{"vulnerability": "CVE-2023-5854", "sightings": [{"uuid": "e69a0f05-16a6-42b5-870a-ff907c8de24e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5854", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13938", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5854\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)\n\ud83d\udccf Published: 2023-11-01T17:14:01.762Z\n\ud83d\udccf Modified: 2025-04-29T20:27:55.220Z\n\ud83d\udd17 References:\n1. https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html\n2. https://crbug.com/1488267\n3. https://www.debian.org/security/2023/dsa-5546\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/\n5. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/\n6. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/\n7. https://security.gentoo.org/glsa/202311-11\n8. https://security.gentoo.org/glsa/202312-07\n9. https://security.gentoo.org/glsa/202401-34", "creation_timestamp": "2025-04-29T21:13:47.000000Z"}]}