Vulnerability Details : CVE-2015-1293
The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Products affected by CVE-2015-1293
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1293
1.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1293
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-1293
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1293
-
http://www.securitytracker.com/id/1033472
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, Obtain Potentially Sensitive Information, and Spoof Content - SecurityTracker
-
http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html
openSUSE-SU-2015:1873-1: moderate: Security update for Chromium
-
https://code.google.com/p/chromium/issues/detail?id=524074
524074 - Security: Universal XSS by loading a javascript: URI from an unloaded window - chromium - Monorail
-
http://rhn.redhat.com/errata/RHSA-2015-1712.html
RHSA-2015:1712 - Security Advisory - Red Hat Customer Portal
-
http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
Chrome Releases: Stable Channel UpdatePatch;Vendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html
openSUSE-SU-2015:1586-1: moderate: Security update for Chromium
-
https://security.gentoo.org/glsa/201603-09
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security
-
http://www.debian.org/security/2015/dsa-3351
Debian -- Security Information -- DSA-3351-1 chromium-browser
Jump to