First published: Thu Jul 28 2016(Updated: )
Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
Credit: Ronni Skansing cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | |
openSUSE Backports | =15.0 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-5802 has a high severity rating due to its potential to allow domain spoofing.
To fix CVE-2019-5802, update your browser to version 73.0.3683.75 or later.
CVE-2019-5802 affects Google Chrome versions prior to 73.0.3683.75.
Yes, CVE-2019-5802 can be exploited by a remote attacker through a crafted HTML page.
CVE-2019-5802 impacts Chromium-based browsers, including Google Chrome and certain versions of Chromium.