Search for vulnerabilities
Vulnerability details: VCID-c5rv-7s92-aaak
Vulnerability ID VCID-c5rv-7s92-aaak
Aliases CVE-2023-5480
Summary Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High)
Status Published
Exploitability 0.5
Weighted Severity 5.5
Risk 2.8
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00270 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00270 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00270 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00270 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00284 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00403 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00403 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00403 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.00403 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.01198 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
epss 0.0336 https://api.first.org/data/v1/epss?cve=CVE-2023-5480
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2023-5480
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2023-5480
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2023-5480
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
https://crbug.com/1492698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
https://security.gentoo.org/glsa/202312-07
https://www.debian.org/security/2023/dsa-5546
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
CVE-2023-5480 https://nvd.nist.gov/vuln/detail/CVE-2023-5480
GLSA-202311-11 https://security.gentoo.org/glsa/202311-11
GLSA-202401-34 https://security.gentoo.org/glsa/202401-34
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5480
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5480
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.43592
EPSS Score 0.00104
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.