Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1248

Опубликовано: 19 апр. 2015
Источник: debian
EPSS Низкий

Описание

The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
chromium-browserfixed42.0.2311.90-1package
chromium-browserend-of-lifewheezypackage
chromium-browserend-of-lifesqueezepackage

EPSS

Процентиль: 67%
0.00553
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.

redhat
почти 11 лет назад

The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.

nvd
почти 11 лет назад

The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.

github
больше 3 лет назад

The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.

fstec
почти 11 лет назад

Уязвимость интерфейса File System API браузера Google Chrome, позволяющая удаленному нарушителю обойти защитный механизм SafeBrowsing

EPSS

Процентиль: 67%
0.00553
Низкий