Total vulnerabilities in the database
Insufficient policy enforcement in extensions API in Google Chrome prior to 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension.
Software | From | Fixed in |
---|---|---|
google / chrome | - | 75.0.3770.80 |
opensuse / leap | 42.3 | 42.3.x |
opensuse / leap | 15.0 | 15.0.x |
opensuse / backports | sle-15 | sle-15.x |
opensuse / leap | 15.1 | 15.1.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
debian / debian_linux | 10.0 | 10.0.x |