4.3
CVSSv2

CVE-2019-5765

Published: 19/02/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

An exposed debugging endpoint in the browser in Google Chrome on Android before 72.0.3626.81 allowed a local malicious user to obtain potentially sensitive information from process memory via a crafted Intent.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

debian debian linux 9.0

fedoraproject fedora 29

fedoraproject fedora 30

Vendor Advisories

Synopsis Critical: chromium-browser security update Type/Severity Security Advisory: Critical Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scor ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2018-17481 A use-after-free issue was discovered in the pdfium library CVE-2019-5754 Klzgrad discovered an error in the QUIC networking implementation CVE-2019-5755 Jay Bosamiya discovered an implementation error in the v8 javascript library CVE-2019-5 ...
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem When the candidate has been publicized, the details for this candidate will be provided ...
An insufficient policy enforcement issue has been found in the chromium browser before 720362681 ...
The Chrome team is delighted to announce the promotion of Chrome 72 to the stable channel for Windows, Mac and Linux This will roll out over the coming days/weeks Chrome 720362681 contains a number of fixes and improvements -- a list of changes is available in the log Watch out for upcoming Chrome and Chromium blog po ...

Github Repositories

Getting Started? » Buy me a coffee » Wanna Talk? πŸš€ Android Security Notes? » Here, You will find important concepts, resources, hand-crafted and self-curated notes written by a kind-hearted fellow The main purpose of this project is to serve as a First-Aid to newbies (like me) and intermediate peep who perform android security 🀝 Wanna contribute?

An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.

Getting Started? » Buy me a coffee » Wanna Talk? πŸš€ Android Security Notes? » Here, You will find important concepts, resources, hand-crafted and self-curated notes written by a kind-hearted fellow The main purpose of this project is to serve as a First-Aid to newbies (like me) and intermediate peep who perform android security 🀝 Wanna contribute?

Recent Articles

Renegade Android apps can siphon off your web logins, browser history. So make sure Chrome or OS is patched, friends
The Register β€’ Shaun Nichols in San Francisco β€’ 20 Mar 2019

Kit-Kat API whacked, don't give hackers your phone. This WebView came rolling home Google takes a page from Microsoft of old and revives browser ballot on Android

Smartphones and other gadgets running Android 4.4 or later contain a bug that can be exploited by rogue apps to steal website login tokens and spy on owners' browsing histories. Those stolen authentication tokens can be used by a malicious application, such as a dodgy quiz app or game, to log into sites as the gizmo's owner to siphon off their information or meddle with their online accounts. This is according to Sergey Toshin of security house Positive Technologies, who took credit for the disc...