Show filters
610 Total Results
Displaying 81-90 of 610
Sort by:
Attacker Value
Unknown

CVE-2023-5631

Disclosure Date: October 18, 2023 (last updated February 14, 2025)
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
Attacker Value
Unknown

CVE-2023-5484

Disclosure Date: October 11, 2023 (last updated November 16, 2023)
Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Attacker Value
Unknown

CVE-2023-5475

Disclosure Date: October 11, 2023 (last updated November 16, 2023)
Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)
Attacker Value
Unknown

CVE-2023-5218

Disclosure Date: October 11, 2023 (last updated November 16, 2023)
Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Attacker Value
Unknown

CVE-2023-43641

Disclosure Date: October 09, 2023 (last updated October 28, 2023)
libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
Attacker Value
Unknown

CVE-2023-39928

Disclosure Date: October 06, 2023 (last updated October 21, 2023)
A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-44488

Disclosure Date: September 30, 2023 (last updated November 16, 2023)
VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.
Attacker Value
Unknown

CVE-2023-5217

Disclosure Date: September 28, 2023 (last updated December 21, 2024)
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Attacker Value
Unknown

CVE-2023-5187

Disclosure Date: September 28, 2023 (last updated October 12, 2023)
Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Attacker Value
Unknown

CVE-2023-5186

Disclosure Date: September 28, 2023 (last updated October 12, 2023)
Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)