern, not least because there has been no known public disclosure prior to Microsoft releasing patches.\n\nAzure administrators who update their Service Fabric Cluster manually should note that [CVE-2023-23383](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23383>) describes a spoofing vulnerability in the web management client where a user clicking a suitably-crafted malicious link could unwittingly execute actions against the remote cluster. Azure estates with automatic upgrades enabled are already protected.\n\n## Summary charts\n\nLots of Important vulnerabilities\n\nRemote Code Execution and Elevation of Privilege vulnerabilities remain a key focus\n\nAs always, vulnerability count is not necessarily a proxy for risk or exposurePrinter drivers and Microsoft Dynamics received a significant number of fixes\n\n## Summary tables\n\n### Apps vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-24890](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24890>) | Microsoft OneDrive for iOS Security Feature Bypass Vulnerability | No | No | 6.5 \n \n### Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23383](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23383>) | Service Fabric Explorer Spoofing Vulnerability | No | No | 8.2 \n[CVE-2023-23408](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23408>) | Azure Apache Ambari Spoofing Vulnerability | No | No | 4.5 \n \n### Browser vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-24892](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24892>) | Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability | No | No | 7.1 \n[CVE-2023-1236](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1236>) | Chromium: CVE-2023-1236 Inappropriate implementation in Internals | No | No | N/A \n[CVE-2023-1235](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1235>) | Chromium: CVE-2023-1235 Type Confusion in DevTools | No | No | N/A \n[CVE-2023-1234](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1234>) | Chromium: CVE-2023-1234 Inappropriate implementation in Intents | No | No | N/A \n[CVE-2023-1233](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1233>) | Chromium: CVE-2023-1233 Insufficient policy enforcement in Resource Timing | No | No | N/A \n[CVE-2023-1232](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1232>) | Chromium: CVE-2023-1232 Insufficient policy enforcement in Resource Timing | No | No | N/A \n[CVE-2023-1231](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1231>) | Chromium: CVE-2023-1231 Inappropriate implementation in Autofill | No | No | N/A \n[CVE-2023-1230](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1230>) | Chromium: CVE-2023-1230 Inappropriate implementation in WebApp Installs | No | No | N/A \n[CVE-2023-1229](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1229>) | Chromium: CVE-2023-1229 Inappropriate implementation in Permission prompts | No | No | N/A \n[CVE-2023-1228](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1228>) | Chromium: CVE-2023-1228 Insufficient policy enforcement in Intents | No | No | N/A \n[CVE-2023-1224](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1224>) | Chromium: CVE-2023-1224 Insufficient policy enforcement in Web Payments API | No | No | N/A \n[CVE-2023-1223](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1223>) | Chromium: CVE-2023-1223 Insufficient policy enforcement in Autofill | No | No | N/A \n[CVE-2023-1222](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1222>) | Chromium: CVE-2023-1222 Heap buffer overflow in Web Audio API | No | No | N/A \n[CVE-2023-1221](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1221>) | Chromium: CVE-2023-1221 Insufficient policy enforcement in Extensions API | No | No | N/A \n[CVE-2023-1220](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1220>) | Chromium: CVE-2023-1220 Heap buffer overflow in UMA | No | No | N/A \n[CVE-2023-1219](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1219>) | Chromium: CVE-2023-1219 Heap buffer overflow in Metrics | No | No | N/A \n[CVE-2023-1218](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1218>) | Chromium: CVE-2023-1218 Use after free in WebRTC | No | No | N/A \n[CVE-2023-1217](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1217>) | Chromium: CVE-2023-1217 Stack buffer overflow in Crash reporting | No | No | N/A \n[CVE-2023-1216](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1216>) | Chromium: CVE-2023-1216 Use after free in DevTools | No | No | N/A \n[CVE-2023-1215](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1215>) | Chromium: CVE-2023-1215 Type Confusion in CSS | No | No | N/A \n[CVE-2023-1214](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1214>) | Chromium: CVE-2023-1214 Type Confusion in V8 | No | No | N/A \n[CVE-2023-1213](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1213>) | Chromium: CVE-2023-1213 Use after free in Swiftshader | No | No | N/A \n \n### Developer Tools vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23946](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23946>) | GitHub: CVE-2023-23946 mingit Remote Code Execution Vulnerability | No | No | N/A \n[CVE-2023-23618](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23618>) | GitHub: CVE-2023-23618 Git for Windows Remote Code Execution Vulnerability | No | No | N/A \n[CVE-2023-22743](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-22743>) | GitHub: CVE-2023-22743 Git for Windows Installer Elevation of Privilege Vulnerability | No | No | N/A \n[CVE-2023-22490](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-22490>) | GitHub: CVE-2023-22490 mingit Information Disclosure Vulnerability | No | No | N/A \n \n### ESU Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-21708](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21708>) | Remote Procedure Call Runtime Remote Code Execution Vulnerability | No | No | 9.8 \n[CVE-2023-23415](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23415>) | Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability | No | No | 9.8 \n[CVE-2023-23405](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23405>) | Remote Procedure Call Runtime Remote Code Execution Vulnerability | No | No | 8.1 \n[CVE-2023-24908](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24908>) | Remote Procedure Call Runtime Remote Code Execution Vulnerability | No | No | 8.1 \n[CVE-2023-24869](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24869>) | Remote Procedure Call Runtime Remote Code Execution Vulnerability | No | No | 8.1 \n[CVE-2023-23401](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23401>) | Windows Media Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-23402](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23402>) | Windows Media Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-23420](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23420>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23421](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23421>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23422](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23422>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23423](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23423>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23410](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23410>) | Windows HTTP.sys Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23407](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23407>) | Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability | No | No | 7.1 \n[CVE-2023-23414](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23414>) | Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability | No | No | 7.1 \n[CVE-2023-23385](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23385>) | Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-24861](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24861>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-24862](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24862>) | Windows Secure Channel Denial of Service Vulnerability | No | No | 5.5 \n[CVE-2023-23394](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23394>) | Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability | No | No | 5.5 \n[CVE-2023-23409](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23409>) | Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability | No | No | 5.5 \n \n### Microsoft Dynamics vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-24922](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24922>) | Microsoft Dynamics 365 Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24919](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24919>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 5.4 \n[CVE-2023-24879](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24879>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 5.4 \n[CVE-2023-24920](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24920>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 5.4 \n[CVE-2023-24891](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24891>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 5.4 \n[CVE-2023-24921](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24921>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 4.1 \n \n### Microsoft Office vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23397](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23397>) | Microsoft Outlook Elevation of Privilege Vulnerability | Yes | No | 9.8 \n[CVE-2023-24930](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24930>) | Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23399](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23399>) | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-23398](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23398>) | Microsoft Excel Spoofing Vulnerability | No | No | 7.1 \n[CVE-2023-23396](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23396>) | Microsoft Excel Denial of Service Vulnerability | No | No | 6.5 \n[CVE-2023-23391](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23391>) | Office for Android Spoofing Vulnerability | No | No | 5.5 \n[CVE-2023-24923](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24923>) | Microsoft OneDrive for Android Information Disclosure Vulnerability | No | No | 5.5 \n[CVE-2023-24882](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24882>) | Microsoft OneDrive for Android Information Disclosure Vulnerability | No | No | 5.5 \n[CVE-2023-23395](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23395>) | Microsoft SharePoint Server Spoofing Vulnerability | No | No | 3.1 \n \n### Microsoft Office ESU Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-24910](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24910>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 \n \n### System Center vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23389](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23389>) | Microsoft Defender Elevation of Privilege Vulnerability | No | No | 6.3 \n \n### Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23392](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23392>) | HTTP Protocol Stack Remote Code Execution Vulnerability | No | No | 9.8 \n[CVE-2023-24871](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24871>) | Windows Bluetooth Service Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-23388](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23388>) | Windows Bluetooth Driver Elevation of Privilege Vulnerability | No | No | 8.8 \n[CVE-2023-23403](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23403>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-23406](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23406>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-23413](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23413>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24867](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24867>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24907](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24907>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24868](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24868>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24909](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24909>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24872](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24872>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24913](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24913>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24876](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24876>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24864](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24864>) | Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability | No | No | 8.8 \n[CVE-2023-1018](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1018>) | CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability | No | No | 8.8 \n[CVE-2023-1017](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1017>) | CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability | No | No | 8.8 \n[CVE-2023-23416](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23416>) | Windows Cryptographic Services Remote Code Execution Vulnerability | No | No | 8.4 \n[CVE-2023-23404](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23404>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 \n[CVE-2023-23418](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23418>) | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23419](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23419>) | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23417](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23417>) | Windows Partition Management Driver Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-23412](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23412>) | Windows Accounts Picture Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-24859](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24859>) | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-23400](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23400>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 7.2 \n[CVE-2023-23393](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23393>) | Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-23411](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23411>) | Windows Hyper-V Denial of Service Vulnerability | No | No | 6.5 \n[CVE-2023-24856](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24856>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24857](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24857>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24858](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24858>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24863](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24863>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24865](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24865>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24866](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24866>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24906](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24906>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24870](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24870>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24911](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24911>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-24880](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24880>) | Windows SmartScreen Security Feature Bypass Vulnerability | Yes | Yes | 5.4 \n \nNote that Microsoft has not provided CVSSv3 scores for vulnerabilities in Chromium, which is an open-source software consumed by Microsoft Edge. [Chrome](<https://www.cve.org/PartnerInformation/ListofPartners/partner/Chrome>), rather than Microsoft, is the assigning CNA for Chromium vulnerabilities. Microsoft documents this class of vulnerability in the Security Upgrade Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-03-14T23:46:44", "type": "rapid7blog", "title": "Patch Tuesday - March 2023", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-1999-0128", "CVE-2023-1017", "CVE-2023-1018", "CVE-2023-1213", "CVE-2023-1214", "CVE-2023-1215", "CVE-2023-1216", "CVE-2023-1217", "CVE-2023-1218", "CVE-2023-1219", "CVE-2023-1220", "CVE-2023-1221", "CVE-2023-1222", "CVE-2023-1223", "CVE-2023-1224", "CVE-2023-1228", "CVE-2023-1229", "CVE-2023-1230", "CVE-2023-1231", "CVE-2023-1232", "CVE-2023-1233", "CVE-2023-1234", "CVE-2023-1235", "CVE-2023-1236", "CVE-2023-21708", "CVE-2023-22490", "CVE-2023-22743", "CVE-2023-23383", "CVE-2023-23385", "CVE-2023-23388", "CVE-2023-23389", "CVE-2023-23391", "CVE-2023-23392", "CVE-2023-23393", "CVE-2023-23394", "CVE-2023-23395", "CVE-2023-23396", "CVE-2023-23397", "CVE-2023-23398", "CVE-2023-23399", "CVE-2023-23400", "CVE-2023-23401", "CVE-2023-23402", "CVE-2023-23403", "CVE-2023-23404", "CVE-2023-23405", "CVE-2023-23406", "CVE-2023-23407", "CVE-2023-23408", "CVE-2023-23409", "CVE-2023-23410", "CVE-2023-23411", "CVE-2023-23412", "CVE-2023-23413", "CVE-2023-23414", "CVE-2023-23415", "CVE-2023-23416", "CVE-2023-23417", "CVE-2023-23418", "CVE-2023-23419", "CVE-2023-23420", "CVE-2023-23421", "CVE-2023-23422", "CVE-2023-23423", "CVE-2023-23618", "CVE-2023-23946", "CVE-2023-24856", "CVE-2023-24857", "CVE-2023-24858", "CVE-2023-24859", "CVE-2023-24861", "CVE-2023-24862", "CVE-2023-24863", "CVE-2023-24864", "CVE-2023-24865", "CVE-2023-24866", "CVE-2023-24867", "CVE-2023-24868", "CVE-2023-24869", "CVE-2023-24870", "CVE-2023-24871", "CVE-2023-24872", "CVE-2023-24876", "CVE-2023-24879", "CVE-2023-24880", "CVE-2023-24882", "CVE-2023-24890", "CVE-2023-24891", "CVE-2023-24892", "CVE-2023-24906", "CVE-2023-24907", "CVE-2023-24908", "CVE-2023-24909", "CVE-2023-24910", "CVE-2023-24911", "CVE-2023-24913", "CVE-2023-24919", "CVE-2023-24920", "CVE-2023-24921", "CVE-2023-24922", "CVE-2023-24923", "CVE-2023-24930"], "modified": "2023-03-14T23:46:44", "id": "RAPID7BLOG:FBFE60314F3C3F1F74D008F1D358D06D", "href": "https://blog.rapid7.com/2023/03/14/patch-tuesday-march-2023/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}