Description
Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
Published: 2024-02-21
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5629-1 chromium security update
EUVD EUVD EUVD-2024-17411 Inappropriate implementation in Navigation in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
History

Thu, 19 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Fedoraproject
Fedoraproject fedora
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Vendors & Products Fedoraproject
Fedoraproject fedora

Tue, 05 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Weaknesses CWE-79
CPEs cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
Vendors & Products Google
Google chrome
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Fedoraproject Fedora
Google Chrome
cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2025-02-13T17:32:25.204Z

Reserved: 2024-02-20T16:17:21.900Z

Link: CVE-2024-1676

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.541Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-21T04:15:08.580

Modified: 2024-12-19T17:58:37.093

Link: CVE-2024-1676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses