Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/KK-Designs/UpdateHub
- https://github.com/NexovaDev/UpdateHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/RENANZG/My-Debian-GNU-Linux
- https://github.com/RENANZG/My-Forensics
- https://github.com/Threekiii/CVE
- https://github.com/WalccDev/CVE-2023-2033
- https://github.com/aaronsjcho/1-day
- https://github.com/dan-mba/python-selenium-news
- https://github.com/doyensec/awesome-electronjs-hacking
- https://github.com/gmh5225/vulnjs
- https://github.com/gretchenfrage/CVE-2023-2033-analysis
- https://github.com/insoxin/CVE-2023-2033
- https://github.com/karimhabush/cyberowl
- https://github.com/kestryix/tisc-2023-writeups
- https://github.com/mistymntncop/CVE-2023-2033
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/paulsery/v8-sandbox-escape
- https://github.com/rafsys/My-Forensics
- https://github.com/rycbar77/V8Exploits
- https://github.com/sandumjacob/CVE-2023-2033-Analysis
- https://github.com/sploitem/v8-writeups
- https://github.com/sploitem/v8pwn
- https://github.com/tanjiti/sec_profile
- https://github.com/tianstcht/CVE-2023-2033
- https://github.com/wh1ant/vulnjs