Skip to content

Instantly share code, notes, and snippets.

@adventurist
Last active July 4, 2024 06:04
Show Gist options
  • Save adventurist/8c1956f532278087b29ed9543b3d8ade to your computer and use it in GitHub Desktop.
Save adventurist/8c1956f532278087b29ed9543b3d8ade to your computer and use it in GitHub Desktop.
Visual Studio Code Settings Sync Gist
This gist exceeds the recommended number of files (~10). To access all files, please clone this gist.
{"version":1,"resource":"file:///data/logicp/logicp_writings/collectivist_theology/Left-Right_paradigm.md","entries":[{"id":"MHL0.md","source":"textFileCreate.source","timestamp":1714096466144},{"id":"LOQl.md","timestamp":1714096529287},{"id":"JqZP.md","timestamp":1714096564371},{"id":"Tye6.md","timestamp":1714096663423},{"id":"GTmF.md","timestamp":1714352670855}]}
{"version":1,"resource":"file:///data/logicp/chat/output/shared_system_thread.md","entries":[{"id":"RUyP.md","timestamp":1667698181292},{"id":"M3xB.md","timestamp":1667699258984},{"id":"3QDe.md","timestamp":1667699411752}]}
{"version":1,"resource":"file:///data/stronglogic/psql_orm/.vscode/settings.json","entries":[{"id":"S0w1.json","timestamp":1662398490240},{"id":"Kp7R.json","timestamp":1662428986443},{"id":"nTDa.json","timestamp":1708407056554}]}
{
"files.associations": {
"cctype": "cpp",
"clocale": "cpp",
"cmath": "cpp",
"cstdarg": "cpp",
"cstddef": "cpp",
"cstdio": "cpp",
"cstdlib": "cpp",
"cstring": "cpp",
"ctime": "cpp",
"cwchar": "cpp",
"cwctype": "cpp",
"array": "cpp",
"atomic": "cpp",
"bit": "cpp",
"*.tcc": "cpp",
"charconv": "cpp",
"compare": "cpp",
"concepts": "cpp",
"cstdint": "cpp",
"deque": "cpp",
"list": "cpp",
"map": "cpp",
"string": "cpp",
"unordered_map": "cpp",
"vector": "cpp",
"exception": "cpp",
"algorithm": "cpp",
"functional": "cpp",
"iterator": "cpp",
"memory": "cpp",
"memory_resource": "cpp",
"numeric": "cpp",
"optional": "cpp",
"random": "cpp",
"string_view": "cpp",
"system_error": "cpp",
"tuple": "cpp",
"type_traits": "cpp",
"utility": "cpp",
"initializer_list": "cpp",
"iosfwd": "cpp",
"iostream": "cpp",
"istream": "cpp",
"limits": "cpp",
"new": "cpp",
"numbers": "cpp",
"ostream": "cpp",
"ranges": "cpp",
"sstream": "cpp",
"stdexcept": "cpp",
"streambuf": "cpp",
"cinttypes": "cpp",
"typeinfo": "cpp",
"variant": "cpp",
"iomanip": "cpp"
}
}
{
"files.associations": {
"cctype": "cpp",
"clocale": "cpp",
"cmath": "cpp",
"cstdarg": "cpp",
"cstddef": "cpp",
"cstdio": "cpp",
"cstdlib": "cpp",
"cstring": "cpp",
"ctime": "cpp",
"cwchar": "cpp",
"cwctype": "cpp",
"array": "cpp",
"atomic": "cpp",
"bit": "cpp",
"*.tcc": "cpp",
"charconv": "cpp",
"compare": "cpp",
"concepts": "cpp",
"cstdint": "cpp",
"deque": "cpp",
"list": "cpp",
"map": "cpp",
"string": "cpp",
"unordered_map": "cpp",
"vector": "cpp",
"exception": "cpp",
"algorithm": "cpp",
"functional": "cpp",
"iterator": "cpp",
"memory": "cpp",
"memory_resource": "cpp",
"numeric": "cpp",
"optional": "cpp",
"random": "cpp",
"string_view": "cpp",
"system_error": "cpp",
"tuple": "cpp",
"type_traits": "cpp",
"utility": "cpp",
"initializer_list": "cpp",
"iosfwd": "cpp",
"iostream": "cpp",
"istream": "cpp",
"limits": "cpp",
"new": "cpp",
"numbers": "cpp",
"ostream": "cpp",
"ranges": "cpp",
"sstream": "cpp",
"stdexcept": "cpp",
"streambuf": "cpp",
"cinttypes": "cpp",
"typeinfo": "cpp",
"variant": "cpp",
"iomanip": "cpp",
"chrono": "cpp",
"ratio": "cpp"
}
}
{
"files.associations": {
"cctype": "cpp",
"clocale": "cpp",
"cmath": "cpp",
"cstdarg": "cpp",
"cstddef": "cpp",
"cstdio": "cpp",
"cstdlib": "cpp",
"cstring": "cpp",
"ctime": "cpp",
"cwchar": "cpp",
"cwctype": "cpp",
"array": "cpp",
"atomic": "cpp",
"bit": "cpp",
"*.tcc": "cpp",
"charconv": "cpp",
"compare": "cpp",
"concepts": "cpp",
"cstdint": "cpp",
"deque": "cpp",
"list": "cpp",
"map": "cpp",
"string": "cpp",
"unordered_map": "cpp",
"vector": "cpp",
"exception": "cpp",
"algorithm": "cpp",
"functional": "cpp",
"iterator": "cpp",
"memory": "cpp",
"memory_resource": "cpp",
"numeric": "cpp",
"optional": "cpp",
"random": "cpp",
"string_view": "cpp",
"system_error": "cpp",
"tuple": "cpp",
"type_traits": "cpp",
"utility": "cpp",
"initializer_list": "cpp",
"iosfwd": "cpp",
"iostream": "cpp",
"istream": "cpp",
"limits": "cpp",
"new": "cpp",
"numbers": "cpp",
"ostream": "cpp",
"ranges": "cpp",
"sstream": "cpp",
"stdexcept": "cpp",
"streambuf": "cpp",
"cinttypes": "cpp",
"typeinfo": "cpp",
"variant": "cpp"
}
}
{
// Use IntelliSense to learn about possible attributes.
// Hover to view descriptions of existing attributes.
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
"version": "0.2.0",
"configurations": [
{
"name": "(gdb) Launch",
"type": "cppdbg",
"request": "launch",
"program": "${workspaceFolder}/build/kettr",
"args": [],
"stopAtEntry": false,
"cwd": "${fileDirname}",
"environment": [],
"externalConsole": false,
"MIMode": "gdb",
"setupCommands": [
{
"description": "Enable pretty-printing for gdb",
"text": "-enable-pretty-printing",
"ignoreFailures": true
},
{
"description": "Set Disassembly Flavor to Intel",
"text": "-gdb-set disassembly-flavor intel",
"ignoreFailures": true
}
]
}
]
}
{
// Use IntelliSense to learn about possible attributes.
// Hover to view descriptions of existing attributes.
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
"version": "0.2.0",
"configurations": [
{
"name": "KETTR debug",
"type": "cppdbg",
"request": "launch",
"program": "${workspaceFolder}/build/kettr_client",
"args": ["logicp@logicp.ca", "Moranglertube9402"],
"stopAtEntry": false,
"cwd": "${fileDirname}",
"environment": [],
"externalConsole": false,
"MIMode": "gdb",
"setupCommands": [
{
"description": "Enable pretty-printing for gdb",
"text": "-enable-pretty-printing",
"ignoreFailures": true
},
{
"description": "Set Disassembly Flavor to Intel",
"text": "-gdb-set disassembly-flavor intel",
"ignoreFailures": true
}
]
}
]
}
{"version":1,"resource":"file:///data/stronglogic/kettr/.vscode/launch.json","entries":[{"id":"B8Up.json","timestamp":1665931716354},{"id":"HyhC.json","timestamp":1665931760722},{"id":"GG8A.json","timestamp":1666717452720},{"id":"Djk9.json","timestamp":1666717551052}]}
{
// Use IntelliSense to learn about possible attributes.
// Hover to view descriptions of existing attributes.
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
"version": "0.2.0",
"configurations": [
{
"name": "KETTR debug",
"type": "cppdbg",
"request": "launch",
"program": "${workspaceFolder}/build/kettr",
"args": ["logicp@logicp.ca", "Moranglertube9402"],
"stopAtEntry": false,
"cwd": "${fileDirname}",
"environment": [],
"externalConsole": false,
"MIMode": "gdb",
"setupCommands": [
{
"description": "Enable pretty-printing for gdb",
"text": "-enable-pretty-printing",
"ignoreFailures": true
},
{
"description": "Set Disassembly Flavor to Intel",
"text": "-gdb-set disassembly-flavor intel",
"ignoreFailures": true
}
]
}
]
}
{
// Use IntelliSense to learn about possible attributes.
// Hover to view descriptions of existing attributes.
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
"version": "0.2.0",
"configurations": [
{
"name": "KETTR debug",
"type": "cppdbg",
"request": "launch",
"program": "${workspaceFolder}/build/kettr",
"args": ["logicp@logicp.ca", "Moranglertube9402"],
"stopAtEntry": false,
"cwd": "${fileDirname}",
"environment": [],
"externalConsole": false,
"MIMode": "gdb",
"setupCommands": [
{
"description": "Enable pretty-printing for gdb",
"text": "-enable-pretty-printing",
"ignoreFailures": true
},
{
"description": "Set Disassembly Flavor to Intel",
"text": "-gdb-set disassembly-flavor intel",
"ignoreFailures": true
}
]
}
]
}
{"version":1,"resource":"file:///data/ribbon/distant-cpp/src/commlink/encode_decode/citrix_decoder.cpp","entries":[{"id":"3yk0.cpp","timestamp":1710385395325}]}
{
"files.associations": {
"*.ipp": "cpp"
}
}
{"version":1,"resource":"file:///data/stronglogic/k3log/.vscode/settings.json","entries":[{"id":"6R7H.json","timestamp":1684641775420},{"id":"WgDF.json","timestamp":1684676719388}]}
{
"files.associations": {
"*.ipp": "cpp",
"memory": "cpp"
}
}
{"version":1,"resource":"file:///media/logicp/extradrive1/media/pics/android/adb_pull.sh","entries":[{"id":"DQWr.sh","timestamp":1699232773085},{"id":"PanO.sh","timestamp":1699233177983},{"id":"xddd.sh","timestamp":1699233380506},{"id":"Uosl.sh","timestamp":1699233430894},{"id":"EaX6.sh","timestamp":1711504096484}]}
{"version":1,"resource":"file:///data/ribbon/distant-cpp/src/common/log/log_shim.h","entries":[{"id":"EBx8.h","timestamp":1693456403280},{"id":"35Db.h","timestamp":1693456483716},{"id":"Nw0h.h","timestamp":1693527075641},{"id":"0TfV.h","timestamp":1693527180877},{"id":"W0QG.h","timestamp":1693527333668},{"id":"1veN.h","timestamp":1693527368884},{"id":"HHZA.h","timestamp":1693527552780},{"id":"PnBU.h","timestamp":1693527651935},{"id":"WZSu.h","timestamp":1693527820711},{"id":"nKSi.h","timestamp":1693527853507},{"id":"rrAY.h","timestamp":1693528232669},{"id":"AFeO.h","timestamp":1693528554048},{"id":"bs6Z.h","timestamp":1693528784531}]}
{"version":1,"resource":"file:///data/stronglogic/kcef/build/analysis1715701387752.json","entries":[{"id":"TEHd.json","timestamp":1715721512074}]}
[
{
"nlp": {
"locale": "en",
"utterance": "Anti-Israel protestors: ‘It’s a smear to say these protests support terrorism.’ \n\nLiverpool councillor: “Let us also condemn the Hamas attacks on October the 7th.”\n\n[Crowd Heckling and Booing] “Resistance is justified!”",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 0,
"end": 3,
"len": 4,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "anti",
"sourceText": "anti",
"utteranceText": "Anti"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": -1.767,
"numWords": 34,
"numHits": 10,
"average": -0.051970588235294116,
"type": "senticon",
"locale": "en",
"vote": "negative"
}
},
"username": "adammaanit",
"context": [
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": "Anti-Israel protestors: ‘It’s a smear to say these protests support terrorism.’ \n\nLiverpool councillor: “Let us also condemn the Hamas attacks on October the 7th.”\n\n[Crowd Heckling and Booing] “Resistance is justified!”",
"objective": "Is an assertion",
"subjective": "Anti-Israel, Liverpool, Hamas, Crowd Heckling and [ORGANIZATION Booing "
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": "Anti-Israel protestors:",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Anti-Israel, unknown"
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": " ‘It’s a smear to say these protests support terrorism.",
"objective": "Is an assertion,Is a single phrase",
"subjective": "unknown"
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": "’ \n\n",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Liverpool"
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": "Liverpool councillor:",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Liverpool, Hamas"
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": " “Let us also condemn the Hamas attacks on October the 7th.",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Hamas, unknown"
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": "”\n\n",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Crowd Heckling and [ORGANIZATION Booing "
},
{
"entities": [
{
"type": "Unknown",
"value": "Anti-Israel"
},
{
"type": "Organization",
"value": "Liverpool"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Unknown",
"value": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"message": "[Crowd Heckling and Booing] “Resistance is justified!”",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Crowd Heckling and [ORGANIZATION Booing "
}
],
"target": {
"value": "",
"type": "None"
},
"result": "computed",
"user": {
"agitator": false,
"types": [],
"score": 0,
"description": "Ex Catholic Ex Muslim | | SOCMINT + OSINT | Extremism + NGOs | Narcissist Abuse | LupronGate | Nursing | Economics | #NotJoiningYourCult"
}
},
{
"nlp": {
"locale": "en",
"utterance": "In my debate on @PiersUncensored, @RaniaKhalek, who is Lebanese, spent the entire time refusing to condemn Hamas and whining about Israel and \"settler colonialism\" without a single condemnation of the *actual* occupying power in Lebanon: the Islamic Republic of Iran. \n\nIn fact,…",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 143,
"end": 149,
"len": 7,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "abolish",
"sourceText": "settler",
"utteranceText": "settler"
},
{
"start": 151,
"end": 161,
"len": 11,
"levenshtein": 2,
"accuracy": 0.8461538461538461,
"entity": "agitator_exp",
"type": "enum",
"option": "Decolonialist",
"sourceText": "decolonialism",
"utteranceText": "colonialism"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": 1.174,
"numWords": 43,
"numHits": 11,
"average": 0.027302325581395347,
"type": "senticon",
"locale": "en",
"vote": "positive"
}
},
"username": "emilykschrader",
"context": [
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": "In my debate on @PiersUncensored, @RaniaKhalek, who is Lebanese, spent the entire time refusing to condemn Hamas and whining about Israel and settler colonialism without a single condemnation of the *actual* occupying power in Lebanon: the Islamic Republic of Iran. \n\nIn fact,…",
"objective": "Is an assertion,Has a probetype of who",
"subjective": "@RaniaKhalek, Lebanese, Hamas, Israel, Lebanon, Iran"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": "In my debate on @PiersUncensored, @RaniaKhalek, who is Lebanese, spent the entire time refusing to condemn Hamas and whining about Israel and settler colonialism without a single condemnation of the *actual* occupying power in Lebanon:",
"objective": "Is an assertion,Is a single phrase,Has a probetype of who",
"subjective": "@RaniaKhalek, Lebanese, Hamas, Israel, Lebanon, Islamic Republic"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": " the Islamic Republic of Iran.",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Islamic Republic, Iran, unknown"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": " \n\n",
"objective": "Is an assertion,Is a single phrase",
"subjective": "unknown"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": "In fact,…",
"objective": "Is an assertion,Is a single phrase",
"subjective": ""
}
],
"target": {
"value": "",
"type": "None"
},
"result": "computed",
"user": {
"agitator": false,
"types": [],
"score": 0,
"description": ""
}
},
{
"nlp": {
"locale": "en",
"utterance": "In my debate on @PiersUncensored, @RaniaKhalek, who is Lebanese, spent the entire time refusing to condemn Hamas and whining about Israel and \"settler colonialism\" without a single condemnation of the *actual* occupying power in Lebanon: the Islamic Republic of Iran. \n\nIn fact,…",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 143,
"end": 149,
"len": 7,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "abolish",
"sourceText": "settler",
"utteranceText": "settler"
},
{
"start": 151,
"end": 161,
"len": 11,
"levenshtein": 2,
"accuracy": 0.8461538461538461,
"entity": "agitator_exp",
"type": "enum",
"option": "Decolonialist",
"sourceText": "decolonialism",
"utteranceText": "colonialism"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": 1.174,
"numWords": 43,
"numHits": 11,
"average": 0.027302325581395347,
"type": "senticon",
"locale": "en",
"vote": "positive"
}
},
"username": "emilykschrader",
"context": [
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": "In my debate on @PiersUncensored, @RaniaKhalek, who is Lebanese, spent the entire time refusing to condemn Hamas and whining about Israel and settler colonialism without a single condemnation of the *actual* occupying power in Lebanon: the Islamic Republic of Iran. \n\nIn fact,…",
"objective": "Is an assertion,Has a probetype of who",
"subjective": "@RaniaKhalek, Lebanese, Hamas, Israel, Lebanon, Iran"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": "In my debate on @PiersUncensored, @RaniaKhalek, who is Lebanese, spent the entire time refusing to condemn Hamas and whining about Israel and settler colonialism without a single condemnation of the *actual* occupying power in Lebanon:",
"objective": "Is an assertion,Is a single phrase,Has a probetype of who",
"subjective": "@RaniaKhalek, Lebanese, Hamas, Israel, Lebanon, Islamic Republic"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": " the Islamic Republic of Iran.",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Islamic Republic, Iran, unknown"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": " \n\n",
"objective": "Is an assertion,Is a single phrase",
"subjective": "unknown"
},
{
"entities": [
{
"type": "Person",
"value": "@RaniaKhalek"
},
{
"type": "Unknown",
"value": "Lebanese"
},
{
"type": "Organization",
"value": "Hamas"
},
{
"type": "Location",
"value": "Israel"
},
{
"type": "Location",
"value": "Lebanon"
},
{
"type": "Location",
"value": "Iran"
}
],
"message": "In fact,…",
"objective": "Is an assertion,Is a single phrase",
"subjective": ""
}
],
"target": {
"value": "",
"type": "None"
},
"result": "computed",
"user": {
"agitator": false,
"types": [],
"score": 0,
"description": ""
}
},
{
"nlp": {
"locale": "en",
"utterance": "Why would we condemn the resistance to you fucking pigs, you fucking pig? Crawl back into your bunker, Frau Braun. Your husband has a capsule for you.",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 21,
"end": 34,
"len": 14,
"levenshtein": 2,
"accuracy": 0.8571428571428571,
"entity": "agitator_exp",
"type": "enum",
"option": "resister",
"sourceText": "#TheResistance",
"utteranceText": "the resistance"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": 1.421,
"numWords": 27,
"numHits": 6,
"average": 0.05262962962962963,
"type": "senticon",
"locale": "en",
"vote": "positive"
}
},
"username": "Pal_OStein",
"context": [
{
"entities": [
{
"type": "Person",
"value": "Frau Braun"
}
],
"message": "Why would we condemn the resistance to you fucking pigs, you fucking pig? Crawl back into your bunker, Frau Braun. Your husband has a capsule for you.",
"objective": "Is a question",
"subjective": "Frau Braun"
},
{
"entities": [
{
"type": "Person",
"value": "Frau Braun"
}
],
"message": "Why would we condemn the resistance to you fucking pigs, you fucking pig? Crawl back into your bunker, Frau Braun.",
"objective": "Is a question,Is a single phrase",
"subjective": "Frau Braun, unknown"
},
{
"entities": [
{
"type": "Person",
"value": "Frau Braun"
}
],
"message": " Your husband has a capsule for you.",
"objective": "Is an assertion,Is a single phrase,Has a probetype of has",
"subjective": ""
}
],
"target": {
"value": "",
"type": "None"
},
"result": "computed",
"user": {
"agitator": false,
"types": [],
"score": 0,
"description": ""
}
},
{
"nlp": {
"locale": "en",
"utterance": "\"I'll f***ing kill you!\"\n\nA Zionist gang harasses the pro-Palestine student encampment at Oxford University. The six unidentified men arrived in a taxi, tore down banners, shouted at students, and issued death threats.",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 28,
"end": 34,
"len": 7,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitator_exp",
"type": "enum",
"option": "AntiZionist",
"sourceText": "zionist",
"utteranceText": "Zionist"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": -0.708,
"numWords": 34,
"numHits": 13,
"average": -0.020823529411764706,
"type": "senticon",
"locale": "en",
"vote": "negative"
}
},
"username": "MintPressNews",
"context": [
{
"entities": [
{
"type": "Location",
"value": "Ill"
},
{
"type": "Organization",
"value": "Oxford University"
}
],
"message": "Ill f***ing kill you!\n\nA Zionist gang harasses the pro-Palestine student encampment at Oxford University. The six unidentified men arrived in a taxi, tore down banners, shouted at students, and issued death threats.",
"objective": "Is an assertion",
"subjective": "Ill, Oxford University"
},
{
"entities": [
{
"type": "Location",
"value": "Ill"
},
{
"type": "Organization",
"value": "Oxford University"
}
],
"message": "Ill f***ing kill you!\n\n",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Ill, Oxford University"
},
{
"entities": [
{
"type": "Location",
"value": "Ill"
},
{
"type": "Organization",
"value": "Oxford University"
}
],
"message": "A Zionist gang harasses the pro-Palestine student encampment at Oxford University.",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Oxford University, unknown"
},
{
"entities": [
{
"type": "Location",
"value": "Ill"
},
{
"type": "Organization",
"value": "Oxford University"
}
],
"message": " The six unidentified men arrived in a taxi, tore down banners, shouted at students, and issued death threats.",
"objective": "Is an assertion,Is a single phrase",
"subjective": ""
}
],
"target": {
"value": "",
"type": "None"
},
"result": "computed",
"user": {
"agitator": false,
"types": [],
"score": 0,
"description": ""
}
}
]
{"version":1,"resource":"file:///Users/ebuckshi/data/KandyLib/cpp/src/browser/window/windows/finder.cpp","entries":[{"id":"Z96j.cpp","timestamp":1650556267802}]}
{"version":1,"resource":"file:///data/stronglogic/kbot/BUILD.gn","entries":[{"id":"Mn6S.gn","timestamp":1652410617003},{"id":"Ci52.gn","timestamp":1652411069495},{"id":"DB6F.gn","timestamp":1652487682683},{"id":"br22.gn","timestamp":1652664046758},{"id":"Va4u.gn","timestamp":1666155981766},{"id":"PlMR.gn","timestamp":1675546532171},{"id":"kWDV.gn","timestamp":1675747109278},{"id":"0GaG.gn","timestamp":1679107326922},{"id":"3gj1.gn","timestamp":1679107375730},{"id":"wz92.gn","timestamp":1679590177136},{"id":"AAhM.gn","timestamp":1679590200028},{"id":"gvjT.gn","timestamp":1679590521224},{"id":"FxRC.gn","timestamp":1679590699276},{"id":"rp4D.gn","source":"undoRedo.source","timestamp":1679592567148},{"id":"E72B.gn","timestamp":1685583696050},{"id":"94oG.gn","timestamp":1685765913391}]}
{"version":1,"resource":"file:///data/stronglogic/kserver/include/system/process/ipc/client.hpp","entries":[{"id":"9B7P.hpp","timestamp":1661656911571},{"id":"ARtm.hpp","timestamp":1661657124212},{"id":"VmvU.hpp","timestamp":1661657151200},{"id":"midQ.hpp","timestamp":1661657183320},{"id":"BdfV.hpp","timestamp":1661657207888},{"id":"Wsxf.hpp","timestamp":1661657244828},{"id":"R5tw.hpp","source":"undoRedo.source","timestamp":1661657280184},{"id":"Prkx.hpp","timestamp":1661657399284},{"id":"QP77.hpp","timestamp":1661657433652},{"id":"T6g0.hpp","timestamp":1661657662103},{"id":"nHFg.hpp","timestamp":1661658389238},{"id":"TKXi.hpp","timestamp":1661660127275},{"id":"FN1U.hpp","timestamp":1661660288987},{"id":"WRdr.hpp","timestamp":1661660406927},{"id":"T7F6.hpp","timestamp":1661665188750},{"id":"mldi.hpp","timestamp":1661698191565},{"id":"gPu1.hpp","timestamp":1661698318756},{"id":"LNWZ.hpp","timestamp":1661698615059},{"id":"jdVO.hpp","timestamp":1661698636719},{"id":"hhYu.hpp","timestamp":1661698757503},{"id":"eKru.hpp","timestamp":1677117315477},{"id":"KjrP.hpp","timestamp":1691629441716},{"id":"7CEM.hpp","timestamp":1696097429553},{"id":"61J4.hpp","timestamp":1696097440393},{"id":"vg0j.hpp","timestamp":1702012381977},{"id":"Xowg.hpp","timestamp":1709409618808},{"id":"pTNQ.hpp","timestamp":1716155190034},{"id":"YGxz.hpp","timestamp":1716155235125},{"id":"Hcrq.hpp","timestamp":1716155247465}]}
{"version":1,"resource":"file:///data/stronglogic/kserver/include/system/process/ipc/client.cpp","entries":[{"id":"t81H.cpp","timestamp":1661658177730},{"id":"lrTz.cpp","timestamp":1661658238758},{"id":"z66S.cpp","timestamp":1661659259058},{"id":"a1lC.cpp","timestamp":1661659977903},{"id":"jWVg.cpp","timestamp":1661660044531},{"id":"I8jZ.cpp","timestamp":1661660102695},{"id":"pac7.cpp","timestamp":1661660230903},{"id":"T67B.cpp","timestamp":1661660274379},{"id":"kt9i.cpp","timestamp":1661660399667},{"id":"L0Sj.cpp","timestamp":1661660761772},{"id":"Spw9.cpp","timestamp":1661665135836},{"id":"eQco.cpp","timestamp":1661665244655},{"id":"L4YT.cpp","timestamp":1661665258195},{"id":"9Tki.cpp","timestamp":1661698226429},{"id":"B1BF.cpp","timestamp":1661698242241},{"id":"t5uN.cpp","timestamp":1661698271441},{"id":"bmT3.cpp","timestamp":1661698299968},{"id":"n5rC.cpp","timestamp":1661698313552},{"id":"x96R.cpp","timestamp":1667939281228},{"id":"gHlQ.cpp","timestamp":1667940237804},{"id":"clnK.cpp","timestamp":1667948795008},{"id":"CkS6.cpp","timestamp":1667948961376},{"id":"fq50.cpp","timestamp":1676267623951},{"id":"2792.cpp","timestamp":1679375998504},{"id":"ZBYC.cpp","timestamp":1679376021100},{"id":"n92K.cpp","timestamp":1696097409629},{"id":"LzLY.cpp","timestamp":1702611818155},{"id":"mMKr.cpp","timestamp":1709409646036},{"id":"bTcH.cpp","timestamp":1709409678184},{"id":"ryYy.cpp","timestamp":1709410602457},{"id":"65hc.cpp","timestamp":1709410665656},{"id":"fuIC.cpp","timestamp":1709410892880},{"id":"2I7B.cpp","timestamp":1709434137684},{"id":"aRSN.cpp","timestamp":1709434208804},{"id":"5Llp.cpp","timestamp":1709434279064},{"id":"KiPD.cpp","timestamp":1709434306227},{"id":"LDMx.cpp","timestamp":1709442035583},{"id":"EWZG.cpp","timestamp":1709444491203},{"id":"cHnS.cpp","timestamp":1709444517123},{"id":"8VXu.cpp","timestamp":1709444599702},{"id":"Xh4H.cpp","timestamp":1709518622510},{"id":"ZgUe.cpp","timestamp":1709993237667},{"id":"BzUR.cpp","timestamp":1712117086207},{"id":"X4PR.cpp","timestamp":1712117117178},{"id":"psKx.cpp","timestamp":1712117216022},{"id":"PeA1.cpp","timestamp":1716155179362},{"id":"QZzE.cpp","timestamp":1716155226433},{"id":"XVFs.cpp","timestamp":1716155293309},{"id":"fut9.cpp","timestamp":1716155374185},{"id":"gxGT.cpp","timestamp":1716171814799}]}
{"version":1,"resource":"file:///data/KandyLib/cpp/src/browser/main_mac.mm","entries":[{"id":"LDax.mm","timestamp":1650646277099},{"id":"AnWQ.mm","timestamp":1650890188789},{"id":"B1zj.mm","timestamp":1650891410109},{"id":"WOlh.mm","timestamp":1650891644832},{"id":"Z4mr.mm","timestamp":1650904734382},{"id":"e0Uz.mm","timestamp":1650904784846},{"id":"LC8W.mm","timestamp":1650977291218},{"id":"JbVB.mm","timestamp":1650977373156},{"id":"QvGJ.mm","timestamp":1650987614266}]}
{"version":1,"resource":"file:///data/stronglogic/kbot/src/bot/discord/main.cpp","entries":[{"id":"TdBq.cpp","timestamp":1709586198887}]}
{"version":1,"resource":"file:///data/logicp/logicp_writings/queer/queer.md","entries":[{"id":"4MXL.md","source":"textFileCreate.source","timestamp":1663305173139},{"id":"O0WT.md","timestamp":1663305179159},{"id":"J0kk.md","timestamp":1663305423071},{"id":"xnwa.md","timestamp":1663348528666},{"id":"YCCs.md","timestamp":1663348908756},{"id":"EDo9.md","timestamp":1663349109047},{"id":"m01l.md","timestamp":1663366252668},{"id":"3tVg.md","timestamp":1663366495995},{"id":"gCYj.md","timestamp":1663366760710},{"id":"w8kY.md","timestamp":1663366785750},{"id":"Ik1J.md","timestamp":1663374658199},{"id":"OWS0.md","timestamp":1663374717291},{"id":"Rnq1.md","timestamp":1663374826030},{"id":"2vOz.md","timestamp":1663374868006},{"id":"aNL7.md","timestamp":1663374897569}]}
{"version":1,"resource":"file:///data/stronglogic/kserver/include/database/database_connection.hpp","entries":[{"id":"lXjF.hpp","timestamp":1662683401719},{"id":"53mW.hpp","timestamp":1662778840599},{"id":"glCx.hpp","timestamp":1663010772079},{"id":"gZ1A.hpp","timestamp":1663010795479},{"id":"5NTp.hpp","timestamp":1676263080926},{"id":"xXL5.hpp","source":"undoRedo.source","timestamp":1676263254582}]}
{"version":1,"resource":"file:///data/stronglogic/ktube/build/BUILD.gn","entries":[{"id":"23Eh.gn","timestamp":1667879989816},{"id":"qPTG.gn","timestamp":1673227147629}]}
{"version":1,"resource":"file:///data/stronglogic/kipc_tester/number","entries":[{"id":"OaYM","timestamp":1682223260712}]}
{"version":1,"resource":"file:///data/logicp/logicp_writings/new/Queer%20Education%20is%20Evil.md","entries":[{"id":"uCXl.md","source":"textFileCreate.source","timestamp":1703484903944}]}
{"version":1,"resource":"file:///data/logicp/logicp_writings/new/Agreeable%20Society.md","entries":[{"id":"6Ahy.md","source":"textFileCreate.source","timestamp":1703484796452}]}
{"version":1,"resource":"file:///data/stronglogic/klogger/src/easylogging%2B%2B.h","entries":[{"id":"eW4G.h","timestamp":1682041870099},{"id":"NIbO.h","timestamp":1682041932471}]}
{"version":1,"resource":"file:///data/ribbon/cve/utils.js","entries":[{"id":"DxPN.js","timestamp":1697512025911},{"id":"dMhV.js","timestamp":1697512099407},{"id":"Wcpf.js","timestamp":1697512130847},{"id":"Pf5g.js","timestamp":1697512290047},{"id":"3WjH.js","timestamp":1697512308494},{"id":"pf53.js","timestamp":1697512349358},{"id":"vVhu.js","timestamp":1697512366334}]}
{"version":1,"resource":"file:///data/stronglogic/kcef/build/analysis1712868991930.json","entries":[{"id":"m9zm.json","timestamp":1712966782668}]}
[
{
"nlp": {
"locale": "en",
"utterance": "Knew this was gonna be the take from the “Decolonization” & “Anti-Racist” crowd. \n\n“Shame on Juice for not being antiracist but congratulations on LITERALLY getting away with murder”",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 42,
"end": 55,
"len": 14,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "abolish",
"sourceText": "decolonization",
"utteranceText": "Decolonization",
"alias": "agitation_0"
},
{
"start": 61,
"end": 64,
"len": 4,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "anti",
"sourceText": "anti",
"utteranceText": "Anti",
"alias": "agitation_1"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": 1.1249999999999998,
"numWords": 29,
"numHits": 8,
"average": 0.038793103448275856,
"type": "senticon",
"locale": "en",
"vote": "positive"
}
},
"username": "MarkG313929",
"context": [
{
"entities": [
{
"type": "Organization",
"value": "“ Decolonization"
},
{
"type": "Unknown",
"value": "& “ Anti-Racist"
},
{
"type": "Location",
"value": "LITERALLY"
}
],
"message": "Knew this was gonna be the take from the “Decolonization” & “Anti-Racist” crowd. \n\n“Shame on Juice for not being antiracist but congratulations on LITERALLY getting away with murder”",
"objective": "Is an assertion,Has a probetype of was",
"subjective": "“ Decolonization, & “ Anti-Racist, LITERALLY"
},
{
"entities": [
{
"type": "Organization",
"value": "“ Decolonization"
},
{
"type": "Unknown",
"value": "& “ Anti-Racist"
},
{
"type": "Location",
"value": "LITERALLY"
}
],
"message": "Knew this was gonna be the take from the “Decolonization” & “Anti-Racist” crowd.",
"objective": "Is an assertion,Is a single phrase,Has a probetype of was",
"subjective": "“ Decolonization, & “ Anti-Racist, unknown"
},
{
"entities": [
{
"type": "Organization",
"value": "“ Decolonization"
},
{
"type": "Unknown",
"value": "& “ Anti-Racist"
},
{
"type": "Location",
"value": "LITERALLY"
}
],
"message": " \n\n",
"objective": "Is an assertion,Is a single phrase",
"subjective": "LITERALLY"
},
{
"entities": [
{
"type": "Organization",
"value": "“ Decolonization"
},
{
"type": "Unknown",
"value": "& “ Anti-Racist"
},
{
"type": "Location",
"value": "LITERALLY"
}
],
"message": "“Shame on Juice for not being antiracist but congratulations on LITERALLY getting away with murder”",
"objective": "Is an assertion,Is a single phrase",
"subjective": "LITERALLY"
}
],
"target": {
"value": "“ Decolonization",
"type": "None"
},
"result": "computed",
"user": {
"agitator": true,
"types": [
"AntiZionist"
],
"score": 1,
"description": "America First Ultra-Zionist\nStop trying to cock-block America. \nAMERICA FIRST!!!! \nISRAEL FOREVER !!!! \nTrump/Gabbard 2024"
},
"strategy": {
"text": "Knew this was gonna be the take from the “Decolonization” & “Anti-Racist” crowd. \n\n“Shame on Juice for not being antiracist but congratulations on LITERALLY getting away with murder”",
"user": {
"agitator": true,
"types": [
"AntiZionist"
],
"score": 1,
"description": "America First Ultra-Zionist\nStop trying to cock-block America. \nAMERICA FIRST!!!! \nISRAEL FOREVER !!!! \nTrump/Gabbard 2024"
},
"context": {
"entities": [
{
"type": "Organization",
"value": "“ Decolonization"
},
{
"type": "Unknown",
"value": "& “ Anti-Racist"
},
{
"type": "Location",
"value": "LITERALLY"
}
],
"message": "Knew this was gonna be the take from the “Decolonization” & “Anti-Racist” crowd.",
"objective": "Is an assertion,Is a single phrase,Has a probetype of was",
"subjective": "“ Decolonization, & “ Anti-Racist, unknown"
},
"is_assertion": true,
"is_question": false,
"is_imperative": false,
"is_negative": false,
"response": "Why should anyone believe you be from “ Decolonization?",
"target": "“ Decolonization",
"wiki": "Decolonization is the undoing of colonialism, the latter being the process whereby imperial nations establish and dominate foreign territories, often overseas. The meanings and applications of the term are disputed. Some scholars of decolonization focus especially on independence movements in the colonies and the collapse of global colonial empires. Other scholars extend the meaning to include economic, cultural and psychological aspects of the colonial experience.Decolonization scholars form the school of thought known as decoloniality and apply decolonial frameworks to struggles against the coloniality of power and coloniality of knowledge. Indigenous and post-colonial scholars have critiqued Western worldviews, promoting decolonization of knowledge and the centering of traditional ecological knowledge. Extending the meaning of decolonization beyond political independence has been disputed and received criticism.\n\n"
}
}
]
{"version":1,"resource":"file:///data/ribbon/werktest/index.js","entries":[{"id":"AJTi.js","timestamp":1700579259777},{"id":"MCxc.js","timestamp":1700582376592},{"id":"LNBr.js","timestamp":1700582713839},{"id":"oQUX.js","timestamp":1700582769795},{"id":"jqBn.js","timestamp":1700583605461}]}
{"version":1,"resource":"file:///data/stronglogic/ktube/src/ktube/auth/auth.hpp","entries":[{"id":"xAOK.hpp","timestamp":1667919776727},{"id":"aQa8.hpp","timestamp":1667919805559},{"id":"QF7b.hpp","timestamp":1669782322455},{"id":"Mbf0.hpp","timestamp":1669783102475},{"id":"n2ud.hpp","timestamp":1670177518443},{"id":"Zc5c.hpp","timestamp":1670177700123},{"id":"c12R.hpp","timestamp":1673204801101},{"id":"DE2d.hpp","timestamp":1673228037437}]}
{"version":1,"resource":"file:///data/stronglogic/ktube/src/ktube/auth/auth.cpp","entries":[{"id":"dlZA.cpp","timestamp":1670177408703},{"id":"sb2E.cpp","timestamp":1670177537071},{"id":"buLP.cpp","timestamp":1670177633575},{"id":"MtJQ.cpp","timestamp":1670177687739},{"id":"YfM5.cpp","timestamp":1670177721795},{"id":"MmFx.cpp","timestamp":1673204643713},{"id":"A4Vf.cpp","timestamp":1673225289534},{"id":"wopy.cpp","timestamp":1673225327010},{"id":"Mu4p.cpp","timestamp":1673225527062},{"id":"KSi0.cpp","timestamp":1673226214169}]}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**",
"${workspaceFolder}/third_party/cpr/include",
"${workspaceFolder}/third_party/kutils/include",
"${workspaceFolder}/third_party/inih/cpp"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c99",
"cppStandard": "c++17"
}
],
"version": 4
}
{"version":1,"resource":"file:///data/stronglogic/kettr/.vscode/c_cpp_properties.json","entries":[{"id":"TToD.json","timestamp":1665536998152},{"id":"yGkD.json","timestamp":1665537690120},{"id":"seNx.json","timestamp":1665537718428},{"id":"FV8X.json","timestamp":1665539161584},{"id":"I7im.json","timestamp":1665540415244},{"id":"JAG4.json","timestamp":1665622607802},{"id":"alKv.json","timestamp":1679281198824}]}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c99",
"cppStandard": "c++17"
}
],
"version": 4
}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**",
"${workspaceFolder}/third_party/cpr/include"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c99",
"cppStandard": "c++17"
}
],
"version": 4
}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**",
"${workspaceFolder}/third_party/cpr/include",
"${workspaceFolder}/third_party/kutils/include"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c99",
"cppStandard": "c++17"
}
],
"version": 4
}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**",
"${workspaceFolder}/build/_deps/cpr-src/include"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c99",
"cppStandard": "c++17"
}
],
"version": 4
}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c17",
"cppStandard": "c++17"
}
],
"version": 4
}
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**",
"${workspaceFolder}/build/cpr-src/include"
],
"defines": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "c99",
"cppStandard": "c++17"
}
],
"version": 4
}
{"version":1,"resource":"file:///data/stronglogic/dcv-server/cpp/src/link/socket/ipc.hpp","entries":[{"id":"e6W0.hpp","timestamp":1708661822881}]}
{"version":1,"resource":"file:///data/stronglogic/kcef/build/analysis1714002139976.json","entries":[{"id":"uIMF.json","timestamp":1714006983309}]}
[
{
"nlp": {
"locale": "en",
"utterance": "Decolonization for the enemies of the USA, all the critical thinking theory is not meant to be applied to the USA, its only a weapon against its enemies",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 1
}
],
"intent": "implied.wisdom",
"score": 1,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 0,
"end": 13,
"len": 14,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "abolish",
"sourceText": "decolonization",
"utteranceText": "Decolonization"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": -1.0630000000000002,
"numWords": 28,
"numHits": 12,
"average": -0.03796428571428572,
"type": "senticon",
"locale": "en",
"vote": "negative"
}
},
"username": "rojoChilean",
"context": [
{
"entities": [
{
"type": "Location",
"value": "USA"
},
{
"type": "Location",
"value": "USA"
}
],
"message": "Decolonization for the enemies of the USA, all the critical thinking theory is not meant to be applied to the USA, its only a weapon against its enemies",
"objective": "Is an assertion,Is a single phrase,Has a probetype of is",
"subjective": "USA, USA"
}
],
"target": {
"value": "USA",
"type": "None"
},
"result": "computed",
"user": {
"agitator": true,
"types": [
"Marxist",
"Lenin",
"Marxist",
"Lenin"
],
"score": 4,
"description": "Marxist Leninist, but actually Marxist and actually Leninist.\n\nFrom the river to the sea.\n\n@Chile_UPA member | @MidwesternMarx Producer"
},
"strategy": {
"text": "Decolonization for the enemies of the USA, all the critical thinking theory is not meant to be applied to the USA, its only a weapon against its enemies",
"user": {
"agitator": true,
"types": [
"Marxist",
"Lenin",
"Marxist",
"Lenin"
],
"score": 4,
"description": "Marxist Leninist, but actually Marxist and actually Leninist.\n\nFrom the river to the sea.\n\n@Chile_UPA member | @MidwesternMarx Producer"
},
"context": {
"entities": [
{
"type": "Location",
"value": "USA"
},
{
"type": "Location",
"value": "USA"
}
],
"message": "Decolonization for the enemies of the USA, all the critical thinking theory is not meant to be applied to the USA, its only a weapon against its enemies",
"objective": "Is an assertion,Is a single phrase,Has a probetype of is",
"subjective": "USA, USA"
},
"is_assertion": true,
"is_question": false,
"is_imperative": false,
"is_negative": true,
"response": "Why should anyone believe you is for USA?",
"target": "USA",
"wiki": "USA Today (often stylized in all caps) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virginia. Its newspaper is printed at 37 sites across the United States and at five additional sites internationally. The paper's dynamic design influenced the style of local, regional, and national newspapers worldwide through its use of concise reports, colorized images, informational graphics, and inclusion of popular culture stories, among other distinct features.\nWith an average print circulation of 159,233 as of 2022, a digital-only subscriber base of 504,000 as of 2019, and an approximate daily readership of 2.6 million, USA Today has the fourth largest circulation of any newspaper in the United States. It has been shown to maintain a generally center-left audience, in regards to political persuasion. USA Today is distributed in all 50 states, Washington, D.C., and Puerto Rico, and an international edition is distributed in Asia, Canada, Europe, and the Pacific Islands."
}
},
{
"nlp": {
"locale": "en",
"utterance": "Making remarks at the Portugal 3D: Democracy, Decolonization, Development - 50 Years of the Carnation Revolution",
"languageGuessed": false,
"localeIso2": "en",
"language": "English",
"nluAnswer": {
"classifications": [
{
"intent": "implied.wisdom",
"score": 0
}
]
},
"classifications": [
{
"intent": "implied.wisdom",
"score": 0
}
],
"intent": "implied.wisdom",
"score": 0,
"domain": "default",
"sourceEntities": [],
"entities": [
{
"start": 46,
"end": 59,
"len": 14,
"levenshtein": 0,
"accuracy": 1,
"entity": "agitation",
"type": "enum",
"option": "abolish",
"sourceText": "decolonization",
"utteranceText": "Decolonization"
}
],
"answers": [],
"actions": [],
"sentiment": {
"score": 0.875,
"numWords": 16,
"numHits": 5,
"average": 0.0546875,
"type": "senticon",
"locale": "en",
"vote": "positive"
}
},
"username": "secgen",
"context": [
{
"entities": [
{
"type": "Location",
"value": "Portugal"
},
{
"type": "Organization",
"value": "Decolonization , Development"
},
{
"type": "Organization",
"value": "Carnation Revolution"
}
],
"message": "Making remarks at the Portugal 3D: Democracy, Decolonization, Development - 50 Years of the Carnation Revolution",
"objective": "Is an assertion,Is a single phrase",
"subjective": "Portugal, Decolonization , Development, Carnation Revolution"
}
],
"target": {
"value": "",
"type": "None"
},
"result": "computed",
"user": {
"agitator": false,
"types": [],
"score": 0,
"description": "UNOFFICIAL TWITTER – automated daily schedule of António Guterres, Portugal, 9th Secretary-General. Official account at @antonioguterres / @UN_Spokesperson @UN."
}
}
]
{"version":1,"resource":"file:///Users/ebuckshi/data/KandyLib/cpp/src/browser/pid_finder.mm","entries":[{"id":"hf0e.mm","timestamp":1650645093688}]}
{
"data": [
{
"referenced_tweets": [
{
"type": "replied_to",
"id": "1647408624136773632"
}
],
"lang": "en",
"in_reply_to_user_id": "1399461905148809216",
"text": "@canmericanized @nilikm And it makes perfect sense to her, because COVID is a powerful concept through which to advocate for authoritarian enforcement of a socialist society",
"id": "1647408901535539200",
"edit_history_tweet_ids": [
"1647408901535539200"
],
"created_at": "2023-04-16T01:17:44.000Z",
"entities": {
"annotations": [
{
"start": 67,
"end": 71,
"probability": 0.9724,
"type": "Other",
"normalized_text": "COVID"
}
],
"mentions": [
{
"start": 0,
"end": 15,
"username": "canmericanized",
"id": "2261896579"
},
{
"start": 16,
"end": 23,
"username": "nilikm",
"id": "155930120"
}
]
},
"author_id": "1399461905148809216",
"possibly_sensitive": false
},
{
"referenced_tweets": [
{
"type": "replied_to",
"id": "1647406474849558528"
}
],
"lang": "en",
"in_reply_to_user_id": "2261896579",
"text": "@canmericanized @nilikm She means democracy permissible under communism, and white supremacy means \"ideology preventing people from pursuing communism\"\n\nThey're all resynthesized",
"id": "1647408624136773632",
"edit_history_tweet_ids": [
"1647408624136773632"
],
"created_at": "2023-04-16T01:16:38.000Z",
"author_id": "1399461905148809216",
"entities": {
"mentions": [
{
"start": 0,
"end": 15,
"username": "canmericanized",
"id": "2261896579"
},
{
"start": 16,
"end": 23,
"username": "nilikm",
"id": "155930120"
}
]
},
"possibly_sensitive": false
},
{
"referenced_tweets": [
{
"type": "replied_to",
"id": "1647332400282648577"
}
],
"lang": "en",
"in_reply_to_user_id": "1399461905148809216",
"text": "@AWokeZombie I was correct",
"id": "1647332469698359304",
"edit_history_tweet_ids": [
"1647332469698359304"
],
"created_at": "2023-04-15T20:14:01.000Z",
"author_id": "1399461905148809216",
"entities": {
"mentions": [
{
"start": 0,
"end": 12,
"username": "AWokeZombie",
"id": "1246263711976873987"
}
]
},
"possibly_sensitive": false
},
{
"referenced_tweets": [
{
"type": "replied_to",
"id": "1647332101958651905"
}
],
"lang": "en",
"in_reply_to_user_id": "1246263711976873987",
"text": "@AWokeZombie That person probably tells you their pronouns twice",
"id": "1647332400282648577",
"edit_history_tweet_ids": [
"1647332400282648577"
],
"created_at": "2023-04-15T20:13:44.000Z",
"author_id": "1399461905148809216",
"entities": {
"mentions": [
{
"start": 0,
"end": 12,
"username": "AWokeZombie",
"id": "1246263711976873987"
}
]
},
"possibly_sensitive": false
},
{
"referenced_tweets": [
{
"type": "replied_to",
"id": "1647326912531005440"
}
],
"lang": "en",
"in_reply_to_user_id": "826261914",
"text": "@ConceptualJames Careful, he might start crying to manipulate you",
"id": "1647329064003174405",
"edit_history_tweet_ids": [
"1647329064003174405"
],
"created_at": "2023-04-15T20:00:29.000Z",
"author_id": "1399461905148809216",
"entities": {
"mentions": [
{
"start": 0,
"end": 16,
"username": "ConceptualJames",
"id": "826261914"
}
]
},
"possibly_sensitive": false
}
],
"meta": {
"result_count": 5,
"newest_id": "1647408901535539200",
"oldest_id": "1647329064003174405",
"next_token": "7140dibdnow9c7btw4520guzq8jxduzh2p34bvg2ngf91"
}
}
{"version":1,"resource":"file:///data/stronglogic/kwitter/examples/v2_tweets_response.json","entries":[{"id":"90T3.json","source":"textFileCreate.source","timestamp":1681745780246}]}
{"version":1,"resource":"file:///data/logicp/logicp_writings/site/.eleventy.js","entries":[{"id":"6j5z.js","timestamp":1703037156987},{"id":"jWna.js","timestamp":1703037188883},{"id":"6o1A.js","timestamp":1703037257823},{"id":"LDlg.js","timestamp":1703037336675},{"id":"goJ8.js","timestamp":1703037350583},{"id":"ORak.js","timestamp":1703037522694},{"id":"wJ9h.js","timestamp":1703037534698},{"id":"CJiz.js","timestamp":1703037620898},{"id":"fRcL.js","timestamp":1703037638658},{"id":"LEbS.js","timestamp":1703037651278},{"id":"Qy6D.js","timestamp":1703037959353},{"id":"7gr2.js","timestamp":1703037973025},{"id":"iT4M.js","timestamp":1703037987977},{"id":"1kFI.js","timestamp":1703038003521},{"id":"of3h.js","timestamp":1703038028764},{"id":"GmrR.js","timestamp":1703038172364},{"id":"mcBp.js","timestamp":1703038198732},{"id":"GLHq.js","timestamp":1703038217004},{"id":"HCnH.js","timestamp":1703038498055},{"id":"9bUD.js","timestamp":1703039560863},{"id":"P8vK.js","timestamp":1703039571319},{"id":"mOJ3.js","timestamp":1703039599951},{"id":"3Tag.js","timestamp":1703039636999},{"id":"AjyQ.js","timestamp":1703039659699},{"id":"kT7u.js","timestamp":1703039672391},{"id":"5mMm.js","timestamp":1703039777622},{"id":"SJi3.js","timestamp":1703040951351}]}
{"version":1,"resource":"file:///Users/ebuckshi/data/KandyLib/cpp/src/commlink/sleep_events/windows/event_listener.cpp","entries":[{"id":"tSul.cpp","timestamp":1649767550158},{"id":"mveQ.cpp","timestamp":1649767918057},{"id":"tkJn.cpp","timestamp":1649767946871},{"id":"WvJR.cpp","timestamp":1649767960345},{"id":"dm55.cpp","timestamp":1649768003785},{"id":"tN09.cpp","timestamp":1649768037857},{"id":"civV.cpp","timestamp":1649768064340},{"id":"ORSQ.cpp","timestamp":1649768161133},{"id":"jA2m.cpp","timestamp":1649768218991},{"id":"I464.cpp","timestamp":1649768255973},{"id":"cJw7.cpp","timestamp":1649768345014},{"id":"6xuw.cpp","timestamp":1649768371115},{"id":"rh8R.cpp","timestamp":1649768412228},{"id":"Jn8R.cpp","timestamp":1649768467896},{"id":"6DZg.cpp","timestamp":1649768496567},{"id":"DDyy.cpp","timestamp":1649768530233},{"id":"JpUS.cpp","timestamp":1649768576281},{"id":"SgeB.cpp","timestamp":1649768632856},{"id":"9y0T.cpp","timestamp":1649768706154},{"id":"8mUk.cpp","timestamp":1649772981177},{"id":"qtT8.cpp","timestamp":1649773062565},{"id":"Md85.cpp","timestamp":1649775197005},{"id":"oD6d.cpp","timestamp":1649775290812},{"id":"yQ9k.cpp","timestamp":1649776386398},{"id":"4wfM.cpp","timestamp":1649776621475},{"id":"ObGB.cpp","timestamp":1649776651975},{"id":"Bu8h.cpp","timestamp":1649778175800},{"id":"l4py.cpp","timestamp":1649778553332},{"id":"liZi.cpp","timestamp":1649778565973},{"id":"MVK3.cpp","timestamp":1649778624893},{"id":"sFKl.cpp","timestamp":1649778639837},{"id":"NEbs.cpp","timestamp":1649778708251},{"id":"EIwC.cpp","timestamp":1649780112347},{"id":"wgU6.cpp","timestamp":1649780938962},{"id":"HLb1.cpp","timestamp":1649780974679},{"id":"qZiO.cpp","timestamp":1649781135990},{"id":"ULj8.cpp","timestamp":1649781747713},{"id":"VPPA.cpp","timestamp":1649781858042},{"id":"GjMY.cpp","timestamp":1649781927825},{"id":"VqCn.cpp","timestamp":1649782320327},{"id":"iGwN.cpp","timestamp":1649782339458},{"id":"eSR6.cpp","timestamp":1649783553466},{"id":"gJ2C.cpp","timestamp":1649862241180}]}
{"version":1,"resource":"file:///data/stronglogic/kgram/js/testdata.ts","entries":[{"id":"MFE7.ts","source":"renamed.source","timestamp":1681943986749},{"id":"zvYV.ts","timestamp":1681944053152},{"id":"KT1K.ts","timestamp":1681950290672},{"id":"9TSR.ts","timestamp":1681950487776},{"id":"bbRF.ts","timestamp":1681952212564},{"id":"T5G5.ts","timestamp":1681954689736},{"id":"gEML.ts","timestamp":1681954952060},{"id":"893D.ts","timestamp":1681955207908},{"id":"lP2U.ts","timestamp":1682108505356},{"id":"0YmO.ts","timestamp":1682465996928},{"id":"vIWT.ts","timestamp":1682466020468},{"id":"o0GL.ts","timestamp":1682466581020},{"id":"Qcz8.ts","timestamp":1683385942305},{"id":"AREL.ts","timestamp":1687806901109},{"id":"uLlP.ts","timestamp":1687807353555},{"id":"EVrB.ts","timestamp":1687807370795},{"id":"l1Wg.ts","timestamp":1687807392259},{"id":"LCDj.ts","timestamp":1687807410103},{"id":"P0PH.ts","timestamp":1687808108289},{"id":"D8jh.ts","timestamp":1687808367524},{"id":"fwVH.ts","timestamp":1688411660622}]}
{"version":1,"resource":"file:///data/stronglogic/kscord/build/BUILDCONFIG.gn","entries":[{"id":"jFu9.gn","timestamp":1675214822494},{"id":"rpN4.gn","timestamp":1675320109305},{"id":"Cod8.gn","timestamp":1675537553663}]}
{"version":1,"resource":"file:///data/stronglogic/klogger/third_party/k3log/Build.cmake","entries":[{"id":"i0Yl.cmake","timestamp":1683727786272},{"id":"Unwk.cmake","timestamp":1683989991268},{"id":"IfoW.cmake","timestamp":1683995107372},{"id":"R8vd.cmake","timestamp":1683995151516},{"id":"9hrW.cmake","timestamp":1683995217972},{"id":"OPio.cmake","timestamp":1683995304820},{"id":"LBda.cmake","timestamp":1683995330612}]}
{"version":1,"resource":"file:///data/logicp/logicp_writings/collectivist_theology/historicist_mind.md","entries":[{"id":"q2hU.md","source":"textFileCreate.source","timestamp":1673661733078},{"id":"G6Ak.md","timestamp":1673662740997},{"id":"hNyW.md","timestamp":1677220611864},{"id":"Bey8.md","timestamp":1677222401468},{"id":"w4Y1.md","timestamp":1677258834460},{"id":"NKuB.md","timestamp":1677275958469},{"id":"TTGq.md","timestamp":1677276408541},{"id":"NjlF.md","timestamp":1677306299320},{"id":"5fDu.md","timestamp":1685322322630},{"id":"Mjyn.md","timestamp":1685401745370},{"id":"LlQx.md","timestamp":1686619824386},{"id":"Vzap.md","timestamp":1718826727149},{"id":"gkfI.md","timestamp":1719012858764},{"id":"ADUh.md","timestamp":1719013400018}]}
{"version":1,"resource":"file:///data/stronglogic/kneural/CMakeLists.txt","entries":[{"id":"mGmL.txt","timestamp":1666236409600}]}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
POST https://api.twitter.com/2/oauth2/token' --header 'Content-Type: application/x-www-form-urlencoded' --header 'Authorization: Bearer AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz' --data-urlencode 'grant_type=refresh_token' --data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "BlxCrxji3hCJSqYOkkU197oxf",
"apiKeySecret": "UfOqiJW8VA2v5zX7b1m0Gtjx1vK5j2sWlNuAEJmNNjVAWJs3g0",
"bearer": "AAAAAAAAAAAAAAAAAAAAAE3IoAEAAAAA4%2FBUzx3f5QEJY4j4oCUj6%2FvQtN0%3DntBIhpw1qaGFPiJKoWSY5oH3dLvZxhcxM9kZ2UHRuR9ur1Wpkk",
"id": "1399461905148809216",
"clientId": "UHM2RGhOY3NJbW8xNHdhV0p5V2c6MTpjaQ",
"clientSecret": "aCkYRqFkDpvSUPN_RhtV1yoNztCVx1y6UEOiAB1em3fooKSTR8"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB",
"code": "enYycDcwd1RyY2Q3NXhCZ1dzbl9ZWUtVSDJYcTMtQW55Q3l4cDNRNnUzTDZGOjE2OTQ4MjUyMzU5NTM6MToxOmFjOjE"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshi": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
POST https://api.twitter.com/2/oauth2/token --header 'Content-Type: application/x-www-form-urlencoded' --header 'Authorization: Bearer AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz' --data-urlencode 'grant_type=refresh_token' --data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
POST https://api.twitter.com/2/oauth2/token --header 'Content-Type: application/x-www-form-urlencoded' --header 'Authorization: Bearer AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz' --data-urlencode 'grant_type=refresh_token' --data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshi": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "BlxCrxji3hCJSqYOkkU197oxf",
"apiKeySecret": "UfOqiJW8VA2v5zX7b1m0Gtjx1vK5j2sWlNuAEJmNNjVAWJs3g0",
"bearer": "AAAAAAAAAAAAAAAAAAAAAE3IoAEAAAAA4%2FBUzx3f5QEJY4j4oCUj6%2FvQtN0%3DntBIhpw1qaGFPiJKoWSY5oH3dLvZxhcxM9kZ2UHRuR9ur1Wpkk",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
}
}
}
{"version":1,"resource":"file:///data/stronglogic/kwitter/config/tokens.json","entries":[{"id":"t77g.json","timestamp":1681520591178},{"id":"ciCc.json","timestamp":1681520623830},{"id":"Yg3d.json","timestamp":1681520636738},{"id":"IjLh.json","timestamp":1681520650838},{"id":"eUHl.json","timestamp":1681618384678},{"id":"qtew.json","timestamp":1685902255886},{"id":"Qhz3.json","timestamp":1685902502018},{"id":"FUwW.json","timestamp":1685902517818},{"id":"7gUW.json","timestamp":1685902599722},{"id":"CQtu.json","timestamp":1686803334702},{"id":"4cbO.json","timestamp":1686803389714},{"id":"qxxk.json","timestamp":1686861266582},{"id":"Hlyq.json","timestamp":1686861281890},{"id":"ttbo.json","timestamp":1686861305414},{"id":"Hwf8.json","timestamp":1686861501278},{"id":"Bv2B.json","timestamp":1686861550882},{"id":"zMVy.json","timestamp":1687221625382},{"id":"ZTmW.json","timestamp":1687221799538},{"id":"qnaG.json","timestamp":1687221857898},{"id":"gQGk.json","timestamp":1687221908930},{"id":"ewlZ.json","timestamp":1687222028002},{"id":"oJ75.json","timestamp":1687284005702},{"id":"erqe.json","timestamp":1687284055586},{"id":"0sPw.json","timestamp":1687284085042},{"id":"7jDt.json","timestamp":1687284116618},{"id":"BrQy.json","timestamp":1687284127214},{"id":"Q2oV.json","timestamp":1688264441690},{"id":"TyNO.json","timestamp":1688264451722},{"id":"7EK6.json","timestamp":1694825260244},{"id":"lu7G.json","timestamp":1694825789650},{"id":"z8GK.json","timestamp":1694869810343}]}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Bearer AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz'\
--data-urlencode 'grant_type=refresh_token' \
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshi": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshi": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "McNtTClBNjRzrgq5x5oEg4d5M",
"apiKeySecret": "9QgC0qoenGKe1q2CVQnxEbUJyqm2ncTbINdh57pp6bFjVWV4Ju",
"bearer": "AAAAAAAAAAAAAAAAAAAAAE3IoAEAAAAAJlDT0y7BnR6%2BIBQecHbZjBXRdJg%3D5D9WJKnHHuK6Yrc5y5DljA5Sou8DUnCB384QdM7wt8PnwbWEOc",
"id": "1399461905148809216",
"clientId": "UHM2RGhOY3NJbW8xNHdhV0p5V2c6MTpjaQ",
"clientSecret": "aCkYRqFkDpvSUPN_RhtV1yoNztCVx1y6UEOiAB1em3fooKSTR8"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "UHM2RGhOY3NJbW8xNHdhV0p5V2c6MTpjaQ",
"clientSecret": "fflM9iHXapySHwHmDFKXOnvCzBbCmo6v8vvBs9YIPJmvcpqlty"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshi": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":""
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "bjVZOWVDa29fRWoxTkd6MkZGRS1hWnp1OWhhMWFKd0x4QzRVQzhjYnFDVk02OjE2OTQ4MjU3Njg4NjA6MToxOmF0OjE",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB",
"code": "enYycDcwd1RyY2Q3NXhCZ1dzbl9ZWUtVSDJYcTMtQW55Q3l4cDNRNnUzTDZGOjE2OTQ4MjUyMzU5NTM6MToxOmFjOjE"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
--data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=http://localhost' \
--data-urlencode 'code_verifier=challenge'
--data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
// https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
// YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
// curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
// --header 'Content-Type: application/x-www-form-urlencoded' \
// --header 'Authorization: Basic cmJ1Y2tzaGk6TWFybnVuZ2xlcnR1YmU5NDAyCg=='\
// --data-urlencode 'code=YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE' \
// --data-urlencode 'grant_type=authorization_code' \
// --data-urlencode 'redirect_uri=http://localhost' \
// --data-urlencode 'code_verifier=challenge'
// --data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
// POST https://api.twitter.com/2/oauth2/token --header 'Content-Type: application/x-www-form-urlencoded' --header 'Authorization: Bearer AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz' --data-urlencode 'grant_type=refresh_token' --data-urlencode 'client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshi": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
curl --location --request POST 'https://api.twitter.com/2/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic V1ROclFTMTRiVWhwTWw4M2FVNWFkVGQyTldNNk1UcGphUTotUm9LeDN4NThKQThTbTlKSXQyZm1BanEzcTVHWC1icVozdmpKeFNlR3NkbUd0WEViUA=='\
--data-urlencode 'code=VGNibzFWSWREZm01bjN1N3dicWlNUG1oa2xRRVNNdmVHelJGY2hPWGxNd2dxOjE2MjIxNjA4MjU4MjU6MToxOmFjOjE' \
--data-urlencode 'grant_type=authorization_code' \
--data-urlencode 'redirect_uri=https://www.example.com' \
--data-urlencode 'code_verifier=challenge'
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshi": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "McNtTClBNjRzrgq5x5oEg4d5M",
"apiKeySecret": "9QgC0qoenGKe1q2CVQnxEbUJyqm2ncTbINdh57pp6bFjVWV4Ju",
"bearer": "AAAAAAAAAAAAAAAAAAAAAE3IoAEAAAAA4%2FBUzx3f5QEJY4j4oCUj6%2FvQtN0%3DntBIhpw1qaGFPiJKoWSY5oH3dLvZxhcxM9kZ2UHRuR9ur1Wpkk",
"id": "1399461905148809216",
"clientId": "UHM2RGhOY3NJbW8xNHdhV0p5V2c6MTpjaQ",
"clientSecret": "aCkYRqFkDpvSUPN_RhtV1yoNztCVx1y6UEOiAB1em3fooKSTR8"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshi": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "McNtTClBNjRzrgq5x5oEg4d5M",
"apiKeySecret": "9QgC0qoenGKe1q2CVQnxEbUJyqm2ncTbINdh57pp6bFjVWV4Ju",
"bearer": "AAAAAAAAAAAAAAAAAAAAAE3IoAEAAAAAJlDT0y7BnR6%2BIBQecHbZjBXRdJg%3D5D9WJKnHHuK6Yrc5y5DljA5Sou8DUnCB384QdM7wt8PnwbWEOc",
"id": "1399461905148809216",
"clientId": "UHM2RGhOY3NJbW8xNHdhV0p5V2c6MTpjaQ",
"clientSecret": "fflM9iHXapySHwHmDFKXOnvCzBbCmo6v8vvBs9YIPJmvcpqlty"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshi": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1379410084187504641"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "bjVZOWVDa29fRWoxTkd6MkZGRS1hWnp1OWhhMWFKd0x4QzRVQzhjYnFDVk02OjE2OTQ4MjU3Njg4NjA6MToxOmF0OjE",
"longBearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB",
"code": "enYycDcwd1RyY2Q3NXhCZ1dzbl9ZWUtVSDJYcTMtQW55Q3l4cDNRNnUzTDZGOjE2OTQ4MjUyMzU5NTM6MToxOmFjOjE"
}
}
}
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
{
"users": {
"kwitter": {
"apiKey":"Qu4z3N3iFcWs7dXsmUrEwsisK",
"apiKeySecret":"KSw7aIHRGr44OFHnlIK33ybtS1Jx4TsNXCSoIz0fHXBweKOZp2",
"bearer":"AAAAAAAAAAAAAAAAAAAAAG6LRAEAAAAA7px28QUUgazeKr2FTlQUUHYJn%2Fw%3DfGR8knXD8u0GCLVc90JSxjwZGZE3zQe7LXe8ZWtNIAzqdAQN49",
"id":"1379410084187504641"
},
"rbuckshiOLD": {
"apiKey":"nHvw8tnhkcQV1ijgQBRsMVPgO",
"apiKeySecret":"AB6IgWoMgSM1mh2AMKIiSldr9bZbzGtsdlhaqiY1a9iqgIuCkz",
"bearer":"AAAAAAAAAAAAAAAAAAAAADzvmgEAAAAAXD5gegCmJlD7B6VV87FzpxGlJAo%3DwAuvrlTMNxba3VEw1nLNxQiyDOM51nluw1frut98DpTb5F5u5c",
"id":"1399461905148809216"
},
"rbuckshinewer": {
"apiKey":"2c6i1aA7XQLDuFA6Xnlm7S7ca",
"apiKeySecret":"ScvtoLHgPG4hjA8fAXqmDj4syFlx4ZbvU1p663arFW54Ys8Sk6",
"bearer":"AAAAAAAAAAAAAAAAAAAAAB75ngEAAAAAPQ2at%2Bv2cF1MFBb0gw7UUV9qW1I%3DhMEIjxPYQMGszzhqHAWOE6HWPnDB4Ql7S98LzPqJIHTbrP4C1y",
"id":"1399461905148809216"
},
"rbuckshilast": {
"apiKey": "CJ4v9BjjYtRsLTSyTDMqO2MtQ",
"apiKeySecret": "PqMhLmNXjhg5Xp00OC2o2ypcmNDPID3khoSqXbvf4BextITvyz",
"bearer": "AAAAAAAAAAAAAAAAAAAAADfinwEAAAAAdtPq4WUOtjI8ZOzhdLauqg7EPUY%3DZTBWxjCjKAKdTqWnvikHjpQTpsHMXCZs2qmNG0KXNsh4pHQupY",
"id": "1399461905148809216",
"clientId": "SEl2cGdhS1pjQ053SHNQTnAxRy06MTpjaQ",
"clientSecret": "YPedceQmClIG1oznX28fefZuFlkLtZXiQQ3b2O07X94_llPBZS"
},
"rbuckshi": {
"apiKey": "50zFPvgMdQNndLdUSGj2cqLj5",
"apiKeySecret": "hjq6uouPCSlMov89PiTHTlnq3iEx5mBXkif6anQz3QY935PKld",
"bearer": "AAAAAAAAAAAAAAAAAAAAAEvboAEAAAAA6At72Vz2Frt1mMGv4hGCCUbrf4A%3D1BIwNviVDw0uJfdKZxVwKzpQy2jqR1TazNK3A7LSP7DEm36iDz",
"id": "1399461905148809216",
"clientId": "QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ",
"clientSecret": "1volkKlCr5L8Slons_qOLuRYJUi2kjVFhmuEopHsweSNvGR1sB"
}
}
}
https://twitter.com/i/oauth2/authorize?response_type=code&client_id=QlZzZkxiYlFuU2pKRy1WWXVCNjU6MTpjaQ&redirect_uri=http://localhost&scope=tweet.read%20users.read%20follows.read%20offline.access&state=state&code_challenge=challenge&code_challenge_method=plain
YzludGU4eDdkTnU2eHM5ZXFJSHgyZWFCM3I2QmtabzdtZU1zOWpndnZvOXhHOjE2ODcyMjE5MzI4MTY6MToxOmFjOjE
{"version":1,"resource":"file:///data/stronglogic/code_study/active_object/active.cpp","entries":[{"id":"3klu.cpp","timestamp":1684641648232},{"id":"vmru.cpp","timestamp":1684642422332},{"id":"xd7V.cpp","timestamp":1684645496748},{"id":"OY52.cpp","timestamp":1684645651424},{"id":"BI0v.cpp","timestamp":1684645671516},{"id":"Ep7q.cpp","timestamp":1684645712492},{"id":"9BHR.cpp","timestamp":1684645748352},{"id":"ycUT.cpp","timestamp":1684645828268},{"id":"lom7.cpp","timestamp":1684645913316},{"id":"98Kg.cpp","timestamp":1684645980684},{"id":"YfaN.cpp","timestamp":1684646016712},{"id":"UgZc.cpp","timestamp":1684646048376},{"id":"z9LW.cpp","timestamp":1684646068980},{"id":"yy36.cpp","timestamp":1684646083576},{"id":"oJUb.cpp","timestamp":1684646110920},{"id":"Dhbo.cpp","timestamp":1684646202368},{"id":"RIaY.cpp","timestamp":1684646238900},{"id":"JnZG.cpp","timestamp":1684646262072},{"id":"kfUS.cpp","timestamp":1684646316336},{"id":"HGld.cpp","timestamp":1684646366136},{"id":"C1o4.cpp","timestamp":1684646405048},{"id":"8Xnn.cpp","timestamp":1684646440148},{"id":"4B8H.cpp","timestamp":1684646486308},{"id":"MCPa.cpp","timestamp":1684646509212},{"id":"9Lnx.cpp","timestamp":1684646572484},{"id":"zjYx.cpp","timestamp":1684646813020},{"id":"9Bg9.cpp","timestamp":1684646868520},{"id":"uKlE.cpp","timestamp":1684646882204},{"id":"ClhR.cpp","timestamp":1684646903220},{"id":"hsnN.cpp","timestamp":1684646938920},{"id":"HKIR.cpp","timestamp":1684646948952},{"id":"HXpt.cpp","timestamp":1684646985020},{"id":"Z3oF.cpp","timestamp":1684647109716},{"id":"Gzpu.cpp","timestamp":1684647149832},{"id":"R3ZQ.cpp","timestamp":1684647275456},{"id":"YBxK.cpp","timestamp":1684647332948},{"id":"L1C0.cpp","timestamp":1684647355852},{"id":"SZzu.cpp","timestamp":1684647389948},{"id":"4TG1.cpp","timestamp":1684647405792},{"id":"wHWx.cpp","timestamp":1684649537940},{"id":"MjPS.cpp","timestamp":1684673865720}]}
{"version":1,"resource":"file:///home/logicp/Documents/dcv/dcvviewer.log","entries":[{"id":"0JSE.log","source":"textFileCreate.source","timestamp":1709945702705}]}
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29350",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.620",
"published": "2023-05-05T23:15:09.253",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29334",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.547",
"published": "2023-04-28T18:15:26.390",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-28301",
"type": "edge",
"impact": 1.4,
"severity": 3.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-17T01:15:41.840",
"published": "2023-04-11T21:15:27.840",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-28286",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.463",
"published": "2023-04-27T19:15:20.467",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28284",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-19T14:33:42.267",
"published": "2023-04-11T21:15:26.817",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28261",
"type": "edge",
"impact": 4.2,
"severity": 5.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.373",
"published": "2023-04-27T19:15:20.350",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.4
},
{
"id": "CVE-2023-24935",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-28T18:15:26.083",
"published": "2023-04-11T21:15:20.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29354",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.713",
"published": "2023-05-05T23:15:09.333",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-29350",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.620",
"published": "2023-05-05T23:15:09.253",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29334",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.547",
"published": "2023-04-28T18:15:26.390",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-28301",
"type": "edge",
"impact": 1.4,
"severity": 3.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-17T01:15:41.840",
"published": "2023-04-11T21:15:27.840",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-28286",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.463",
"published": "2023-04-27T19:15:20.467",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28284",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-19T14:33:42.267",
"published": "2023-04-11T21:15:26.817",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28261",
"type": "edge",
"impact": 4.2,
"severity": 5.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.373",
"published": "2023-04-27T19:15:20.350",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.4
},
{
"id": "CVE-2023-24935",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-28T18:15:26.083",
"published": "2023-04-11T21:15:20.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-28301",
"type": "edge",
"impact": 1.4,
"severity": 3.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-17T01:15:41.840",
"published": "2023-04-11T21:15:27.840",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-28286",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.463",
"published": "2023-04-27T19:15:20.467",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28284",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-19T14:33:42.267",
"published": "2023-04-11T21:15:26.817",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28261",
"type": "edge",
"impact": 4.2,
"severity": 5.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.373",
"published": "2023-04-27T19:15:20.350",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.4
},
{
"id": "CVE-2023-24935",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-28T18:15:26.083",
"published": "2023-04-11T21:15:20.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-28284",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-19T14:33:42.267",
"published": "2023-04-11T21:15:26.817",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28261",
"type": "edge",
"impact": 4.2,
"severity": 5.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.373",
"published": "2023-04-27T19:15:20.350",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.4
},
{
"id": "CVE-2023-24935",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-28T18:15:26.083",
"published": "2023-04-11T21:15:20.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29334",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.547",
"published": "2023-04-28T18:15:26.390",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-28301",
"type": "edge",
"impact": 1.4,
"severity": 3.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-17T01:15:41.840",
"published": "2023-04-11T21:15:27.840",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-28286",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.463",
"published": "2023-04-27T19:15:20.467",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28284",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-19T14:33:42.267",
"published": "2023-04-11T21:15:26.817",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28261",
"type": "edge",
"impact": 4.2,
"severity": 5.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.373",
"published": "2023-04-27T19:15:20.350",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.4
},
{
"id": "CVE-2023-24935",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-28T18:15:26.083",
"published": "2023-04-11T21:15:20.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29354",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.713",
"published": "2023-05-05T23:15:09.333",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-29350",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.620",
"published": "2023-05-05T23:15:09.253",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29334",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.547",
"published": "2023-04-28T18:15:26.390",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-28301",
"type": "edge",
"impact": 1.4,
"severity": 3.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-17T01:15:41.840",
"published": "2023-04-11T21:15:27.840",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-28286",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.463",
"published": "2023-04-27T19:15:20.467",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28284",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-19T14:33:42.267",
"published": "2023-04-11T21:15:26.817",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-28261",
"type": "edge",
"impact": 4.2,
"severity": 5.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.373",
"published": "2023-04-27T19:15:20.350",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.4
},
{
"id": "CVE-2023-2726",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:15.260",
"published": "2023-05-16T19:15:09.433",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2725",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:15.187",
"published": "2023-05-16T19:15:09.383",
"description": "Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2724",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:15.107",
"published": "2023-05-16T19:15:09.327",
"description": "Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2723",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:15.037",
"published": "2023-05-16T19:15:09.277",
"description": "Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2722",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.967",
"published": "2023-05-16T19:15:09.217",
"description": "Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2721",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.887",
"published": "2023-05-16T19:15:09.160",
"description": "Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-24935",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-04-28T18:15:26.083",
"published": "2023-04-11T21:15:20.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-24892",
"type": "edge",
"impact": 4.7,
"severity": 8.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-19T15:09:28.003",
"published": "2023-03-14T17:15:18.197",
"description": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2468",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.817",
"published": "2023-05-03T00:15:09.747",
"description": "Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed a remote attacker who had compromised the renderer process to obfuscate the security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2467",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.757",
"published": "2023-05-03T00:15:09.697",
"description": "Inappropriate implementation in Prompts in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to bypass permissions restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2466",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.697",
"published": "2023-05-03T00:15:09.647",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2465",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.623",
"published": "2023-05-03T00:15:09.597",
"description": "Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2464",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.560",
"published": "2023-05-03T00:15:09.550",
"description": "Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to perform an origin spoof in the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2463",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.500",
"published": "2023-05-03T00:15:09.497",
"description": "Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2462",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.440",
"published": "2023-05-03T00:15:09.443",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to obfuscate main origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2461",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.367",
"published": "2023-05-03T00:15:09.387",
"description": "Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2460",
"type": "chrome",
"impact": 4.2,
"severity": 7.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.307",
"published": "2023-05-03T00:15:09.327",
"description": "Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2459",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.233",
"published": "2023-05-03T00:15:08.803",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to bypass permission restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2458",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-19T18:33:22.990",
"published": "2023-05-12T18:15:09.573",
"description": "Use after free in ChromeOS Camera in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2457",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-19T18:33:08.217",
"published": "2023-05-12T18:15:09.530",
"description": "Out of bounds write in ChromeOS Audio Server in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker to potentially exploit heap corruption via crafted audio file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-23374",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.287",
"published": "2023-02-14T20:15:16.827",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-2314",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:00.180",
"published": "2023-07-29T00:15:12.077",
"description": "Insufficient data validation in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2313",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:15:59.363",
"published": "2023-07-29T00:15:12.023",
"description": "Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2311",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:15:58.930",
"published": "2023-07-29T00:15:11.967",
"description": "Insufficient policy enforcement in File System API in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2137",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.170",
"published": "2023-04-19T04:15:31.667",
"description": "Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2136",
"type": "chrome",
"impact": 6,
"severity": 9.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.107",
"published": "2023-04-19T04:15:31.607",
"description": "Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2135",
"type": "chrome",
"impact": 5.9,
"severity": 7.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:14.033",
"published": "2023-04-19T04:15:31.533",
"description": "Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 1.6
},
{
"id": "CVE-2023-2134",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:13.953",
"published": "2023-04-19T04:15:31.473",
"description": "Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2133",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:13.873",
"published": "2023-04-19T04:15:31.360",
"description": "Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2033",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:13.787",
"published": "2023-04-14T19:15:09.453",
"description": "Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1823",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:13.017",
"published": "2023-04-04T22:15:07.810",
"description": "Inappropriate implementation in FedCM in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1822",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.953",
"published": "2023-04-04T22:15:07.770",
"description": "Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1821",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.873",
"published": "2023-04-04T22:15:07.733",
"description": "Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1820",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.817",
"published": "2023-04-04T22:15:07.697",
"description": "Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1819",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.757",
"published": "2023-04-04T22:15:07.663",
"description": "Out of bounds read in Accessibility in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1818",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.697",
"published": "2023-04-04T22:15:07.623",
"description": "Use after free in Vulkan in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1817",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.633",
"published": "2023-04-04T22:15:07.587",
"description": "Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1816",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.570",
"published": "2023-04-04T22:15:07.553",
"description": "Incorrect security UI in Picture In Picture in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially perform navigation spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1815",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.510",
"published": "2023-04-04T22:15:07.517",
"description": "Use after free in Networking APIs in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1814",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.450",
"published": "2023-04-04T22:15:07.477",
"description": "Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1813",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.390",
"published": "2023-04-04T22:15:07.440",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1812",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.333",
"published": "2023-04-04T22:15:07.400",
"description": "Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1811",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.280",
"published": "2023-04-04T22:15:07.363",
"description": "Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1810",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.207",
"published": "2023-04-04T22:15:07.317",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1534",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:12.150",
"published": "2023-03-21T21:15:12.747",
"description": "Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1533",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.970",
"published": "2023-03-21T21:15:12.690",
"description": "Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1532",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.897",
"published": "2023-03-21T21:15:12.613",
"description": "Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1531",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.817",
"published": "2023-03-21T21:15:12.527",
"description": "Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1530",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.753",
"published": "2023-03-21T21:15:12.413",
"description": "Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1529",
"type": "chrome",
"impact": 5.9,
"severity": 9.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.693",
"published": "2023-03-21T21:15:12.357",
"description": "Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)",
"exploitability": 3.9
},
{
"id": "CVE-2023-1528",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.603",
"published": "2023-03-21T21:15:12.297",
"description": "Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1236",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-10T20:16:41.317",
"published": "2023-03-07T22:15:10.590",
"description": "Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1235",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-10T20:16:56.963",
"published": "2023-03-07T22:15:10.537",
"description": "Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1234",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-10T20:22:25.557",
"published": "2023-03-07T22:15:10.480",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1233",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-10T20:24:18.283",
"published": "2023-03-07T22:15:10.423",
"description": "Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1232",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-10T20:31:04.580",
"published": "2023-03-07T22:15:10.363",
"description": "Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1231",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-10T20:44:11.770",
"published": "2023-03-07T22:15:10.310",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1230",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:33:48.303",
"published": "2023-03-07T22:15:10.253",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1229",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:34:10.100",
"published": "2023-03-07T22:15:10.197",
"description": "Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1228",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:34:27.697",
"published": "2023-03-07T22:15:10.147",
"description": "Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1227",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:37:32.080",
"published": "2023-03-07T22:15:10.087",
"description": "Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1226",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:37:54.820",
"published": "2023-03-07T22:15:10.020",
"description": "Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1225",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:38:08.387",
"published": "2023-03-07T22:15:09.957",
"description": "Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1224",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:38:23.370",
"published": "2023-03-07T22:15:09.903",
"description": "Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1223",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:38:37.183",
"published": "2023-03-07T22:15:09.847",
"description": "Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1222",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:38:47.470",
"published": "2023-03-07T22:15:09.787",
"description": "Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1221",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:39:03.177",
"published": "2023-03-07T22:15:09.737",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1220",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-04-10T20:15:08.417",
"published": "2023-03-07T22:15:09.680",
"description": "Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1219",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-04-10T20:15:08.343",
"published": "2023-03-07T22:15:09.627",
"description": "Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:39:31.890",
"published": "2023-03-07T22:15:09.573",
"description": "Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1217",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:39:48.537",
"published": "2023-03-07T22:15:09.517",
"description": "Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:40:02.227",
"published": "2023-03-07T22:15:09.453",
"description": "Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:40:11.190",
"published": "2023-03-07T22:15:09.397",
"description": "Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:40:22.627",
"published": "2023-03-07T22:15:09.333",
"description": "Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-1213",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-03-11T02:51:52.297",
"published": "2023-03-07T22:15:09.277",
"description": "Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0941",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.543",
"published": "2023-02-22T20:15:12.410",
"description": "Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.487",
"published": "2023-02-22T20:15:12.343",
"description": "Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.433",
"published": "2023-02-22T20:15:12.280",
"description": "Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.297",
"published": "2023-02-22T20:15:12.230",
"description": "Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.237",
"published": "2023-02-22T20:15:12.177",
"description": "Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.180",
"published": "2023-02-22T20:15:12.123",
"description": "Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0928",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.107",
"published": "2023-02-22T20:15:12.070",
"description": "Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0927",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:11.030",
"published": "2023-02-22T20:15:12.010",
"description": "Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0705",
"type": "chrome",
"impact": 5.9,
"severity": 7.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.967",
"published": "2023-02-07T21:15:09.787",
"description": "Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 1.6
},
{
"id": "CVE-2023-0704",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.907",
"published": "2023-02-07T21:15:09.733",
"description": "Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0703",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.850",
"published": "2023-02-07T21:15:09.683",
"description": "Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0702",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.793",
"published": "2023-02-07T21:15:09.630",
"description": "Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0701",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.737",
"published": "2023-02-07T21:15:09.577",
"description": "Heap buffer overflow in WebUI in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interaction . (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0700",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.683",
"published": "2023-02-07T21:15:09.523",
"description": "Inappropriate implementation in Download in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0699",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.623",
"published": "2023-02-07T21:15:09.470",
"description": "Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0698",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.553",
"published": "2023-02-07T21:15:09.417",
"description": "Out of bounds read in WebRTC in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0697",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.483",
"published": "2023-02-07T21:15:09.360",
"description": "Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0696",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-30T11:15:10.407",
"published": "2023-02-07T21:15:09.300",
"description": "Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-02-06T21:28:21.513",
"published": "2023-01-30T09:15:08.957",
"description": "Use after free in GuestView in Google Chrome prior to 109.0.5414.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a Chrome web app. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0473",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-02-06T21:40:07.187",
"published": "2023-01-30T09:15:08.903",
"description": "Type Confusion in ServiceWorker API in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0472",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-02-06T21:41:11.603",
"published": "2023-01-30T09:15:08.850",
"description": "Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0471",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-02-06T21:42:57.417",
"published": "2023-01-30T09:15:08.790",
"description": "Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0141",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.907",
"published": "2023-01-10T20:15:11.400",
"description": "Insufficient policy enforcement in CORS in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0140",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.820",
"published": "2023-01-10T20:15:11.350",
"description": "Inappropriate implementation in in File System API in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0139",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.710",
"published": "2023-01-10T20:15:11.293",
"description": "Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0138",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.627",
"published": "2023-01-10T20:15:11.243",
"description": "Heap buffer overflow in libphonenumber in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0137",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.550",
"published": "2023-01-10T20:15:11.190",
"description": "Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0136",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.477",
"published": "2023-01-10T20:15:11.137",
"description": "Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0135",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.403",
"published": "2023-01-10T20:15:11.083",
"description": "Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0134",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.327",
"published": "2023-01-10T20:15:11.030",
"description": "Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0133",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.217",
"published": "2023-01-10T20:15:10.977",
"description": "Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0132",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.117",
"published": "2023-01-10T20:15:10.923",
"description": "Inappropriate implementation in in Permission prompts in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to force acceptance of a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0131",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:44.047",
"published": "2023-01-10T20:15:10.867",
"description": "Inappropriate implementation in in iframe Sandbox in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to bypass file download restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0130",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:43.980",
"published": "2023-01-10T20:15:10.817",
"description": "Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0129",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:43.897",
"published": "2023-01-10T20:15:10.760",
"description": "Heap buffer overflow in Network Service in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-0128",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-05-03T12:16:43.813",
"published": "2023-01-10T20:15:10.703",
"description": "Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:47:58.397",
"published": "2023-09-15T22:15:13.613",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36562",
"type": "edge",
"impact": 3.7,
"severity": 7.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-21T14:14:05.540",
"published": "2023-09-15T22:15:13.490",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36559",
"type": "edge",
"impact": 2.5,
"severity": 4.2,
"sourceId": "secure@microsoft.com",
"modified": "2023-10-13T21:31:49.997",
"published": "2023-10-13T21:15:51.583",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3598",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:07.487",
"published": "2023-07-28T21:15:14.287",
"description": "Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-35392",
"type": "edge",
"impact": 1.4,
"severity": 4.7,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:42:05.133",
"published": "2023-07-21T18:15:10.247",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3497",
"type": "chrome",
"impact": 3.6,
"severity": 4.6,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-29T01:15:09.270",
"published": "2023-07-03T17:15:09.540",
"description": "Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)",
"exploitability": 0.9
},
{
"id": "CVE-2023-3422",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:12.673",
"published": "2023-06-26T21:15:09.640",
"description": "Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3421",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-25T19:15:09.827",
"published": "2023-06-26T21:15:09.597",
"description": "Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3420",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-04T04:15:11.653",
"published": "2023-06-26T21:15:09.557",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-33145",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-21T20:50:33.723",
"published": "2023-06-14T00:15:12.597",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-33143",
"type": "edge",
"impact": 5.3,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-09T16:09:51.060",
"published": "2023-06-03T01:15:36.693",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-3217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-17T16:15:10.247",
"published": "2023-06-13T18:15:22.320",
"description": "Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3216",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.537",
"published": "2023-06-13T18:15:22.273",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3215",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.477",
"published": "2023-06-13T18:15:22.223",
"description": "Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3214",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-27T02:15:09.400",
"published": "2023-06-13T18:15:22.170",
"description": "Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3079",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-17T04:15:45.680",
"published": "2023-06-05T22:15:12.383",
"description": "Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2941",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:16.383",
"published": "2023-05-30T22:15:10.570",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2940",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:15.660",
"published": "2023-05-30T22:15:10.527",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2939",
"type": "chrome",
"impact": 5.9,
"severity": 7.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.963",
"published": "2023-05-30T22:15:10.477",
"description": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)",
"exploitability": 1.8
},
{
"id": "CVE-2023-2938",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:14.350",
"published": "2023-05-30T22:15:10.433",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2937",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:13.630",
"published": "2023-05-30T22:15:10.393",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2936",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.187",
"published": "2023-05-30T22:15:10.350",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2935",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-30T18:15:10.110",
"published": "2023-05-30T22:15:10.307",
"description": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-29345",
"type": "edge",
"impact": 2.7,
"severity": 6.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-06-14T18:35:45.610",
"published": "2023-06-07T18:15:09.673",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-2934",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-07-02T22:15:40.493",
"published": "2023-05-30T22:15:10.257",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2933",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:11.473",
"published": "2023-05-30T22:15:10.210",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2932",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.767",
"published": "2023-05-30T22:15:10.167",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2931",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:10.447",
"published": "2023-05-30T22:15:10.117",
"description": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2930",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-06-04T04:15:09.877",
"published": "2023-05-30T22:15:10.067",
"description": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2929",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-10T03:16:01.777",
"published": "2023-05-30T22:15:09.997",
"description": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-2312",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.130",
"published": "2023-08-15T18:15:10.017",
"description": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-21796",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.237",
"published": "2023-01-24T00:15:10.747",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21795",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:10.107",
"published": "2023-01-24T00:15:10.673",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21794",
"type": "edge",
"impact": 1.4,
"severity": 4.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.207",
"published": "2023-02-14T20:15:14.950",
"description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-21775",
"type": "edge",
"impact": 6,
"severity": 8.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-05-09T17:15:09.937",
"published": "2023-01-24T00:15:10.590",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21720",
"type": "edge",
"impact": 3.6,
"severity": 5.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-30T11:15:13.077",
"published": "2023-02-14T20:15:14.590",
"description": "Microsoft Edge (Chromium-based) Tampering Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-21719",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-02T17:19:09.020",
"published": "2023-01-24T00:15:10.497",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
}
]
[
{
"id": "CVE-2023-5487",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.550",
"published": "2023-10-11T23:15:11.110",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5486",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.947",
"published": "2023-10-11T23:15:11.060",
"description": "Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5485",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.890",
"published": "2023-10-11T23:15:11.007",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5484",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.463",
"published": "2023-10-11T23:15:10.950",
"description": "Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5483",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.777",
"published": "2023-10-11T23:15:10.897",
"description": "Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5481",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.677",
"published": "2023-10-11T23:15:10.850",
"description": "Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5479",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.580",
"published": "2023-10-11T23:15:10.797",
"description": "Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5478",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.500",
"published": "2023-10-11T23:15:10.747",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5477",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.440",
"published": "2023-10-11T23:15:10.700",
"description": "Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5476",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.383",
"published": "2023-10-11T23:15:10.650",
"description": "Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5475",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.380",
"published": "2023-10-11T23:15:10.603",
"description": "Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5474",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.257",
"published": "2023-10-11T23:15:10.557",
"description": "Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5473",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T02:15:10.060",
"published": "2023-10-11T23:15:10.503",
"description": "Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5346",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-10T03:15:10.050",
"published": "2023-10-05T18:15:13.270",
"description": "Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5218",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-14T03:15:10.277",
"published": "2023-10-11T23:15:10.443",
"description": "Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5217",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-17T05:15:50.840",
"published": "2023-09-28T16:15:10.980",
"description": "Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5187",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:45:40.760",
"published": "2023-09-28T16:15:10.883",
"description": "Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-5186",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:46:12.913",
"published": "2023-09-28T16:15:10.760",
"description": "Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4909",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.687",
"published": "2023-09-12T21:15:09.073",
"description": "Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4908",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.627",
"published": "2023-09-12T21:15:09.010",
"description": "Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4907",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.550",
"published": "2023-09-12T21:15:08.950",
"description": "Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4906",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.490",
"published": "2023-09-12T21:15:08.893",
"description": "Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4905",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.430",
"published": "2023-09-12T21:15:08.837",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4904",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.370",
"published": "2023-09-12T21:15:08.777",
"description": "Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4903",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.310",
"published": "2023-09-12T21:15:08.717",
"description": "Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4902",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.250",
"published": "2023-09-12T21:15:08.657",
"description": "Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4901",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.183",
"published": "2023-09-12T21:15:08.603",
"description": "Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4900",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:45.110",
"published": "2023-09-12T21:15:08.537",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4863",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-02T02:15:44.943",
"published": "2023-09-12T15:15:24.327",
"description": "Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4764",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.837",
"published": "2023-09-05T22:15:09.883",
"description": "Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4763",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.767",
"published": "2023-09-05T22:15:09.777",
"description": "Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4762",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.697",
"published": "2023-09-05T22:15:09.677",
"description": "Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4761",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.623",
"published": "2023-09-05T22:15:09.583",
"description": "Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4572",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.550",
"published": "2023-08-29T20:15:10.480",
"description": "Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4431",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:13:53.427",
"published": "2023-08-23T00:15:09.353",
"description": "Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4430",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.420",
"published": "2023-08-23T00:15:09.290",
"description": "Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4429",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.350",
"published": "2023-08-23T00:15:09.227",
"description": "Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4428",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-21T03:15:11.283",
"published": "2023-08-23T00:15:09.157",
"description": "Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4427",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:12:47.790",
"published": "2023-08-23T00:15:09.073",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4369",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-08T20:15:14.830",
"published": "2023-08-15T18:15:13.687",
"description": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4368",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:32.420",
"published": "2023-08-15T18:15:13.597",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4367",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.833",
"published": "2023-08-15T18:15:13.520",
"description": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4366",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:31.313",
"published": "2023-08-15T18:15:13.413",
"description": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4365",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:30.660",
"published": "2023-08-15T18:15:13.290",
"description": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4364",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:29.733",
"published": "2023-08-15T18:15:13.217",
"description": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4363",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:28.827",
"published": "2023-08-15T18:15:13.113",
"description": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4362",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:27.143",
"published": "2023-08-15T18:15:13.030",
"description": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4361",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:26.063",
"published": "2023-08-15T18:15:12.960",
"description": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4360",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:25.467",
"published": "2023-08-15T18:15:12.863",
"description": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4359",
"type": "chrome",
"impact": 1.4,
"severity": 5.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.957",
"published": "2023-08-15T18:15:12.637",
"description": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 3.9
},
{
"id": "CVE-2023-4358",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.727",
"published": "2023-08-15T18:15:12.397",
"description": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4357",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:23.483",
"published": "2023-08-15T18:15:12.247",
"description": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4356",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:16.880",
"published": "2023-08-15T18:15:12.090",
"description": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4355",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-13T01:01:41.827",
"published": "2023-08-15T18:15:11.923",
"description": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4354",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-10-12T02:56:56.870",
"published": "2023-08-15T18:15:11.763",
"description": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4353",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:15.140",
"published": "2023-08-15T18:15:11.613",
"description": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4352",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-09-15T16:15:07.763",
"published": "2023-08-15T18:15:11.463",
"description": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4351",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.647",
"published": "2023-08-15T18:15:11.260",
"description": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4350",
"type": "chrome",
"impact": 3.6,
"severity": 6.5,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.490",
"published": "2023-08-15T18:15:11.103",
"description": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4349",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-27T03:15:14.293",
"published": "2023-08-15T18:15:10.950",
"description": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4078",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.617",
"published": "2023-08-03T01:15:12.167",
"description": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4077",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:24.067",
"published": "2023-08-03T01:15:12.100",
"description": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4076",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:23.447",
"published": "2023-08-03T01:15:12.037",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4075",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:22.857",
"published": "2023-08-03T01:15:11.973",
"description": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4074",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:21:02.660",
"published": "2023-08-03T01:15:11.903",
"description": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4073",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:18.110",
"published": "2023-08-03T01:15:11.840",
"description": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4072",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.807",
"published": "2023-08-03T01:15:11.773",
"description": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4071",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:20:16.333",
"published": "2023-08-03T01:15:11.710",
"description": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4070",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.810",
"published": "2023-08-03T01:15:11.647",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4069",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:38.347",
"published": "2023-08-03T01:15:11.583",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-4068",
"type": "chrome",
"impact": 5.2,
"severity": 8.1,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:34.640",
"published": "2023-08-03T01:15:11.513",
"description": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-38187",
"type": "edge",
"impact": 4.2,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-01T15:35:07.063",
"published": "2023-07-21T18:15:10.420",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.2
},
{
"id": "CVE-2023-38158",
"type": "edge",
"impact": 1.4,
"severity": 3.1,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:33.910",
"published": "2023-08-21T20:15:08.737",
"description": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-38157",
"type": "edge",
"impact": 3.6,
"severity": 6.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-10T21:51:17.437",
"published": "2023-08-07T18:15:09.877",
"description": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-3740",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:08.517",
"published": "2023-08-01T23:15:33.793",
"description": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3739",
"type": "chrome",
"impact": 3.4,
"severity": 6.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:03:21.510",
"published": "2023-08-01T23:15:33.633",
"description": "Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3738",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:07.383",
"published": "2023-08-01T23:15:33.427",
"description": "Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3737",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:06.317",
"published": "2023-08-01T23:15:33.177",
"description": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3736",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:19:05.223",
"published": "2023-08-01T23:15:33.013",
"description": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3735",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.783",
"published": "2023-08-01T23:15:32.773",
"description": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3734",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:18:29.297",
"published": "2023-08-01T23:15:32.607",
"description": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3733",
"type": "chrome",
"impact": 1.4,
"severity": 4.3,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:17:57.680",
"published": "2023-08-01T23:15:32.443",
"description": "Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3732",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-18T17:15:09.997",
"published": "2023-08-01T23:15:32.247",
"description": "Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3731",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-15T16:04:16.260",
"published": "2023-08-01T23:15:32.047",
"description": "Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3730",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:41.433",
"published": "2023-08-01T23:15:31.857",
"description": "Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3729",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-04T20:15:10.607",
"published": "2023-08-01T23:15:31.673",
"description": "Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3728",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:40.940",
"published": "2023-08-01T23:15:31.490",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-3727",
"type": "chrome",
"impact": 5.9,
"severity": 8.8,
"sourceId": "chrome-cve-admin@google.com",
"modified": "2023-08-12T06:16:32.627",
"published": "2023-08-01T23:15:31.320",
"description": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"exploitability": 2.8
},
{
"id": "CVE-2023-36888",
"type": "edge",
"impact": 3.4,
"severity": 6.3,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:53:23.367",
"published": "2023-07-14T18:15:10.750",
"description": "Microsoft Edge for Android (Chromium-based) Tampering Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36887",
"type": "edge",
"impact": 5.9,
"severity": 7.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-07-26T16:54:12.993",
"published": "2023-07-14T18:15:10.690",
"description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability",
"exploitability": 1.8
},
{
"id": "CVE-2023-36787",
"type": "edge",
"impact": 5.9,
"severity": 8.8,
"sourceId": "secure@microsoft.com",
"modified": "2023-08-24T21:39:50.107",
"published": "2023-08-21T20:15:08.637",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36741",
"type": "edge",
"impact": 5.9,
"severity": 7.5,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-01T20:25:16.097",
"published": "2023-08-26T01:15:08.460",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 1.6
},
{
"id": "CVE-2023-36735",
"type": "edge",
"impact": 6,
"severity": 9.6,
"sourceId": "secure@microsoft.com",
"modified": "2023-09-20T19:46:37.090",
"published": "2023-09-15T22:15:13.700",
"description": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability",
"exploitability": 2.8
},
{
"id": "CVE-2023-36727",
"type": "edge",
"impact": 2.7,
"sev
View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment