Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1236

Опубликовано: 19 апр. 2015
Источник: debian
EPSS Низкий

Описание

The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
chromium-browserfixed42.0.2311.90-1package
chromium-browserend-of-lifewheezypackage
chromium-browserend-of-lifesqueezepackage

EPSS

Процентиль: 69%
0.00602
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.

redhat
почти 11 лет назад

The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.

nvd
почти 11 лет назад

The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.

github
больше 3 лет назад

The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.

fstec
почти 11 лет назад

Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю получить доступ к значениям образцов аудио

EPSS

Процентиль: 69%
0.00602
Низкий