Search for vulnerabilities
Vulnerability details: VCID-3v5z-y6a4-aaak
Vulnerability ID VCID-3v5z-y6a4-aaak
Aliases CVE-2022-3653
Summary Heap buffer overflow in Vulkan in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
epss 0.00542 https://api.first.org/data/v1/epss?cve=CVE-2022-3653
ssvc Track https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html
ssvc Track https://crbug.com/1354271
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-3653
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-3653
No exploits are available.

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T16:18:47Z/ Found at https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T16:18:47Z/ Found at https://crbug.com/1354271
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-3653
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-3653
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.44880
EPSS Score 0.00109
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.