← Volver a CVEs
CVE-2023-4350
MEDIUM6.5
Descripcion
Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)
Detalles CVE
Puntuacion CVSS v3.16.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado8/15/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxfedoraproject:fedoragoogle:androidgoogle:chrome
Referencias
https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html(chrome-cve-admin@google.com)
https://crbug.com/1454817(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202401-34(chrome-cve-admin@google.com)
https://www.debian.org/security/2023/dsa-5479(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1454817(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202401-34(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5479(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.