Search for vulnerabilities
Vulnerability details: VCID-xeea-pks8-aaab
Vulnerability ID VCID-xeea-pks8-aaab
Aliases CVE-2023-6204
Summary On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00082 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00128 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00495 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.00544 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
epss 0.01921 https://api.first.org/data/v1/epss?cve=CVE-2023-6204
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2023-6204
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2023-6204
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json
https://api.first.org/data/v1/epss?cve=CVE-2023-6204
https://bugzilla.mozilla.org/show_bug.cgi?id=1841050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
https://www.debian.org/security/2023/dsa-5561
https://www.mozilla.org/security/advisories/mfsa2023-49/
https://www.mozilla.org/security/advisories/mfsa2023-50/
https://www.mozilla.org/security/advisories/mfsa2023-52/
2250896 https://bugzilla.redhat.com/show_bug.cgi?id=2250896
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CVE-2023-6204 https://nvd.nist.gov/vuln/detail/CVE-2023-6204
GLSA-202402-25 https://security.gentoo.org/glsa/202402-25
mfsa2023-49 https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
mfsa2023-50 https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
mfsa2023-52 https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
RHSA-2023:7499 https://access.redhat.com/errata/RHSA-2023:7499
RHSA-2023:7500 https://access.redhat.com/errata/RHSA-2023:7500
RHSA-2023:7501 https://access.redhat.com/errata/RHSA-2023:7501
RHSA-2023:7502 https://access.redhat.com/errata/RHSA-2023:7502
RHSA-2023:7503 https://access.redhat.com/errata/RHSA-2023:7503
RHSA-2023:7504 https://access.redhat.com/errata/RHSA-2023:7504
RHSA-2023:7505 https://access.redhat.com/errata/RHSA-2023:7505
RHSA-2023:7506 https://access.redhat.com/errata/RHSA-2023:7506
RHSA-2023:7507 https://access.redhat.com/errata/RHSA-2023:7507
RHSA-2023:7508 https://access.redhat.com/errata/RHSA-2023:7508
RHSA-2023:7509 https://access.redhat.com/errata/RHSA-2023:7509
RHSA-2023:7510 https://access.redhat.com/errata/RHSA-2023:7510
RHSA-2023:7511 https://access.redhat.com/errata/RHSA-2023:7511
RHSA-2023:7512 https://access.redhat.com/errata/RHSA-2023:7512
RHSA-2023:7547 https://access.redhat.com/errata/RHSA-2023:7547
RHSA-2023:7569 https://access.redhat.com/errata/RHSA-2023:7569
RHSA-2023:7570 https://access.redhat.com/errata/RHSA-2023:7570
RHSA-2023:7573 https://access.redhat.com/errata/RHSA-2023:7573
RHSA-2023:7574 https://access.redhat.com/errata/RHSA-2023:7574
RHSA-2023:7577 https://access.redhat.com/errata/RHSA-2023:7577
USN-6509-1 https://usn.ubuntu.com/6509-1/
USN-6515-1 https://usn.ubuntu.com/6515-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-6204
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-6204
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.36014
EPSS Score 0.00082
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.