Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Google Chrome Multiple Vulnerabilities Mar16 (Mac OS X)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Google Chrome and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exist as, - The Content Security Policy (CSP) implementation in Blink does not ignore a URL's path component in the case of a ServiceWorker fetch. - 'WebKit/Source/core/layout/LayoutBlock.cpp' script in Blink does not properly determine when anonymous block wrappers may exist. - Multiple unspecified vulnerabilities. - Use-after-free vulnerabilities. - The Web Store inline-installer implementation in the Extensions UI does not block installations upon deletion of an installation frame. - The 'SkATan2_255' function in 'effects/gradients/SkSweepGradient.cpp' script in Skia mishandles arctangent calculations. - Extensions subsystem does not properly validate the functions. - The 'PendingScript::notifyFinished' function in 'WebKit/Source/core/dom/PendingScript.cpp' script relies on memory-cache information about integrity-check occurrences instead of integrity-check successe. - 'extensions/renderer/render_frame_observer_natives.cc' script does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling. - The 'PPB_Flash_MessageLoop_Impl::InternalRun' function in 'content/renderer/pepper/ppb_flash_message_loop_impl.cc' script in the Pepper plugin mishandles nested message loops. - The 'ContainerNode::parserRemoveChild' function in 'WebKit/Source/core/dom/ContainerNode.cpp' script in Blink mishandles widget updates.
Affected Software
Affected Software
Google Chrome versions prior to 49.0.2623.75 on Mac OS X.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Google Chrome version 49.0.2623.75 or later.