← Retour aux CVEs
CVE-2023-4762
HIGHCISA KEV8.8
Description
Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie9/5/2023
Derniere modification10/24/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurGoogle
ProduitChromium V8
Nom vulnerabiliteGoogle Chromium V8 Type Confusion Vulnerability
Date ajout KEV2024-02-06
Date limite remediation2024-02-27
Utilise dans ransomwareUnknown
Produits affectes
debian:debian_linuxfedoraproject:fedoragoogle:chromemicrosoft:edge_chromium
Faiblesses (CWE)
CWE-843CWE-843
References
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html(chrome-cve-admin@google.com)
https://crbug.com/1473247(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/(chrome-cve-admin@google.com)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202311-11(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202312-07(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202401-34(chrome-cve-admin@google.com)
https://www.debian.org/security/2023/dsa-5491(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1473247(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/(af854a3a-2127-422b-91ae-364da2661108)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202311-11(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202312-07(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202401-34(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5491(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4762(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.