Search for vulnerabilities
Vulnerability details: VCID-hr7c-sb7m-aaas
Vulnerability ID VCID-hr7c-sb7m-aaas
Aliases CVE-2023-5851
Summary Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00291 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00459 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00459 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00459 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00459 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.0048 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00564 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
epss 0.00629 https://api.first.org/data/v1/epss?cve=CVE-2023-5851
cvssv3 4.3 https://nvd.nist.gov/vuln/detail/CVE-2023-5851
cvssv3.1 4.3 https://nvd.nist.gov/vuln/detail/CVE-2023-5851
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2023-5851
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
https://crbug.com/1473957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
https://security.gentoo.org/glsa/202312-07
https://www.debian.org/security/2023/dsa-5546
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
CVE-2023-5851 https://nvd.nist.gov/vuln/detail/CVE-2023-5851
GLSA-202311-11 https://security.gentoo.org/glsa/202311-11
GLSA-202401-34 https://security.gentoo.org/glsa/202401-34
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5851
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-5851
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.52109
EPSS Score 0.00151
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.