6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.035 Low
EPSS
Percentile
91.4%
Severity: Critical
Date : 2017-10-27
CVE-ID : CVE-2017-15396
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-472
The package chromium before version 62.0.3202.75-1 is vulnerable to
arbitrary code execution.
Upgrade to 62.0.3202.75-1.
The problem has been fixed upstream in version 62.0.3202.75.
None.
A stack overflow has been found in the V8 component of the chromium
browser < 62.0.3202.75.
A remote attacker can execute arbitrary code on the affected host.
https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html
https://crbug.com/770452
https://security.archlinux.org/CVE-2017-15396
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.035 Low
EPSS
Percentile
91.4%