4.3
CVSSv2

CVE-2015-6785

Published: 06/12/2015 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome prior to 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote malicious users to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

Vendor Advisories

Synopsis Critical: chromium-browser security update Type/Severity Security Advisory: Critical Topic Updated chromium-browser packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having Critical securityimpa ...
Several security issues were fixed in Oxide ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2015-1302 Rub Wu discovered an information leak in the pdfium library CVE-2015-6764 Guang Gong discovered an out-of-bounds read issue in the v8 javascript library CVE-2015-6765 A use-after-free issue was discovered in AppCache CVE-2015-6766 A use-a ...
The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSourcecpp in the Content Security Policy (CSP) implementation in Google Chrome before 470252673 accepts an xy hostname as a match for a *xy pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a po ...