![]() ![]() ![]() (Chromium security severity: Medium) (CVE-2023-0134, CVE-2023-0135) - Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 1.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-0133) - Use after free in Cart in Google Chrome prior to 1.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-0132) - Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 1.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium) (CVE-2023-0131) - Inappropriate implementation in in Permission prompts in Google Chrome on Windows prior to 1.74 allowed a remote attacker to force acceptance of a permission prompt via a crafted HTML page. ![]() (Chromium security severity: Medium) (CVE-2023-0130) - Inappropriate implementation in in iframe Sandbox in Google Chrome prior to 1.74 allowed a remote attacker to bypass file download restrictions via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0129) - Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 1.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High) (CVE-2023-0128) - Heap buffer overflow in Network Service in Google Chrome prior to 1.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. Use after free in Overview Mode in Google Chrome on Chrome OS prior to 1.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. It is, therefore, affected by multiple vulnerabilities as referenced in the 7b929503-911d-11ed-a925-3065ec8fd3ec advisory. Description The version of FreeBSD installed on the remote host is prior to tested version. Synopsis The remote FreeBSD host is missing one or more security-related updates. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |