Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-6652

Опубликовано: 24 фев. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for .. (dot dot) sequences or (2) lack of use of the \?\ protection mechanism.

РелизСтатусПримечание
devel

not-affected

lucid

ignored

end of life
precise

not-affected

quantal

not-affected

saucy

not-affected

upstream

released

33.0.1750.117

Показывать по

EPSS

Процентиль: 59%
0.00388
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for .. (dot dot) sequences or (2) lack of use of the \\?\ protection mechanism.

debian
почти 12 лет назад

Directory traversal vulnerability in sandbox/win/src/named_pipe_dispat ...

github
больше 3 лет назад

Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for .. (dot dot) sequences or (2) lack of use of the \\?\ protection mechanism.

EPSS

Процентиль: 59%
0.00388
Низкий

7.5 High

CVSS2