Vulnerabilites related to redhat - linux_server
cve-2018-6071
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
An integer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/777318 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:53.141Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/777318" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/777318" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6071", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/777318", "refsource": "MISC", "url": "https://crbug.com/777318" }, { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6071", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:53.141Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6072
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
https://crbug.com/791048 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/791048" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/791048" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6072", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "https://crbug.com/791048", "refsource": "MISC", "url": "https://crbug.com/791048" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6072", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18343
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/882423 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/882423" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:07", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/882423" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18343", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/882423", "refsource": "MISC", "url": "https://crbug.com/882423" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18343", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6094
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Inline metadata in GarbageCollection in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://crbug.com/633030 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/633030" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Inline metadata in GarbageCollection in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/633030" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inline metadata in GarbageCollection in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/633030", "refsource": "MISC", "url": "https://crbug.com/633030" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6094", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18338
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/890576 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/890576" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:08", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/890576" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/890576", "refsource": "MISC", "url": "https://crbug.com/890576" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18338", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6108
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/816769 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:53.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/816769" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/816769" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/816769", "refsource": "MISC", "url": "https://crbug.com/816769" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6108", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:53.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6073
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/804118 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:53.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/804118" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/804118" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/804118", "refsource": "MISC", "url": "https://crbug.com/804118" }, { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6073", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:53.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6086
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/827492 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/827492" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/827492" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/827492", "refsource": "MISC", "url": "https://crbug.com/827492" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6086", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.890Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17464
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 10:47
Severity ?
EPSS score ?
Summary
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2018/dsa-4330 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2018:3004 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201811-10 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/887273 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105666 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/887273" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105666" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "70.0.3538.67", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect security UI", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-24T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/887273" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105666" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-17464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": " 70.0.3538.67" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect security UI" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4330", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-10" }, { "name": "https://crbug.com/887273", "refsource": "MISC", "url": "https://crbug.com/887273" }, { "name": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105666" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-17464", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-09-25T00:00:00", "dateUpdated": "2024-08-05T10:47:04.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6098
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/798892 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/798892" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/798892" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/798892", "refsource": "MISC", "url": "https://crbug.com/798892" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6098", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6069
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/799918 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:53.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/799918" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/799918" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/799918", "refsource": "MISC", "url": "https://crbug.com/799918" }, { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6069", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:53.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17481
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 10:47
Severity ?
EPSS score ?
Summary
Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4395 | vendor-advisory, x_refsource_DEBIAN | |
https://crbug.com/901654 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html" }, { "name": "DSA-4395", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4395" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/901654" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.98", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:09", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html" }, { "name": "DSA-4395", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4395" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/901654" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-17481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.98" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html" }, { "name": "DSA-4395", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4395" }, { "name": "https://crbug.com/901654", "refsource": "MISC", "url": "https://crbug.com/901654" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-17481", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-09-25T00:00:00", "dateUpdated": "2024-08-05T10:47:04.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6074
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Failure to apply Mark-of-the-Web in Downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to bypass OS level controls via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://crbug.com/809759 | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/809759" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to apply Mark-of-the-Web in Downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to bypass OS level controls via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/809759" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to apply Mark-of-the-Web in Downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to bypass OS level controls via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "https://crbug.com/809759", "refsource": "MISC", "url": "https://crbug.com/809759" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6074", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6085
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Re-entry of a destructor in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/826626 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/826626" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Re-entry of a destructor in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Object corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/826626" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Re-entry of a destructor in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Object corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/826626", "refsource": "MISC", "url": "https://crbug.com/826626" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6085", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18340
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/896736 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/896736" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:09", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/896736" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/896736", "refsource": "MISC", "url": "https://crbug.com/896736" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18340", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6101
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/813540 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/813540" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/813540" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/813540", "refsource": "MISC", "url": "https://crbug.com/813540" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6101", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18346
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/606104 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/606104" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect security UI", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:08", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/606104" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect security UI" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/606104", "refsource": "MISC", "url": "https://crbug.com/606104" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18346", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6103
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/816033 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.880Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/816033" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect security UI", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/816033" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect security UI" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/816033", "refsource": "MISC", "url": "https://crbug.com/816033" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6103", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18339
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://crbug.com/891187 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/891187" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:09", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/891187" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "https://crbug.com/891187", "refsource": "MISC", "url": "https://crbug.com/891187" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18339", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6087
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/813876 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/813876" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/813876" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/813876", "refsource": "MISC", "url": "https://crbug.com/813876" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6087", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6104
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/820068 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:53.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/820068" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/820068" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/820068", "refsource": "MISC", "url": "https://crbug.com/820068" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6104", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:53.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17473
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 10:47
Severity ?
EPSS score ?
Summary
Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2018/dsa-4330 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2018:3004 | vendor-advisory, x_refsource_REDHAT | |
https://crbug.com/882078 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201811-10 | vendor-advisory, x_refsource_GENTOO | |
https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105666 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/882078" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105666" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "70.0.3538.67", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-24T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/882078" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105666" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-17473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": " 70.0.3538.67" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4330", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "https://crbug.com/882078", "refsource": "MISC", "url": "https://crbug.com/882078" }, { "name": "GLSA-201811-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-10" }, { "name": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105666" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-17473", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-09-25T00:00:00", "dateUpdated": "2024-08-05T10:47:04.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6116
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A nullptr dereference in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/822266 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/822266" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A nullptr dereference in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Out of bounds memory access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/822266" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A nullptr dereference in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out of bounds memory access" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/822266", "refsource": "MISC", "url": "https://crbug.com/822266" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6116", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6105
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://crbug.com/803571 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/803571" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/803571" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/803571", "refsource": "MISC", "url": "https://crbug.com/803571" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6105", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6099
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://crbug.com/808825 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/808825" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/808825" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/808825", "refsource": "MISC", "url": "https://crbug.com/808825" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6099", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6107
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://crbug.com/808316 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/808316" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/808316" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/808316", "refsource": "MISC", "url": "https://crbug.com/808316" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6107", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6076
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://crbug.com/758523 | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/758523" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/758523" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6076", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "https://crbug.com/758523", "refsource": "MISC", "url": "https://crbug.com/758523" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6076", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6102
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/813814 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/813814" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/813814" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/813814", "refsource": "MISC", "url": "https://crbug.com/813814" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6102", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18336
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://crbug.com/898531 | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.358Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/898531" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:08", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/898531" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/898531", "refsource": "MISC", "url": "https://crbug.com/898531" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18336", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6066
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Lack of CORS checking by ResourceFetcher/ResourceLoader in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/799477 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/799477" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Lack of CORS checking by ResourceFetcher/ResourceLoader in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/799477" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6066", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Lack of CORS checking by ResourceFetcher/ResourceLoader in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/799477", "refsource": "MISC", "url": "https://crbug.com/799477" }, { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6066", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17469
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 10:47
Severity ?
EPSS score ?
Summary
Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/880675 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4330 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2018:3004 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201811-10 | vendor-advisory, x_refsource_GENTOO | |
https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105666 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/880675" }, { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105666" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "70.0.3538.67", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-24T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/880675" }, { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105666" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-17469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": " 70.0.3538.67" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/880675", "refsource": "MISC", "url": "https://crbug.com/880675" }, { "name": "DSA-4330", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-10" }, { "name": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105666" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-17469", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-09-25T00:00:00", "dateUpdated": "2024-08-05T10:47:04.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18341
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/901030 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/901030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:08", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/901030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18341", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/901030", "refsource": "MISC", "url": "https://crbug.com/901030" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18341", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6088
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/822091 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/822091" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/822091" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/822091", "refsource": "MISC", "url": "https://crbug.com/822091" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6088", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6092
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://www.exploit-db.com/exploits/44860/ | exploit, x_refsource_EXPLOIT-DB | |
https://crbug.com/819869 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "44860", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44860/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/819869" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "44860", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44860/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/819869" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "44860", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44860/" }, { "name": "https://crbug.com/819869", "refsource": "MISC", "url": "https://crbug.com/819869" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6092", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6081
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://crbug.com/797525 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/797525" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/797525" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "https://crbug.com/797525", "refsource": "MISC", "url": "https://crbug.com/797525" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6081", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-17462
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 10:47
Severity ?
EPSS score ?
Summary
Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/888926 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4330 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2018:3004 | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201811-10 | vendor-advisory, x_refsource_GENTOO | |
https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105666 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/888926" }, { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105666" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "70.0.3538.67", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-24T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/888926" }, { "name": "DSA-4330", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105666" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-17462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": " 70.0.3538.67" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/888926", "refsource": "MISC", "url": "https://crbug.com/888926" }, { "name": "DSA-4330", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "name": "RHSA-2018:3004", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "name": "GLSA-201811-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-10" }, { "name": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "name": "105666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105666" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-17462", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-09-25T00:00:00", "dateUpdated": "2024-08-05T10:47:04.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6068
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://crbug.com/798933 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/798933" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Object lifecycle issue", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/798933" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Object lifecycle issue" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "https://crbug.com/798933", "refsource": "MISC", "url": "https://crbug.com/798933" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6068", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6075
Vulnerability from cvelistv5
Published
2018-11-14 15:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Incorrect handling of specified filenames in file downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page and user interaction.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/608669 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103297 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:0484 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/608669" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "65.0.3325.146", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of specified filenames in file downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page and user interaction." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-15T10:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/608669" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "65.0.3325.146" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of specified filenames in file downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page and user interaction." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/608669", "refsource": "MISC", "url": "https://crbug.com/608669" }, { "name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "name": "103297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103297" }, { "name": "RHSA-2018:0484", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6075", "datePublished": "2018-11-14T15:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18359
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://crbug.com/907714 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/907714" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Out of bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:08", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/907714" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18359", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out of bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "https://crbug.com/907714", "refsource": "MISC", "url": "https://crbug.com/907714" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18359", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6090
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
An integer overflow that lead to a heap buffer-overflow in Skia in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://crbug.com/820913 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/820913" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow that lead to a heap buffer-overflow in Skia in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/820913" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow that lead to a heap buffer-overflow in Skia in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/820913", "refsource": "MISC", "url": "https://crbug.com/820913" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6090", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6095
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
Inappropriate dismissal of file picker on keyboard events in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to read local files via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/637098 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/637098" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Inappropriate dismissal of file picker on keyboard events in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to read local files via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/637098" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6095", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inappropriate dismissal of file picker on keyboard events in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to read local files via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/637098", "refsource": "MISC", "url": "https://crbug.com/637098" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6095", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6089
Vulnerability from cvelistv5
Published
2018-12-04 17:00
Modified
2024-08-05 05:54
Severity ?
EPSS score ?
Summary
A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201804-22 | vendor-advisory, x_refsource_GENTOO | |
https://crbug.com/808838 | x_refsource_MISC | |
https://www.debian.org/security/2018/dsa-4182 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/103917 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:1195 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:54:52.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/808838" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "66.0.3359.117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient policy enforcement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-22" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/808838" }, { "name": "DSA-4182", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-6089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "66.0.3359.117" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient policy enforcement" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "name": "GLSA-201804-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-22" }, { "name": "https://crbug.com/808838", "refsource": "MISC", "url": "https://crbug.com/808838" }, { "name": "DSA-4182", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "name": "103917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103917" }, { "name": "RHSA-2018:1195", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1195" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-6089", "datePublished": "2018-12-04T17:00:00", "dateReserved": "2018-01-23T00:00:00", "dateUpdated": "2024-08-05T05:54:52.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18337
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/886753 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/886753" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:08", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/886753" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/886753", "refsource": "MISC", "url": "https://crbug.com/886753" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18337", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18347
Vulnerability from cvelistv5
Published
2018-12-11 15:00
Modified
2024-08-05 11:08
Severity ?
EPSS score ?
Summary
Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page.
References
▼ | URL | Tags |
---|---|---|
https://crbug.com/850824 | x_refsource_MISC | |
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:3803 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2018/dsa-4352 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/106084 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-18 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:08:21.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/850824" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "71.0.3578.80", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-17T20:06:07", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/850824" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-18" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2018-18347", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "71.0.3578.80" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inappropriate implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://crbug.com/850824", "refsource": "MISC", "url": "https://crbug.com/850824" }, { "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "refsource": "CONFIRM", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "name": "RHSA-2018:3803", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "name": "DSA-4352", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "name": "106084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106084" }, { "name": "GLSA-201908-18", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-18" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2018-18347", "datePublished": "2018-12-11T15:00:00", "dateReserved": "2018-10-15T00:00:00", "dateUpdated": "2024-08-05T11:08:21.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page." }, { "lang": "es", "value": "El manejo incorrecto de sesiones de navegaci\u00f3n fallidas con URL inv\u00e1lidas en Navigation en Google Chrome en versiones anteriores a la 71.0.3578.80 permit\u00eda a un atacante remoto enga\u00f1ar a un usuario para que ejecutase c\u00f3digo JavaScript en un origen arbitrario mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18347", "lastModified": "2024-11-21T03:55:45.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:01.450", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/850824" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/850824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:09
Severity ?
Summary
Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en pila en Skia en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto pudiese realizar una lectura de memoria fuera de l\u00edmites mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6069", "lastModified": "2024-11-21T04:09:59.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.470", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/799918" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/799918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A nullptr dereference in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A nullptr dereference in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page." }, { "lang": "es", "value": "Una desreferencia nullptr en WebAssembly en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto pudiese realizar un acceso a la memoria fuera de l\u00edmites mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6116", "lastModified": "2024-11-21T04:10:06.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.977", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/822266" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/822266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "El ciclo de vida de un objecto incorrecto en WebAudio en Google Chrome, en versiones anteriores a la 71.0.3578.80, permite que un atacante remoto explote la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18339", "lastModified": "2024-11-21T03:55:44.747", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:00.997", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/891187" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/891187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." }, { "lang": "es", "value": "Un desbordamiento de enteros que conduce a un uso de memoria previamente liberada en PDFium en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto pudiese explotar una corrupci\u00f3n de memoria din\u00e1mica (heap) mediante un archivo PDF manipulado." } ], "id": "CVE-2018-6072", "lastModified": "2024-11-21T04:10:00.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.610", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/791048" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/791048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" }, { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page." }, { "lang": "es", "value": "La falta de comprobaci\u00f3n de CORS tras una redirecci\u00f3n de un Service Worker a un PDF cross-origin en Service Worker en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto filtrase datos cross-origin limitados mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6089", "lastModified": "2024-11-21T04:10:02.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.163", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/808838" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/808838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
Incorrect handling of specified filenames in file downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page and user interaction.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of specified filenames in file downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page and user interaction." }, { "lang": "es", "value": "El manejo incorrecto de nombres de archivo especificados en las descargas de archivo en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto filtrase datos de or\u00edgenes cruzados mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6075", "lastModified": "2024-11-21T04:10:00.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.750", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/608669" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/608669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page." }, { "lang": "es", "value": "Vulnerabilidades Cross-Site Scripting (XSS) en Interstitials en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00edan que un atacante que convenci\u00f3 a un usuario para que instalase una extensi\u00f3n maliciosa o abriese la consola de desarrollador para inyectar scripts o HTML arbitrarios mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6081", "lastModified": "2024-11-21T04:10:01.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:02.047", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/797525" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/797525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Inline metadata in GarbageCollection in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inline metadata in GarbageCollection in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "Los metadatos inline en GarbageCollection en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto pudiese explotar una corrupci\u00f3n de memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6094", "lastModified": "2024-11-21T04:10:03.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.337", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/633030" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/633030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "Manejo incorrecto de rutas que provoca un uso de memoria previamente liberada en Skia en Google Chrome en versiones anteriores a la 71.0.3578.80, permit\u00eda a un atacante remoto explotar la corrupci\u00f3n de la memoria din\u00e1mica (heap)" } ], "id": "CVE-2018-18343", "lastModified": "2024-11-21T03:55:45.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:01.217", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/882423" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/882423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
An integer overflow that lead to a heap buffer-overflow in Skia in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow that lead to a heap buffer-overflow in Skia in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." }, { "lang": "es", "value": "Un desbordamiento de enteros que conduce a un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en Skia en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario dentro de un sandbox mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6090", "lastModified": "2024-11-21T04:10:02.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.227", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/820913" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/820913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:09
Severity ?
Summary
Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." }, { "lang": "es", "value": "Problemas de ciclo de vida de objetos en Chrome Custom Tab en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto suplantase el contenido de Omnibox (barra de direcciones) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6068", "lastModified": "2024-11-21T04:09:59.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.423", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/798933" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/798933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." }, { "lang": "es", "value": "Aplicaci\u00f3n insuficiente de caracteres confundibles en URL Formatter en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto suplantase dominios mediante homogramas IDN mediante un nombre de dominio manipulado." } ], "id": "CVE-2018-6098", "lastModified": "2024-11-21T04:10:03.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.447", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/798892" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/798892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
An integer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." }, { "lang": "es", "value": "Desbordamiento de enteros en Skia en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto pudiese realizar una lectura de memoria fuera de l\u00edmites mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6071", "lastModified": "2024-11-21T04:10:00.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.563", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/777318" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/777318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." }, { "lang": "es", "value": "Aplicaci\u00f3n insuficiente de caracteres confundibles en Omnibox en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto suplantase dominios mediante homogramas IDN mediante un nombre de dominio manipulado." } ], "id": "CVE-2018-6105", "lastModified": "2024-11-21T04:10:04.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.757", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/803571" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/803571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page." }, { "lang": "es", "value": "Una doble expulsi\u00f3n en la cach\u00e9 del modo inc\u00f3gnito que conduc\u00eda a un uso de memoria previamente liberada en Networking Disk Cache en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6086", "lastModified": "2024-11-21T04:10:02.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.007", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/827492" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/827492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page." }, { "lang": "es", "value": "El cifrado insuficiente de identificadores de fragmentos de URL en Blink en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto realizase un ataque Cross-Site Scripting (XSS) basado en DOM mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6076", "lastModified": "2024-11-21T04:10:00.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.780", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/758523" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/758523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." }, { "lang": "es", "value": "Un desbordamiento de enteros en sistemas de 32 bits en WebAssembly en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario dentro de un sandbox mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6092", "lastModified": "2024-11-21T04:10:02.903", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.273", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/819869" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.exploit-db.com/exploits/44860/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/819869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/44860/" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." }, { "lang": "es", "value": "El ciclo de vida de un objecto incorrecto en PDFium en Google Chrome, en versiones anteriores a la 71.0.3578.80, permite que un atacante remoto explote la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante un archivo PDF manipulado." } ], "id": "CVE-2018-18336", "lastModified": "2024-11-21T03:55:44.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:00.810", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/898531" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/898531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Inappropriate dismissal of file picker on keyboard events in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to read local files via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate dismissal of file picker on keyboard events in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to read local files via a crafted HTML page." }, { "lang": "es", "value": "La eliminaci\u00f3n incorrecta del selector de archivos en los eventos del teclado en Blink en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto leyese archivos locales mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6095", "lastModified": "2024-11-21T04:10:03.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.400", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/637098" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/637098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Re-entry of a destructor in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Re-entry of a destructor in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page." }, { "lang": "es", "value": "La reentrada de un destructor en Networking Disk Cache en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6085", "lastModified": "2024-11-21T04:10:01.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:00.960", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/826626" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/826626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page." }, { "lang": "es", "value": "Un mensaje de permisos estancado en Prompts en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto omitiese las pol\u00edticas de permisos mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6103", "lastModified": "2024-11-21T04:10:04.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.650", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/816033" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/816033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 03:54
Severity ?
Summary
Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "64574A86-7E78-43FC-97E2-120811486E14", "versionEndExcluding": "70.0.3538.67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name." }, { "lang": "es", "value": "El manejo incorrecto de caracteres confundibles en Omnibox en Google Chrome en versiones anteriores a la 70.0.3538.67 permit\u00eda que un atacante remoto suplantase el contenido de Omnibox (barra de direcciones) mediante un nombre de dominio manipulado." } ], "id": "CVE-2018-17473", "lastModified": "2024-11-21T03:54:29.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:00.720", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/882078" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/882078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4330" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:54
Severity ?
Summary
Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "F865110F-AA18-4F90-8146-FDED41F503FB", "versionEndExcluding": "71.0.3578.98", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file." }, { "lang": "es", "value": "El manejo incorrecto del ciclo de vida de objetos en PDFium en Google Chrome, en versiones anteriores a la 71.0.3578.98, permit\u00eda que un atacante remoto pudiese explotar una corrupci\u00f3n de memoria din\u00e1mica (heap) mediante un archivo PDF manipulado." } ], "id": "CVE-2018-17481", "lastModified": "2024-11-21T03:54:30.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:00.700", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/901654" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2019/dsa-4395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/901654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4395" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en WebGL en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto pudiese realizar una escritura de memoria fuera de l\u00edmites mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6073", "lastModified": "2024-11-21T04:10:00.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.657", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/804118" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/804118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "El uso incorrecto con hilos no seguros de SkImage en Canvas en Google Chrome en versiones anteriores a la 71.0.3578.80 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18338", "lastModified": "2024-11-21T03:55:44.613", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:00.933", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/890576" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/890576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." }, { "lang": "es", "value": "Aplicaci\u00f3n insuficiente de caracteres confundibles en URL Formatter en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto suplantase dominios mediante homogramas IDN mediante un nombre de dominio manipulado." } ], "id": "CVE-2018-6104", "lastModified": "2024-11-21T04:10:04.513", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.710", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/820068" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/820068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page." }, { "lang": "es", "value": "La falta de comprobaci\u00f3n de CORS en Blink en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto filtrase datos cross-origin limitados mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6099", "lastModified": "2024-11-21T04:10:03.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.493", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/808825" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/808825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file." }, { "lang": "es", "value": "Un error de invalidaci\u00f3n de iteradores en PDFium en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario dentro de un sandbox mediante un archivo PDF manipulado." } ], "id": "CVE-2018-6088", "lastModified": "2024-11-21T04:10:02.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.117", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/822091" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/822091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted HTML page." }, { "lang": "es", "value": "Aplicaci\u00f3n insuficiente de caracteres confundibles en URL Formatter en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto suplantase dominios mediante homogramas IDN mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6108", "lastModified": "2024-11-21T04:10:05.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.867", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/816769" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/816769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page." }, { "lang": "es", "value": "La gesti\u00f3n incorrecta de Reflect.construct en V8 en Google Chrome en versiones anteriores a la 71.0.3578.80 permit\u00eda que un atacante remoto pudiese realizar una lectura de memoria fuera de l\u00edmites mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18359", "lastModified": "2024-11-21T03:55:47.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:02.137", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/907714" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/907714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "Un desbordamiento de enteros basado en memoria din\u00e1mica (heap) en Blink en Google Chrome, en versiones anteriores a la 71.0.3578.80, permite a un atacante remoto explotar la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18341", "lastModified": "2024-11-21T03:55:44.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:01.123", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/901030" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/901030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:10
Severity ?
Summary
Failure to apply Mark-of-the-Web in Downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to bypass OS level controls via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to apply Mark-of-the-Web in Downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to bypass OS level controls via a crafted HTML page." }, { "lang": "es", "value": "El error al aplicar Mark-of-the-Web en las descargas en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto omitiese los controles de nivel del sistema operativo mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6074", "lastModified": "2024-11-21T04:10:00.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.703", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/809759" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/809759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page." }, { "lang": "es", "value": "El manejo incorrecto de cuadros de alertas emergentes en Blink en Google Chrome en versiones anteriores a la 71.0.3578.80, permit\u00eda a un atacante remoto presentar interfaces de usuario de navegador confusas mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18346", "lastModified": "2024-11-21T03:55:45.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:01.387", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/606104" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/606104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." }, { "lang": "es", "value": "Un uso de memoria previamente liberada en WebAssembly en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario dentro de un sandbox mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6087", "lastModified": "2024-11-21T04:10:02.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.057", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/813876" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/813876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 04:09
Severity ?
Summary
Lack of CORS checking by ResourceFetcher/ResourceLoader in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB15D41B-C564-466D-B7AC-C2BB9EBD0D28", "versionEndExcluding": "65.0.3325.146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lack of CORS checking by ResourceFetcher/ResourceLoader in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page." }, { "lang": "es", "value": "La falta de comprobaci\u00f3n de CORS de ResourceFetcher/ResourceLoader en Blink en Google Chrome en versiones anteriores a la 65.0.3325.146 permit\u00eda que un atacante remoto filtrase datos de or\u00edgenes cruzados mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-6066", "lastModified": "2024-11-21T04:09:59.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:01.313", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/799477" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:0484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/799477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name." }, { "lang": "es", "value": "La falta de caracteres confundibles en Internationalization en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto suplantase el contenido de Omnibox (barra de direcciones) mediante un nombre de dominio manipulado." } ], "id": "CVE-2018-6102", "lastModified": "2024-11-21T04:10:04.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.603", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/813814" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/813814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "El ciclo de vida de un objecto incorrecto en MediaRecorder en Google Chrome, en versiones anteriores a la 71.0.3578.80, permite que un atacante remoto explote la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-18340", "lastModified": "2024-11-21T03:55:44.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:01.060", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/896736" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/896736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 03:54
Severity ?
Summary
Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "64574A86-7E78-43FC-97E2-120811486E14", "versionEndExcluding": "70.0.3538.67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file." }, { "lang": "es", "value": "El manejo incorrecto de cadenas de filtrado de PDF en PDFium en Google Chrome en versiones anteriores a la 70.0.3538.67 permit\u00eda que un atacante remoto pudiese realizar una lectura de memoria fuera de l\u00edmites mediante un archivo PDF manipulado." } ], "id": "CVE-2018-17469", "lastModified": "2024-11-21T03:54:29.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:00.577", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/880675" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/880675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4330" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 03:54
Severity ?
Summary
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "64574A86-7E78-43FC-97E2-120811486E14", "versionEndExcluding": "70.0.3538.67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page." }, { "lang": "es", "value": "La gesti\u00f3n incorrecta del historial en iOS en la navegaci\u00f3n en Google Chrome en versiones anteriores a la 70.0.3538.67 permit\u00eda que un atacante remoto suplantase el contenido de Omnibox (barra de direcciones) mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-17464", "lastModified": "2024-11-21T03:54:28.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:00.343", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/887273" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/887273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4330" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-11 16:29
Modified
2024-11-21 03:55
Severity ?
Summary
Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC84646-AE0E-403B-903F-35E2D073FDC9", "versionEndExcluding": "71.0.3578.80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." }, { "lang": "es", "value": "Manejo incorrecto de hojas de estilo que provoca un uso de memoria previamente liberada en Blink en Google Chrome en versiones anteriores a la 71.0.3578.80 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n de la memoria din\u00e1mica (heap)" } ], "id": "CVE-2018-18337", "lastModified": "2024-11-21T03:55:44.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T16:29:00.873", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/886753" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/106084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/886753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201908-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4352" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name." }, { "lang": "es", "value": "Aplicaci\u00f3n insuficiente de caracteres confundibles en URL Formatter en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto suplantase dominios mediante homogramas IDN mediante un nombre de dominio manipulado." } ], "id": "CVE-2018-6107", "lastModified": "2024-11-21T04:10:04.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.807", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/808316" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/808316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
chrome | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "1301094D-6487-4A02-AAE3-A1A5B014B017", "versionEndExcluding": "66.0.3359.117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server." }, { "lang": "es", "value": "La falta de validaci\u00f3n del host en DevTools en Google Chrome, en versiones anteriores a la 66.0.3359.117, permit\u00eda que un atacante remoto ejecutase c\u00f3digo arbitrario mediante una p\u00e1gina HTML manipulada si el usuario est\u00e1 ejecutando un servidor de depuraci\u00f3n DevTools remoto." } ], "id": "CVE-2018-6101", "lastModified": "2024-11-21T04:10:04.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T17:29:01.540", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/813540" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/103917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:1195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/813540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201804-22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4182" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 15:29
Modified
2024-11-21 03:54
Severity ?
Summary
Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
redhat | linux_desktop | 6.0 | |
redhat | linux_server | 6.0 | |
redhat | linux_workstation | 6.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "64574A86-7E78-43FC-97E2-120811486E14", "versionEndExcluding": "70.0.3538.67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page." }, { "lang": "es", "value": "Conteo de referencias incorrecto en AppCache en Google Chrome en versiones anteriores a la 70.0.3538.67 permit\u00eda que un atacante remoto realizase un escape del sandbox mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2018-17462", "lastModified": "2024-11-21T03:54:28.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T15:29:00.233", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "chrome-cve-admin@google.com", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "chrome-cve-admin@google.com", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "chrome-cve-admin@google.com", "url": "https://crbug.com/888926" }, { "source": "chrome-cve-admin@google.com", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "chrome-cve-admin@google.com", "url": "https://www.debian.org/security/2018/dsa-4330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/105666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://crbug.com/888926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4330" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }