Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:43588
HistoryOct 08, 2023 - 8:09 a.m.

Use After Free

2023-10-0808:09:39
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
12
chromium
vulnerability
remote attacker
exploit
heap corruption
ui interaction

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

56.3%

chromium is vulnerable to Use After Free. The vulnerability allows a remote attacker to potentially exploit heap corruption via crafted UI interaction when they convinces a user to engage in specific UI interaction.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

56.3%