Download
| Alert*
oval:org.secpod.oval:def:518
The host is installed with Google Chrome and is prone to same origin policy vulnerability. A flaw is present in Google V8 in the application which fails to restrict the access to each other's methods and properties. Successful exploitation allow remote attackers to bypass the same origin policy via ... oval:org.secpod.oval:def:496 The host is installed with Google Chrome and is prone to same origin policy vulnerability. A flaw is present in Google V8 in the application which fails to restrict the access to each other's methods and properties. Successful exploitation allow remote attackers to bypass the same origin policy via ... oval:org.secpod.oval:def:473 The host is installed with Google Chrome and is prone to same origin policy vulnerability. A flaw is present in Google V8 in the application which fails to restrict the access to each other's methods and properties. Successful exploitation allow remote attackers to bypass the same origin policy via ... |