Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-6790

Опубликовано: 14 дек. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

РелизСтатусПримечание
devel

released

47.0.2526.106-0ubuntu1.1221
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [47.0.2526.106-0ubuntu0.14.04.1.1107]]
precise

ignored

trusty

released

47.0.2526.106-0ubuntu0.14.04.1.1107
trusty/esm

DNE

trusty was released [47.0.2526.106-0ubuntu0.14.04.1.1107]
upstream

released

47.0.2526.80
vivid

released

47.0.2526.106-0ubuntu0.15.04.1.1192
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

47.0.2526.106-0ubuntu0.15.10.1.1218

Показывать по

РелизСтатусПримечание
devel

released

1.11.4-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1.11.4-0ubuntu0.14.04.1]]
precise

DNE

trusty

released

1.11.4-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [1.11.4-0ubuntu0.14.04.1]
upstream

released

1.11.4
vivid

released

1.11.4-0ubuntu0.15.04.1
vivid/stable-phone-overlay

released

1.12.5-0ubuntu0.15.04.1~overlay1
vivid/ubuntu-core

DNE

wily

released

1.11.4-0ubuntu0.15.10.1

Показывать по

EPSS

Процентиль: 76%
0.0094
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

nvd
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

debian
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/w ...

github
больше 3 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

fstec
около 10 лет назад

Уязвимость браузера Google Chrome, позволяющая нарушителю внедрить произвольный Веб- или HTML-код

EPSS

Процентиль: 76%
0.0094
Низкий

4.3 Medium

CVSS2