![]() ![]() Script_name(english:"openSUSE 15 Security Update : chromium (openSUSE-SU-2023:0277-1)") Script_xref(name:"CISA-KNOWN-EXPLOITED", value:"3") Script_set_attribute(attribute:"plugin_modification_date", value:"2") # openSUSE Security Update openSUSE-SU-2023:0277-1. # The package checks in this plugin were extracted from Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number. ![]() (Chromium security severity: High) (CVE-2023-5217) Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 1.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2023-5187) Use after free in Extensions in Google Chrome prior to 1.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. ![]() (Chromium security severity: High) (CVE-2023-5186) Use after free in Passwords in Google Chrome prior to 1.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2023:0277-1 advisory. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |