Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9h4w-j8f9-g7pr

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.

bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.

EPSS

Процентиль: 74%
0.00833
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.

redhat
больше 10 лет назад

bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.

nvd
больше 10 лет назад

bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.

debian
больше 10 лет назад

bindings/scripts/v8_types.py in Blink, as used in Google Chrome before ...

fstec
больше 10 лет назад

Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа

EPSS

Процентиль: 74%
0.00833
Низкий