{"id":"CVE-2023-2313","details":"Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)","modified":"2026-03-14T11:58:25.434600Z","published":"2023-07-29T00:15:12.023Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/"},{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html"},{"type":"REPORT","url":"https://crbug.com/1335974"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2313.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"112.0.5615.49"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}