Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.800229 |
Kategorie: | Web application abuses |
Titel: | Google Chrome Multiple Vulnerabilities (Feb-09) |
Zusammenfassung: | This host is installed with Google Chrome and is prone to; multiple vulnerabilities. |
Beschreibung: | Summary: This host is installed with Google Chrome and is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws are due to: - an error exists in the V8 JavaScript engine while re-directing to another windows through iframe tag as it allows to bypass the same origin policy through a crafted iframe crafted script. - a flaw in the 'XMLHttpRequest' header which contains the cookie information of the logged user. Vulnerability Impact: Successful exploitation will let the attacker read the full URL and potentially other attributes or data from another frame in a different domain and can conduct cross site scripting attacks to gain users sensitive information and can also able to hijack legitimate user session and could gain sensitive information for the victim accounts. Affected Software/OS: Google Chrome version prior to 1.0.154.46 Solution: Upgrade Google Chrome to version 1.0.154.46 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0276 http://secunia.com/advisories/33754 Common Vulnerability Exposure (CVE) ID: CVE-2009-0411 XForce ISS Database: googlechrome-xmlhttprequest-info-disclosure(48554) https://exchange.xforce.ibmcloud.com/vulnerabilities/48554 |
Copyright | Copyright (C) 2009 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |