Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory | |
References | () https://crbug.com/1335974 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/ - |
Information
Published : 2023-07-29 00:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2313
Mitre link : CVE-2023-2313
CVE.ORG link : CVE-2023-2313
JSON object : View
Products Affected
- chrome
microsoft
- windows
CWE