Google Chrome Chrome vulnerabilities

1,139 known vulnerabilities affecting google/chrome_chrome.

Total CVEs
1,139
CISA KEV
47
actively exploited
Public exploits
9
Exploited in wild
36
Severity breakdown
CRITICAL58HIGH621MEDIUM339LOW104UNKNOWN17

Vulnerabilities

Page 30 of 57
CVE-2023-3739MEDIUMCVSS 6.32023-07-20
CVE-2023-3739 [MEDIUM] Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2023-3739 Stable Channel Update for ChromeOS / ChromeOS Flex CVE-2023-3739
chrome
CVE-2023-3497MEDIUMCVSS 4.62023-07-20
CVE-2023-3497 [MEDIUM] Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2023-3497 Stable Channel Update for ChromeOS / ChromeOS Flex CVE-2023-3497
chrome
CVE-2023-2933HIGHCVSS 8.82023-07-19
CVE-2023-2933 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-2933 Long Term Support Channel Update for ChromeOS CVE-2023-2933
chrome
CVE-2023-2931HIGHCVSS 8.82023-07-19
CVE-2023-2931 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-2931 Long Term Support Channel Update for ChromeOS CVE-2023-2931
chrome
CVE-2023-2932HIGHCVSS 8.82023-07-19
CVE-2023-2932 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-2932 Long Term Support Channel Update for ChromeOS CVE-2023-2932
chrome
CVE-2023-3727HIGHCVSS 8.82023-07-18
CVE-2023-3727 [HIGH] Stable Channel Update for Desktop: CVE-2023-3727 Stable Channel Update for Desktop CVE-2023-3727: Use after free in WebRTC. Reported by Cassidy Kim(@cassidy6564) on 2023-06-12 [$7000][ 1457421 ] High CVE-2023-3728: Use after free in WebRTC Reported by Zhenghang Xiao (@Kipreyyy) on 2023-06-23 [$2000][ 1453465 ] High CVE-2023-3730: Use after free in Tab Groups Severity: high
chrome
CVE-2023-3738MEDIUMCVSS 4.32023-07-18
CVE-2023-3738 [MEDIUM] Stable Channel Update for Desktop: CVE-2023-3738 Stable Channel Update for Desktop CVE-2023-3738: Inappropriate implementation in Autofill. Reported by Hafiizh on 2023-04-18 [$1000][ 1405223 ] Low CVE-2023-3740: Insufficient validation of untrusted input in Themes Reported by Fardeen Siddiqui on 2023-01-06 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel Seve
chrome
CVE-2023-3737MEDIUMCVSS 4.32023-07-18
CVE-2023-3737 [MEDIUM] Stable Channel Update for Desktop: CVE-2023-3737 Stable Channel Update for Desktop CVE-2023-3737: Inappropriate implementation in Notifications. Reported by Narendra Bhati of Suma Soft Pvt Severity: medium
chrome
CVE-2023-3420HIGHCVSS 8.82023-06-26
CVE-2023-3420 [HIGH] Stable Channel Update for Desktop: CVE-2023-3420 Stable Channel Update for Desktop CVE-2023-3420: Type Confusion in V8. Reported by Man Yue Mo of GitHub Security Lab on 2023-06-07 [$10000][ 1447568 ] High CVE-2023-3421: Use after free in Media Reported by Piotr Bania of Cisco Talos on 2023-05-22 [$5000][ 1450397 ] High CVE-2023-3422: Use after free in Guest View Severity: high
chrome
CVE-2023-32233HIGHCVSS 7.82023-06-21
CVE-2023-32233 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-32233 Long Term Support Channel Update for ChromeOS CVE-2023-32233
chrome
CVE-2023-3079HIGHCVSS 8.8KEV2023-06-21
CVE-2023-3079 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-3079 Long Term Support Channel Update for ChromeOS CVE-2023-3079
chrome
CVE-2023-2935HIGHCVSS 8.82023-06-21
CVE-2023-2935 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-2935 Long Term Support Channel Update for ChromeOS CVE-2023-2935
chrome
CVE-2023-0045MEDIUMCVSS 4.72023-06-21
CVE-2023-0045 [MEDIUM] Long Term Support Channel Update for ChromeOS: CVE-2023-0045 Long Term Support Channel Update for ChromeOS CVE-2023-0045
chrome
CVE-2023-2721HIGHCVSS 8.82023-06-14
CVE-2023-2721 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-2721 Long Term Support Channel Update for ChromeOS CVE-2023-2721
chrome
CVE-2023-2724HIGHCVSS 8.82023-06-14
CVE-2023-2724 [HIGH] Long Term Support Channel Update for ChromeOS: CVE-2023-2724 Long Term Support Channel Update for ChromeOS CVE-2023-2724
chrome
CVE-2023-3214CRITICALCVSS 8.82023-06-13
CVE-2023-3214 [CRITICAL] Stable Channel Update for Desktop: CVE-2023-3214 Stable Channel Update for Desktop CVE-2023-3214: Use after free in Autofill payments. Reported by Rong Jian of VRI on 2023-06-01 [$3000][ 1446274 ] High CVE-2023-3215: Use after free in WebRTC Reported by asnine on 2023-05-17 [$TBD][ 1450114 ] High CVE-2023-3216: Type Confusion in V8 Severity: critical
chrome
CVE-2023-3217HIGHCVSS 8.82023-06-13
CVE-2023-3217 [HIGH] Stable Channel Update for Desktop: CVE-2023-3217 Stable Channel Update for Desktop CVE-2023-3217: Use after free in WebXR. Reported by Sergei Glazunov of Google Project Zero on 2023-06-01 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel Severity: high
chrome
CVE-2023-2929HIGHCVSS 8.82023-05-30
CVE-2023-2929 [HIGH] Stable Channel Update for Desktop: CVE-2023-2929 Stable Channel Update for Desktop CVE-2023-2929: Out of bounds write in Swiftshader. Reported by Jaehun Jeong(@n3sk) of Theori on 2023-01-25 [$10000][ 1443401 ] High CVE-2023-2930: Use after free in Extensions Reported by asnine on 2023-05-08 [$10000][ 1427865 ] High CVE-2023-3598: Out of bounds read and write in ANGLE Severity: high
chrome
CVE-2023-2934HIGHCVSS 8.82023-05-30
CVE-2023-2934 [HIGH] Stable Channel Update for Desktop: CVE-2023-2934 Stable Channel Update for Desktop CVE-2023-2934: Out of bounds memory access in Mojo. Reported by Mark Brand of Google Project Zero on 2023-04-01 [$NA][ 1440695 ] High CVE-2023-2935: Type Confusion in V8 Reported by Sergei Glazunov of Google Project Zero on 2023-04-27 [$NA][ 1443452 ] High CVE-2023-2936: Type Confusion in V8 Severity: high
chrome
CVE-2023-2940MEDIUMCVSS 6.52023-05-30
CVE-2023-2940 [MEDIUM] Stable Channel Update for Desktop: CVE-2023-2940 Stable Channel Update for Desktop CVE-2023-2940: Inappropriate implementation in Downloads. Reported by Axel Chong on 2023-03-22 [$500][ 1430269 ] Low CVE-2023-2941: Inappropriate implementation in Extensions API Reported by Jasper Rebane on 2023-04-04 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel Severity:
chrome