← Voltar para CVEs
CVE-2023-4762
HIGHCISA KEV8.8
Descricao
Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
Detalhes CVE
Pontuacao CVSS v3.18.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado9/5/2023
Ultima modificacao10/24/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorGoogle
ProdutoChromium V8
Nome da vulnerabilidadeGoogle Chromium V8 Type Confusion Vulnerability
Data inclusao KEV2024-02-06
Prazo de remediacao2024-02-27
Uso em ransomwareUnknown
Produtos afetados
debian:debian_linuxfedoraproject:fedoragoogle:chromemicrosoft:edge_chromium
Fraquezas (CWE)
CWE-843CWE-843
Referencias
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html(chrome-cve-admin@google.com)
https://crbug.com/1473247(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/(chrome-cve-admin@google.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/(chrome-cve-admin@google.com)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202311-11(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202312-07(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/202401-34(chrome-cve-admin@google.com)
https://www.debian.org/security/2023/dsa-5491(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1473247(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/(af854a3a-2127-422b-91ae-364da2661108)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202311-11(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202312-07(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202401-34(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5491(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4762(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.