8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.022 Low
EPSS
Percentile
88.2%
Cross-origin bypass in Extension bindings. Credit to anonymous.
Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
Information leak in Extension bindings. Credit to Rob Wu.
Parameter sanitization failure in DevTools. Credit to Gregory Panakkal.
Use-after-free in Extensions. Credit to Rob Wu.
Use-after-free in Autofill. Credit to Rob Wu.
Out-of-bounds read in Skia. Credit to cloudfuzzer.
Various fixes from internal audits, fuzzing and other initiatives.
googlechromereleases.blogspot.fr/2016/06/stable-channel-update.html
access.redhat.com/security/cve/CVE-2016-1696
access.redhat.com/security/cve/CVE-2016-1697
access.redhat.com/security/cve/CVE-2016-1698
access.redhat.com/security/cve/CVE-2016-1699
access.redhat.com/security/cve/CVE-2016-1700
access.redhat.com/security/cve/CVE-2016-1701
access.redhat.com/security/cve/CVE-2016-1702
access.redhat.com/security/cve/CVE-2016-1703
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.022 Low
EPSS
Percentile
88.2%