[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-16081Date: (C)2019-01-12   (M)2023-12-28


Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.4CVSS Score : 4.3
Exploit Score: 2.8Exploit Score: 8.6
Impact Score: 4.0Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
-105215
GLSA-201811-10
RHSA-2018:2666
https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
https://crbug.com/666299

CPE    4
cpe:/a:google:chrome
cpe:/o:redhat:enterprise_linux_workstation:6.0
cpe:/o:redhat:enterprise_linux_desktop:6.0
cpe:/o:redhat:enterprise_linux_server:6.0
...
CWE    1
CWE-862
OVAL    14
oval:org.secpod.oval:def:505412
oval:org.secpod.oval:def:115120
oval:org.secpod.oval:def:47306
oval:org.secpod.oval:def:47305
...

© SecPod Technologies