CVE-2019-5802

Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

History

07 Nov 2023, 03:12

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html -
References (MISC) https://crbug.com/632514 - Issue Tracking, Permissions Required, Vendor Advisory () https://crbug.com/632514 -
References (MISC) https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html - Vendor Advisory () https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html -

Information

Published : 2019-05-23 20:29

Updated : 2024-02-28 17:08


NVD link : CVE-2019-5802

Mitre link : CVE-2019-5802

CVE.ORG link : CVE-2019-5802


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

google

  • chrome