Логотип exploitDog
bind:CVE-2009-1413
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-1413

Количество 3

Количество 3

nvd логотип

CVE-2009-1413

почти 17 лет назад

Google Chrome 1.0.x does not cancel timeouts upon a page transition, which makes it easier for attackers to conduct Universal XSS attacks by calling setTimeout to trigger future execution of JavaScript code, and then modifying document.location to arrange for JavaScript execution in the context of an arbitrary web site. NOTE: this can be leveraged for a remote attack by exploiting a chromehtml: argument-injection vulnerability.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2009-1413

почти 17 лет назад

Google Chrome 1.0.x does not cancel timeouts upon a page transition, w ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-pw5v-pxf7-g2j2

почти 4 года назад

Google Chrome 1.0.x does not cancel timeouts upon a page transition, which makes it easier for attackers to conduct Universal XSS attacks by calling setTimeout to trigger future execution of JavaScript code, and then modifying document.location to arrange for JavaScript execution in the context of an arbitrary web site. NOTE: this can be leveraged for a remote attack by exploiting a chromehtml: argument-injection vulnerability.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2009-1413

Google Chrome 1.0.x does not cancel timeouts upon a page transition, which makes it easier for attackers to conduct Universal XSS attacks by calling setTimeout to trigger future execution of JavaScript code, and then modifying document.location to arrange for JavaScript execution in the context of an arbitrary web site. NOTE: this can be leveraged for a remote attack by exploiting a chromehtml: argument-injection vulnerability.

CVSS2: 4.3
0%
Низкий
почти 17 лет назад
debian логотип
CVE-2009-1413

Google Chrome 1.0.x does not cancel timeouts upon a page transition, w ...

CVSS2: 4.3
0%
Низкий
почти 17 лет назад
github логотип
GHSA-pw5v-pxf7-g2j2

Google Chrome 1.0.x does not cancel timeouts upon a page transition, which makes it easier for attackers to conduct Universal XSS attacks by calling setTimeout to trigger future execution of JavaScript code, and then modifying document.location to arrange for JavaScript execution in the context of an arbitrary web site. NOTE: this can be leveraged for a remote attack by exploiting a chromehtml: argument-injection vulnerability.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу