Download
| Alert*
oval:org.secpod.oval:def:603822
Clement Lecigne discovered a use-after-free issue in chromium"s file reader implementation. A maliciously crafted file could be used to remotely execute arbitrary code because of this problem. This update also fixes a regression introduced in a previous update. The browser would always crash when la ... oval:org.secpod.oval:def:505371 Chromium is an open-source web browser, powered by WebKit . This update upgrades Chromium to version 72.0.3626.121. Security Fix: * chromium-browser: Use-after-free in FileReader For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related inform ... oval:org.secpod.oval:def:116155 Chromium is an open-source web browser, powered by WebKit . oval:org.secpod.oval:def:51000 The host is installed with Google Chrome before 72.0.3626.121 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted html page. Successful exploitation allows attackers execute arbitrary code in the context of the browser. oval:org.secpod.oval:def:50993 The host is missing a high severity security update according to Google advisory. The update is required to fix a use-after-free vulnerability. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers execute arbitrary code in the context ... oval:org.secpod.oval:def:53533 Clement Lecigne discovered a use-after-free issue in chromium"s file reader implementation. A maliciously crafted file could be used to remotely execute arbitrary code because of this problem. This update also fixes a regression introduced in a previous update. The browser would always crash when la ... oval:org.secpod.oval:def:50994 The host is installed with Google Chrome before 72.0.3626.121 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted html page. Successful exploitation allows attackers execute arbitrary code in the context of the browser. oval:org.secpod.oval:def:50995 The host is missing a high severity security update according to Google advisory. The update is required to fix a use-after-free vulnerability. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers execute arbitrary code in the context ... oval:org.secpod.oval:def:50996 The host is installed with Google Chrome before 72.0.3626.121 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted html page. Successful exploitation allows attackers execute arbitrary code in the context of the browser. oval:org.secpod.oval:def:50997 The host is missing a high severity security update according to Google advisory. The update is required to fix a use-after-free vulnerability. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers execute arbitrary code in the context ... oval:org.secpod.oval:def:50998 The host is missing a high severity security update according to Google advisory. The update is required to fix a use-after-free vulnerability. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers execute arbitrary code in the context ... oval:org.secpod.oval:def:50999 The host is installed with Google Chrome before 72.0.3626.121 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted html page. Successful exploitation allows attackers execute arbitrary code in the context of the browser. |