8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.4%
Severity: High
Date : 2019-10-26
CVE-ID : CVE-2019-13699 CVE-2019-13700 CVE-2019-13701 CVE-2019-13702
CVE-2019-13703 CVE-2019-13704 CVE-2019-13705 CVE-2019-13706
CVE-2019-13707 CVE-2019-13708 CVE-2019-13709 CVE-2019-13710
CVE-2019-13711 CVE-2019-13713 CVE-2019-13714 CVE-2019-13715
CVE-2019-13716 CVE-2019-13717 CVE-2019-13718 CVE-2019-13719
CVE-2019-15903
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1053
The package chromium before version 78.0.3904.70-1 is vulnerable to
multiple issues including arbitrary code execution, content spoofing,
access restriction bypass, authentication bypass, denial of service,
information disclosure, privilege escalation and cross-site scripting.
Upgrade to 78.0.3904.70-1.
The problems have been fixed upstream in version 78.0.3904.70.
None.
A use-after-free issue has been found in the media component of
chromium before 78.0.3904.70.
A buffer overrun issue has been found in the Blink component of
chromium before 78.0.3904.70.
A URL spoofing issue has been found in chromium before 78.0.3904.70.
A privilege escalation issue has been found in chromium before
78.0.3904.70.
A URL bar spoofing issue has been found in chromium before
78.0.3904.70.
A CSP bypass has been found in chromium before 78.0.3904.70.
An extension permission bypass has been found in chromium before
78.0.3904.70.
An out-of-bounds read has been found in the PDFium component of
chromium before 78.0.3904.70.
A file storage disclosure issue has been found in chromium before
78.0.3904.70.
A security issue has been found in chromium before 78.0.3904.70 where
HTTP authentication could be spoofed.
A security issue has been found in chromium before 78.0.3904.70 where
the file download protection could be bypassed.
A security issue has been found in chromium before 78.0.3904.70 where
the file download protection could be bypassed.
A cross-context information leak has been found in chromium before
78.0.3904.70.
A cross-origin data leak has been found in chromium before
78.0.3904.70.
A CSS injection has been found in chromium before 78.0.3904.70.
A security issue has been found in chromium before 78.0.3904.70 where
the content of the address bar could be spoofed.
A security issue has been found in chromium before 78.0.3904.70 where a
service worker could end up in an invalid state.
A security issue has been found in chromium before 78.0.3904.70 where
notifications could be obscured.
A security issue has been found in chromium before 78.0.3904.70 where
IDNs could be spoofed.
A security issue has been found in chromium before 78.0.3904.70 where
notifications could be obscured.
A security issue has been found in libexpat before 2.2.8, where crafted
XML input could fool the parser into changing from DTD parsing to
document parsing too early; a consecutive call to
XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted
in a heap-based buffer over-read
A remote attacker can crash chromium, spoof various parts of the user
interface, bypass security measures, access sensitive information,
elevate privileges or execute arbitrary code.
https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
https://crbug.com/1001503
https://crbug.com/998431
https://crbug.com/998284
https://crbug.com/991125
https://crbug.com/992838
https://crbug.com/1001283
https://crbug.com/989078
https://crbug.com/1001159
https://crbug.com/859349
https://crbug.com/931894
https://crbug.com/1005218
https://crbug.com/756825
https://crbug.com/986063
https://crbug.com/993288
https://crbug.com/982812
https://crbug.com/760855
https://crbug.com/1005948
https://crbug.com/839239
https://crbug.com/866162
https://crbug.com/927150
https://crbug.com/1004341
https://github.com/libexpat/libexpat/issues/317
https://github.com/libexpat/libexpat/pull/318
https://security.archlinux.org/CVE-2019-13699
https://security.archlinux.org/CVE-2019-13700
https://security.archlinux.org/CVE-2019-13701
https://security.archlinux.org/CVE-2019-13702
https://security.archlinux.org/CVE-2019-13703
https://security.archlinux.org/CVE-2019-13704
https://security.archlinux.org/CVE-2019-13705
https://security.archlinux.org/CVE-2019-13706
https://security.archlinux.org/CVE-2019-13707
https://security.archlinux.org/CVE-2019-13708
https://security.archlinux.org/CVE-2019-13709
https://security.archlinux.org/CVE-2019-13710
https://security.archlinux.org/CVE-2019-13711
https://security.archlinux.org/CVE-2019-13713
https://security.archlinux.org/CVE-2019-13714
https://security.archlinux.org/CVE-2019-13715
https://security.archlinux.org/CVE-2019-13716
https://security.archlinux.org/CVE-2019-13717
https://security.archlinux.org/CVE-2019-13718
https://security.archlinux.org/CVE-2019-13719
https://security.archlinux.org/CVE-2019-15903
chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
crbug.com/1001159
crbug.com/1001283
crbug.com/1001503
crbug.com/1004341
crbug.com/1005218
crbug.com/1005948
crbug.com/756825
crbug.com/760855
crbug.com/839239
crbug.com/859349
crbug.com/866162
crbug.com/927150
crbug.com/931894
crbug.com/982812
crbug.com/986063
crbug.com/989078
crbug.com/991125
crbug.com/992838
crbug.com/993288
crbug.com/998284
crbug.com/998431
github.com/libexpat/libexpat/issues/317
github.com/libexpat/libexpat/pull/318
security.archlinux.org/AVG-1053
security.archlinux.org/CVE-2019-13699
security.archlinux.org/CVE-2019-13700
security.archlinux.org/CVE-2019-13701
security.archlinux.org/CVE-2019-13702
security.archlinux.org/CVE-2019-13703
security.archlinux.org/CVE-2019-13704
security.archlinux.org/CVE-2019-13705
security.archlinux.org/CVE-2019-13706
security.archlinux.org/CVE-2019-13707
security.archlinux.org/CVE-2019-13708
security.archlinux.org/CVE-2019-13709
security.archlinux.org/CVE-2019-13710
security.archlinux.org/CVE-2019-13711
security.archlinux.org/CVE-2019-13713
security.archlinux.org/CVE-2019-13714
security.archlinux.org/CVE-2019-13715
security.archlinux.org/CVE-2019-13716
security.archlinux.org/CVE-2019-13717
security.archlinux.org/CVE-2019-13718
security.archlinux.org/CVE-2019-13719
security.archlinux.org/CVE-2019-15903
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.4%