Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-s5zk-qx92-23bf
Vulnerability ID VCID-s5zk-qx92-23bf
Aliases CVE-2019-5797
Summary Multiple vulnerabilities have been found in Chromium, the worst of which could result in the remote execution of code.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5797.json
https://api.first.org/data/v1/epss?cve=CVE-2019-5797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
1688199 https://bugzilla.redhat.com/show_bug.cgi?id=1688199
916523 https://crbug.com/916523
ASA-201903-8 https://security.archlinux.org/ASA-201903-8
AVG-923 https://security.archlinux.org/AVG-923
CVE-2019-5797 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1744
CVE-2019-5797 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46565.txt
GLSA-201903-23 https://security.gentoo.org/glsa/201903-23
RHSA-2019:0708 https://access.redhat.com/errata/RHSA-2019:0708
stable-channel-update-for-desktop_12.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
Data source Exploit-DB
Date added March 19, 2019
Description Google Chrome < M73 - Double-Destruction Race in StoragePartitionService
Ransomware campaign use Known
Source publication date March 19, 2019
Exploit type dos
Platform multiple
Source update date March 19, 2019
Source URL https://bugs.chromium.org/p/project-zero/issues/detail?id=1744
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5797.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T19:58:42Z/ Found at https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://crbug.com/916523
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T19:58:42Z/ Found at https://crbug.com/916523
Exploit Prediction Scoring System (EPSS)
Percentile 0.86022
EPSS Score 0.02791
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:11:51.857095+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201903-23 38.0.0