Total vulnerabilities in the database
Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Software | From | Fixed in |
---|---|---|
google / chrome | - | 125.0.6422.60 |
fedoraproject / fedora | 38 | 38.x |
fedoraproject / fedora | 39 | 39.x |
fedoraproject / fedora | 40 | 40.x |