- Home
- CVEs with nessus.description==The version of Google Chrome installed on the remote Windows host is prior to 53.0.2785.89. It is, therefore, affected by multiple vulnerabilities :
- Universal XSS in Blink. Credit to anonymous
- Universal XSS in Blink. Credit to anonymous
- Script injection in extensions. Credit to Max Justicz (http
- Use after free in Blink. Credit to anonymous
- Use after free in PDFium. Credit to anonymous
- Heap overflow in PDFium. Credit to GiWan Go of Stealien
- Use after destruction in Blink. Credit to Atte Kettunen of OUSPG
- Heap overflow in PDFium. Credit to anonymous
- Address bar spoofing. Credit to anonymous
- Use after free in event bindings. Credit to jinmo123
- Heap overflow in PDFium. Credit to anonymous
- Heap overflow in PDFium. Credit to GiWan Go of Stealien
- Heap overflow in PDFium. Credit to GiWan Go of Stealien
- Type confusion in Blink. Credit to 62600BCA031B9EB5CB4A74ADDDD6771E working with Trend Micro's Zero Day Initiative
- Extensions web accessible resources bypass. Credit to Nicolas Golubovic
- Address bar spoofing. Credit to Rafay Baloch PTCL Etisalat (http
- Universal XSS using DevTools. Credit to anonymous
- Script injection in DevTools. Credit to Gregory Panakkal
- SMB Relay Attack via Save Page As. Credit to Gregory Panakkal
- Extensions web accessible resources bypass. Credit to @l33terally, FogMarks.com (@FogMarks)
- Various fixes from internal audits, fuzzing and other initiatives.
Note that Nessus has not tested for these issues but has instead relied only on the applications self-reported version number.
Note that Tenable Network Security has extracted the preceding description block directly from the Chrome security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top