chromium-browser vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the chromium-browser package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

<14.0.835.163~r101024-1
  • H
Incorrect Type Conversion or Cast

<11.0.696.65~r84435-1
  • M
Improper Input Validation

<56.0.2924.76-1~deb8u1
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • H
Use After Free

*
  • H
Out-of-bounds Read

<51.0.2704.63-1~deb8u1
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • H
Improper Validation of Array Index

*
  • H
Out-of-bounds Read

*
  • M
CVE-2018-17464

*
  • H
Use After Free

*
  • M
CVE-2018-17471

*
  • H
Out-of-Bounds

*
  • C
Improper Input Validation

*
  • M
CVE-2018-17476

*
  • H
CVE-2018-17463

*
  • M
CVE-2018-17477

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • C
Use After Free

*
  • M
Information Exposure

*
  • M
CVE-2018-17475

*
  • M
CVE-2018-17473

*
  • M
Incomplete Cleanup

*
  • H
Improper Validation of Array Index

*
  • M
CVE-2018-17459

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Read

*
  • H
Missing Authorization

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Race Condition

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Out-of-bounds Read

*
  • C
Improper Input Validation

*
  • H
Out-of-bounds Read

*
  • M
CVE-2018-16075

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • H
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
CVE-2018-6175

*
  • M
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Information Exposure

*
  • C
Unrestricted Upload of File with Dangerous Type

*
  • M
CVE-2018-6167

*
  • M
CVE-2018-6166

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
CVE-2018-6165

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
CVE-2018-6163

*
  • M
Information Exposure

*
  • M
CVE-2018-6173

*
  • H
Race Condition

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
CVE-2018-6172

*
  • H
Out-of-bounds Read

*
  • M
Information Exposure

*
  • H
Out-of-bounds Write

*
  • L
CVE-2018-6044

*
  • H
Integer Overflow or Wraparound

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Out-of-bounds Read

*
  • M
CRLF Injection

*
  • H
Out-of-Bounds

*
  • H
Incorrect Type Conversion or Cast

*
  • L
CVE-2010-1765

<5.0.375.55~r47796-1
  • H
Improper Data Handling

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • C
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Improper Input Validation

*
  • M
Open Redirect

*
  • M
CVE-2018-6125

*
  • M
CVE-2018-6107

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Integer Overflow or Wraparound

*
  • M
CVE-2018-6103

*
  • H
Out-of-bounds Write

*
  • H
Integer Overflow or Wraparound

*
  • H
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Out-of-Bounds

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
CVE-2018-6135

*
  • H
Out-of-bounds Read

*
  • H
Arbitrary Code Injection

<55.0.2883.75-1~deb8u1
  • M
CVE-2018-6098

*
  • M
Improper Privilege Management

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • H
Improper Input Validation

*
  • M
CVE-2018-6108

*
  • M
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • M
Out-of-Bounds

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Use of Incorrectly-Resolved Name or Reference

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Data Handling

*
  • H
Incorrect Type Conversion or Cast

*
  • C
CVE-2016-5194

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Use After Free

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-bounds Write

*
  • H
Improper Input Validation

*
  • M
Improper Data Handling

*
  • M
Improper Input Validation

*
  • H
Race Condition

*
  • H
Incorrect Type Conversion or Cast

*
  • C
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
CVE-2018-6049

*
  • M
Information Exposure

*
  • C
CVE-2016-9652

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • H
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Use of Uninitialized Resource

*
  • M
CVE-2018-6105

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • H
Out-of-bounds Write

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-bounds Read

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • C
Incorrect Permission Assignment for Critical Resource

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Out-of-Bounds

*
  • H
Incorrect Permission Assignment for Critical Resource

*
  • M
Out-of-Bounds

*
  • M
Improper Data Handling

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
CVE-2018-6083

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Cross-site Scripting (XSS)

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improper Input Validation

*
  • M
CVE-2018-6104

*
  • H
Out-of-bounds Write

*
  • M
Cryptographic Issues

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • M
Improper Data Handling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Integer Overflow or Wraparound

*
  • H
Out-of-Bounds

*
  • M
CVE-2017-15391

*
  • H
Out-of-bounds Write

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-Bounds

*
  • H
Exposure of Resource to Wrong Sphere

*
  • H
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
CVE-2017-15387

*
  • C
Use After Free

*
  • H
Out-of-bounds Read

*
  • H
Out-of-Bounds

<44.0.2403.89-1
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • L
Improper Privilege Management

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Race Condition

*
  • H
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • H
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • C
Out-of-bounds Read

*
  • H
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Use After Free

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • H
Use After Free

*
  • M
Incorrect Type Conversion or Cast

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-Bounds

*
  • H
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Read

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Use After Free

*
  • M
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • H
Incorrect Type Conversion or Cast

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • M
CVE-2017-5120

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • H
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
CVE-2017-5078

*
  • M
Out-of-Bounds

<40.0.2214.91-1
  • H
Use After Free

<53.0.2785.143-1~deb8u1
  • C
Improper Input Validation

<53.0.2785.143-1~deb8u1
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Out-of-bounds Write

<57.0.2987.98-1~deb8u1
  • M
Improper Input Validation

<57.0.2987.98-1~deb8u1
  • H
Integer Overflow or Wraparound

<57.0.2987.98-1~deb8u1
  • M
Information Exposure

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Out-of-bounds Write

<57.0.2987.98-1~deb8u1
  • M
Missing Encryption of Sensitive Data

<57.0.2987.98-1~deb8u1
  • M
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • M
Improper Preservation of Permissions

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • M
Out-of-Bounds

<57.0.2987.98-1~deb8u1
  • M
Cross-site Scripting (XSS)

<57.0.2987.98-1~deb8u1
  • H
Race Condition

<57.0.2987.98-1~deb8u1
  • M
Information Exposure

<57.0.2987.98-1~deb8u1
  • H
Use After Free

<57.0.2987.98-1~deb8u1
  • H
Out-of-Bounds

<57.0.2987.98-1~deb8u1
  • H
Origin Validation Error

<50.0.2661.94-1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Information Exposure

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5013

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5027

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Improper Restriction of Rendered UI Layers or Frames

<56.0.2924.76-1~deb8u1
  • M
Information Exposure

<56.0.2924.76-1~deb8u1
  • M
Use After Free

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5015

<56.0.2924.76-1~deb8u1
  • M
Use After Free

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
NULL Pointer Dereference

<56.0.2924.76-1~deb8u1
  • M
CVE-2017-5022

<56.0.2924.76-1~deb8u1
  • H
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Cross-site Scripting (XSS)

<56.0.2924.76-1~deb8u1
  • M
Improper Restriction of Rendered UI Layers or Frames

<56.0.2924.76-1~deb8u1
  • H
Out-of-Bounds

<56.0.2924.76-1~deb8u1
  • M
Improper Data Handling

<55.0.2883.75-1~deb8u1
  • M
Information Exposure

<55.0.2883.75-1~deb8u1
  • H
Out-of-bounds Read

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Integer Overflow or Wraparound

<55.0.2883.75-1~deb8u1
  • M
Improper Data Handling

<55.0.2883.75-1~deb8u1
  • H
Out-of-bounds Write

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Out-of-bounds Write

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Improper Access Control

<55.0.2883.75-1~deb8u1
  • M
Information Exposure

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Information Exposure

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

<55.0.2883.75-1~deb8u1
  • M
Numeric Errors

<55.0.2883.75-1~deb8u1
  • M
Integer Overflow or Wraparound

<55.0.2883.75-1~deb8u1
  • M
Improper Data Handling

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Use After Free

<55.0.2883.75-1~deb8u1
  • H
Out-of-Bounds

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • M
Improper Input Validation

<55.0.2883.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<55.0.2883.75-1~deb8u1
  • H
Use After Free

<55.0.2883.75-1~deb8u1
  • M
Out-of-bounds Read

<55.0.2883.75-1~deb8u1
  • M
Improper Access Control

<53.0.2785.113-1~deb8u1
  • M
Improper Input Validation

<53.0.2785.113-1~deb8u1
  • H
Use After Free

<53.0.2785.113-1~deb8u1
  • M
Information Exposure

<53.0.2785.113-1~deb8u1
  • H
Use After Free

<53.0.2785.113-1~deb8u1
  • H
CVE-2016-7549

<53.0.2785.113-1~deb8u1
  • H
Improper Access Control

<53.0.2785.113-1~deb8u1
  • H
CVE-2016-5175

<53.0.2785.113-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • H
Improper Data Handling

<53.0.2785.113-1~deb8u1
  • H
Improper Data Handling

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • H
Use After Free

<53.0.2785.89-1~deb8u1
  • H
Arbitrary Code Injection

<53.0.2785.89-1~deb8u1
  • H
Out-of-Bounds

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1~deb8u1
  • H
Out-of-Bounds

<53.0.2785.89-1~deb8u1
  • M
Security Features

<53.0.2785.89-1~deb8u1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1~deb8u1
  • H
Integer Overflow or Wraparound

<53.0.2785.89-1~deb8u1
  • H
Use After Free

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • H
Incorrect Type Conversion or Cast

<53.0.2785.89-1~deb8u1
  • L
Information Exposure

<53.0.2785.89-1~deb8u1
  • H
CVE-2016-5167

<53.0.2785.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<53.0.2785.89-1~deb8u1
  • H
Use After Free

<53.0.2785.89-1~deb8u1
  • H
Security Features

<52.0.2743.116-1~deb8u1
  • C
Out-of-Bounds

<52.0.2743.116-1~deb8u1
  • C
CVE-2016-5146

<52.0.2743.116-1~deb8u1
  • C
Use After Free

<52.0.2743.116-1~deb8u1
  • C
Improper Access Control

<52.0.2743.116-1~deb8u1
  • H
Improper Input Validation

<52.0.2743.116-1~deb8u1
  • C
Access Restriction Bypass

<52.0.2743.116-1~deb8u1
  • H
Out-of-Bounds

<52.0.2743.116-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • H
CVE-2016-1705

<52.0.2743.82-1~deb8u1
  • H
Improper Authorization

<52.0.2743.82-1~deb8u1
  • H
Improper Authorization

<52.0.2743.82-1~deb8u1
  • M
Improper Authentication

<52.0.2743.82-1~deb8u1
  • H
Security Features

<52.0.2743.82-1~deb8u1
  • H
Information Exposure

<52.0.2743.82-1~deb8u1
  • H
Security Features

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • C
Improper Input Validation

<52.0.2743.82-1~deb8u1
  • H
Out-of-Bounds

<52.0.2743.82-1~deb8u1
  • H
Out-of-Bounds

<52.0.2743.82-1~deb8u1
  • M
Improper Input Validation

<52.0.2743.82-1~deb8u1
  • M
Improper Input Validation

<52.0.2743.82-1~deb8u1
  • M
Improper Access Control

<52.0.2743.82-1~deb8u1
  • M
Information Exposure

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • H
Use After Free

<52.0.2743.82-1~deb8u1
  • H
CVE-2016-1704

<52.0.2743.82-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1701

<51.0.2704.79-1~deb8u1
  • H
Security Features

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1684

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.79-1~deb8u1
  • H
CVE-2016-1674

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1690

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1679

<51.0.2704.63-1~deb8u1
  • M
Security Features

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Out-of-Bounds

<51.0.2704.79-1~deb8u1
  • H
Security Features

<51.0.2704.79-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
Improper Access Control

<51.0.2704.79-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1695

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1673

<51.0.2704.63-1~deb8u1
  • M
Information Exposure

<51.0.2704.79-1~deb8u1
  • H
CVE-2016-1700

<51.0.2704.79-1~deb8u1
  • M
Information Exposure

<51.0.2704.63-1~deb8u1
  • M
Information Exposure

<51.0.2704.63-1~deb8u1
  • M
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1703

<51.0.2704.79-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • M
Improper Input Validation

<50.0.2661.94-1~deb8u1
  • C
CVE-2016-1662

<50.0.2661.94-1~deb8u1
  • M
Security Features

<50.0.2661.94-1~deb8u1
  • C
CVE-2016-1666

<50.0.2661.94-1~deb8u1
  • H
Out-of-Bounds

<51.0.2704.63-1~deb8u1
  • H
Improper Access Control

<51.0.2704.63-1~deb8u1
  • H
CVE-2016-1663

<50.0.2661.94-1~deb8u1
  • H
Improper Input Validation

<50.0.2661.94-1~deb8u1
  • H
Improper Input Validation

<50.0.2661.94-1~deb8u1
  • M
Race Condition

<51.0.2704.63-1~deb8u1
  • C
CVE-2016-1659

<50.0.2661.75-1~deb8u1
  • H
CVE-2016-1655

<50.0.2661.75-1~deb8u1
  • M
Security Features

<50.0.2661.75-1~deb8u1
  • M
Information Exposure

<50.0.2661.75-1~deb8u1
  • M
Cross-site Scripting (XSS)

<50.0.2661.75-1~deb8u1
  • H
Out-of-Bounds

<50.0.2661.75-1~deb8u1
  • H
Information Exposure

<50.0.2661.75-1~deb8u1
  • M
Improper Input Validation

<50.0.2661.75-1~deb8u1
  • H
Out-of-Bounds

<49.0.2623.108-1~deb8u1
  • H
Out-of-Bounds

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1647

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1648

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1650

<49.0.2623.108-1~deb8u1
  • H
CVE-2016-1644

<49.0.2623.87-1~deb8u1
  • H
Out-of-Bounds

<49.0.2623.87-1~deb8u1
  • H
Time and State

<49.0.2623.87-1~deb8u1
  • C
CVE-2016-1635

<49.0.2623.75-1~deb8u1
  • C
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • M
Improper Access Control

<49.0.2623.75-1~deb8u1
  • H
CVE-2016-1634

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1639

<49.0.2623.75-1~deb8u1
  • H
CVE-2016-1641

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-2843

<49.0.2623.75-1~deb8u1
  • H
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • M
Code

<49.0.2623.75-1~deb8u1
  • H
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • H
Access Restriction Bypass

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1633

<49.0.2623.75-1~deb8u1
  • M
Information Exposure

<49.0.2623.75-1~deb8u1
  • C
CVE-2016-1642

<49.0.2623.75-1~deb8u1
  • H
Improper Input Validation

<49.0.2623.75-1~deb8u1
  • M
Information Exposure

<49.0.2623.75-1~deb8u1
  • C
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • M
Out-of-Bounds

<48.0.2564.116-1~deb8u1
  • M
Out-of-Bounds

<48.0.2564.116-1~deb8u1
  • H
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • H
Out-of-Bounds

<48.0.2564.116-1~deb8u1
  • H
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • M
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • H
Access Restriction Bypass

<48.0.2564.116-1~deb8u1
  • M
Information Exposure

<48.0.2564.82-1~deb8u1
  • M
Information Exposure

<48.0.2564.82-1~deb8u1
  • M
Security Features

<48.0.2564.82-1~deb8u1
  • H
CVE-2016-1613

<48.0.2564.82-1~deb8u1
  • H
CVE-2016-1620

<48.0.2564.82-1~deb8u1
  • H
Out-of-Bounds

<48.0.2564.82-1~deb8u1
  • M
Cryptographic Issues

<48.0.2564.82-1~deb8u1
  • M
Security Features

<48.0.2564.82-1~deb8u1
  • H
Improper Input Validation

<48.0.2564.82-1~deb8u1
  • H
CVE-2016-2052

<48.0.2564.82-1
  • H
Numeric Errors

<47.0.2526.111-1
  • C
CVE-2015-6792

<48.0.2564.82-1~deb8u1
  • H
Race Condition

<47.0.2526.80-1~deb8u1
  • C
CVE-2015-6791

<47.0.2526.80-1~deb8u1
  • M
Improper Input Validation

<47.0.2526.80-1~deb8u1
  • C
CVE-2015-6788

<47.0.2526.80-1~deb8u1
  • C
CVE-2015-8548

<47.0.2526.80-1~deb8u1
  • H
CVE-2015-6774

<47.0.2526.73-1~deb8u1
  • M
CVE-2015-6780

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6775

<47.0.2526.73-1~deb8u1
  • H
Out-of-Bounds

<47.0.2526.73-1
  • M
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6767

<47.0.2526.73-1~deb8u1
  • M
Improper Input Validation

<47.0.2526.73-1~deb8u1
  • C
CVE-2015-6787

<47.0.2526.73-1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6777

<47.0.2526.73-1~deb8u1
  • M
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • C
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • C
Out-of-Bounds

<47.0.2526.73-1
  • M
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • M
Improper Input Validation

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-8478

<47.0.2526-73-1
  • H
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • C
CVE-2015-6765

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
CVE-2015-6766

<47.0.2526.73-1~deb8u1
  • M
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • H
Numeric Errors

<47.0.2526.73-1~deb8u1
  • H
Out-of-Bounds

<47.0.2526.73-1~deb8u1
  • H
Access Restriction Bypass

<47.0.2526.73-1~deb8u1
  • H
Buffer Overflow

<49.0.2623.75-1~deb8u1
  • H
Improper Input Validation

<47.0.2526.73-1~deb8u1
  • H
Security Features

<46.0.2490.71-1~deb8u1
  • M
Race Condition

<46.0.2490.71-1~deb8u1
  • H
Access Restriction Bypass

<46.0.2490.71-1~deb8u1
  • M
Information Exposure

<46.0.2490.71-1~deb8u1
  • H
CVE-2015-6763

<46.0.2490.71-1~deb8u1
  • H
CVE-2015-7834

<46.0.2490.71-1
  • H
CVE-2015-6757

<46.0.2490.71-1~deb8u1
  • H
Code

<46.0.2490.71-1~deb8u1
  • M
CVE-2015-6756

<46.0.2490.71-1~deb8u1
  • M
Code

<46.0.2490.71-1~deb8u1
  • H
Improper Access Control

<46.0.2490.71-1~deb8u1
  • H
Improper Input Validation

<46.0.2490.71-1~deb8u1
  • M
Access Restriction Bypass

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1294

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-6581

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
Access Restriction Bypass

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-6580

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1295

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1301

<45.0.2454.85-1~deb8u1
  • H
Security Features

<45.0.2454.85-1~deb8u1
  • M
Access Restriction Bypass

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • M
Security Features

<45.0.2454.85-1~deb8u1
  • H
CVE-2015-1299

<45.0.2454.85-1~deb8u1
  • M
CVE-2015-1282

<44.0.2403.89-1~deb8u1
  • M
Out-of-Bounds

<44.0.2403.89-1~deb8u1
  • H
Numeric Errors

<44.0.2403.89-1~deb8u1
  • M
Code

<44.0.2403.89-1~deb8u1
  • C
CVE-2015-1276

<44.0.2403.89-1~deb8u1
  • H
CVE-2015-1272

<44.0.2403.89-1~deb8u1
  • M
Numeric Errors

<44.0.2403.89-1~deb8u1
  • H
CVE-2015-1289

<44.0.2403.89-1~deb8u1
  • M
Improper Data Handling

<44.0.2403.89-1~deb8u1
  • H
Improper Input Validation

<44.0.2403.89-1~deb8u1
  • M
Code

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Information Exposure

<44.0.2403.89-1~deb8u1
  • H
CVE-2015-1277

<44.0.2403.89-1~deb8u1
  • H
Out-of-Bounds

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Cross-site Scripting (XSS)

<44.0.2403.89-1~deb8u1
  • M
Out-of-Bounds

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • M
Security Features

<44.0.2403.89-1~deb8u1
  • H
Out-of-Bounds

<42.0.2311.135-1~deb8u1
  • H
Numeric Errors

<42.0.2311.135-1~deb8u1
  • M
CVE-2015-1251

<43.0.2357.65-1~deb8u1
  • H
Improper Access Control

<43.0.2357.65-1~deb8u1
  • M
Cross-site Scripting (XSS)

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1265

<43.0.2357.65-1~deb8u1
  • M
Code

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-3910

<43.0.2357.65-1~deb8u1
  • M
Access Restriction Bypass

<43.0.2357.65-1~deb8u1
  • H
Out-of-Bounds

<43.0.2357.65-1~deb8u1
  • H
Out-of-Bounds

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1256

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1260

<43.0.2357.65-1~deb8u1
  • H
Numeric Errors

<43.0.2357.65-1~deb8u1
  • M
Improper Input Validation

<43.0.2357.65-1~deb8u1
  • H
Code

<43.0.2357.65-1~deb8u1
  • M
CVE-2015-1255

<43.0.2357.65-1~deb8u1
  • H
Code

<43.0.2357.65-1~deb8u1
  • H
CVE-2015-1250

<42.0.2311.135-1~deb8u1
  • H
CVE-2015-1243

<42.0.2311.135-1~deb8u1
  • M
Improper Input Validation

<42.0.2311.90-1~deb8u1
  • M
CVE-2015-1245

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-1249

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-1237

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-3333

<42.0.2311.90-1~deb8u1
  • M
Code

<42.0.2311.90-1~deb8u1
  • H
Out-of-Bounds

<42.0.2311.90-1~deb8u1
  • M
Information Exposure

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Out-of-Bounds

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Out-of-Bounds

<42.0.2311.90-1~deb8u1
  • H
CVE-2015-1242

<42.0.2311.90-1~deb8u1
  • M
Access Restriction Bypass

<42.0.2311.90-1~deb8u1
  • M
Information Exposure

<42.0.2311.90-1~deb8u1
  • H
Code

<41.0.2272.118-1
  • M
Race Condition

<41.0.2272.118-1
  • H
CVE-2015-2238

<41.0.2272.76-1
  • M
Code

<41.0.2272.76-1
  • M
Improper Data Handling