Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oxide project oxide - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-1317
Use-after-free vulnerability in Oxide prior to 1.5.6 and 1.6.x prior to 1.6.1 allows remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code by deleting all WebContents while a RenderProcessHost instance still exists.
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Oxide Project Oxide 1.6.0
Oxide Project Oxide
7.5
CVSSv3
CVE-2016-1586
A malicious webview could install long-lived unload handlers that re-use an incognito BrowserContext that is queued for destruction in versions of Oxide prior to 1.18.3.
Oxide Project Oxide
8.8
CVSSv3
CVE-2015-1332
The oxide::JavaScriptDialogManager function in oxide-qt prior to 1.9.1 as packaged in Ubuntu 15.04 and Ubuntu 14.04 allows remote malicious users to cause a denial of service (application crash) or execute arbitrary code via a crafted website.
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Oxide Project Oxide
9.8
CVSSv3
CVE-2016-1578
Use-after-free vulnerability in Oxide allows remote malicious users to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to responding synchronously to permission requests.
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Oxide Project Oxide -
NA
CVE-2015-1321
Use-after-free vulnerability in the file picker implementation in Oxide prior to 1.6.5 allows remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted webpage.
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.1
Oxide Project Oxide
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started