Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1631

Опубликовано: 02 мар. 2016
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1314215chromium-browser: same-origin bypass in Pepper Plugin

EPSS

Процентиль: 76%
0.0097
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 10 лет назад

The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

CVSS3: 8.8
nvd
почти 10 лет назад

The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

CVSS3: 8.8
debian
почти 10 лет назад

The PPB_Flash_MessageLoop_Impl::InternalRun function in content/render ...

CVSS3: 8.8
github
больше 3 лет назад

The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

fstec
почти 10 лет назад

Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа

EPSS

Процентиль: 76%
0.0097
Низкий

6.8 Medium

CVSS2