[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2017:3245-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":96,"duplicates":97,"related":98,"reserved_at":9,"published_at":140,"modified_at":141,"state":9,"summary":142,"references_raw":144,"kevs":337,"epss":9,"epss_history":338,"metrics":339,"affected":340},"OPENSUSE-SU-2017:3245-1","Security update for chromium\n\nThis update to Chromium 63.0.3239.84 fixes the following security issues:\n\n- CVE-2017-5124: UXSS with MHTML\n- CVE-2017-5125: Heap overflow in Skia\n- CVE-2017-5126: Use after free in PDFium \n- CVE-2017-5127: Use after free in PDFium\n- CVE-2017-5128: Heap overflow in WebGL\n- CVE-2017-5129: Use after free in WebAudio  \n- CVE-2017-5132: Incorrect stack manipulation in WebAssembly.\n- CVE-2017-5130: Heap overflow in libxml2\n- CVE-2017-5131: Out of bounds write in Skia \n- CVE-2017-5133: Out of bounds write in Skia  \n- CVE-2017-15386: UI spoofing in Blink\n- CVE-2017-15387: Content security bypass\n- CVE-2017-15388: Out of bounds read in Skia\n- CVE-2017-15389: URL spoofing in OmniBox\n- CVE-2017-15390: URL spoofing in OmniBox \n- CVE-2017-15391: Extension limitation bypass in Extensions.\n- CVE-2017-15392: Incorrect registry key handling in PlatformIntegration\n- CVE-2017-15393: Referrer leak in Devtools\n- CVE-2017-15394: URL spoofing in extensions UI\n- CVE-2017-15395: Null pointer dereference in ImageCapture\n- CVE-2017-15396: Stack overflow in V8\n- CVE-2017-15398: Stack buffer overflow in QUIC\n- CVE-2017-15399: Use after free in V8\n- CVE-2017-15408: Heap buffer overflow in PDFium\n- CVE-2017-15409: Out of bounds write in Skia\n- CVE-2017-15410: Use after free in PDFium\n- CVE-2017-15411: Use after free in PDFium\n- CVE-2017-15412: Use after free in libXML\n- CVE-2017-15413: Type confusion in WebAssembly\n- CVE-2017-15415: Pointer information disclosure in IPC call\n- CVE-2017-15416: Out of bounds read in Blink\n- CVE-2017-15417: Cross origin information disclosure in Skia\n- CVE-2017-15418: Use of uninitialized value in Skia\n- CVE-2017-15419: Cross origin leak of redirect URL in Blink\n- CVE-2017-15420: URL spoofing in Omnibox\n- CVE-2017-15422: Integer overflow in ICU\n- CVE-2017-15423: Issue with SPAKE implementation in BoringSSL\n- CVE-2017-15424: URL Spoof in Omnibox\n- CVE-2017-15425: URL Spoof in Omnibox\n- CVE-2017-15426: URL Spoof in Omnibox\n- CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox\n    \nThe following tracked bug fixes are included:\n\n- sandbox crash fixes (bsc#1064298)\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62,64,66,68,70,72,74,76,78,80,82,84,86,88,90,92,94],{"_key":15},"CVE-2017-15386",{"_key":17},"CVE-2017-15387",{"_key":19},"CVE-2017-15388",{"_key":21},"CVE-2017-15389",{"_key":23},"CVE-2017-15390",{"_key":25},"CVE-2017-15391",{"_key":27},"CVE-2017-15392",{"_key":29},"CVE-2017-15393",{"_key":31},"CVE-2017-15394",{"_key":33},"CVE-2017-15395",{"_key":35},"CVE-2017-15396",{"_key":37},"CVE-2017-15398",{"_key":39},"CVE-2017-15399",{"_key":41},"CVE-2017-15408",{"_key":43},"CVE-2017-15409",{"_key":45},"CVE-2017-15410",{"_key":47},"CVE-2017-15411",{"_key":49},"CVE-2017-15412",{"_key":51},"CVE-2017-15413",{"_key":53},"CVE-2017-15415",{"_key":55},"CVE-2017-15416",{"_key":57},"CVE-2017-15417",{"_key":59},"CVE-2017-15418",{"_key":61},"CVE-2017-15419",{"_key":63},"CVE-2017-15420",{"_key":65},"CVE-2017-15422",{"_key":67},"CVE-2017-15423",{"_key":69},"CVE-2017-15424",{"_key":71},"CVE-2017-15425",{"_key":73},"CVE-2017-15426",{"_key":75},"CVE-2017-15427",{"_key":77},"CVE-2017-5124",{"_key":79},"CVE-2017-5125",{"_key":81},"CVE-2017-5126",{"_key":83},"CVE-2017-5127",{"_key":85},"CVE-2017-5128",{"_key":87},"CVE-2017-5129",{"_key":89},"CVE-2017-5130",{"_key":91},"CVE-2017-5131",{"_key":93},"CVE-2017-5132",{"_key":95},"CVE-2017-5133",[],[],[99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},{"_key":51},{"_key":53},{"_key":55},{"_key":57},{"_key":59},{"_key":61},{"_key":63},{"_key":65},{"_key":67},{"_key":69},{"_key":71},{"_key":73},{"_key":75},{"_key":77},{"_key":79},{"_key":81},{"_key":83},{"_key":85},{"_key":87},{"_key":89},{"_key":91},{"_key":93},{"_key":95},"2017-12-08T07:34:05Z","2026-02-04T03:15:35.600558Z",{"cisa_kev":143,"cisa_ransomware":143,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[145,151,156,160,164,168,172,177,181,185,189,193,197,201,205,209,213,217,221,225,229,233,237,241,245,249,253,257,261,265,269,273,277,281,285,289,293,297,301,305,309,313,317,321,325,329,333],{"url":146,"sources":147,"tags":149},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VA55NOXRJGNNMP5YTJMI3OWZ75GMEMB2/#VA55NOXRJGNNMP5YTJMI3OWZ75GMEMB2",[148],"osv_suse",[150],"Advisory",{"url":152,"sources":153,"tags":154},"https://bugzilla.suse.com/1064066",[148],[155],"REPORT",{"url":157,"sources":158,"tags":159},"https://bugzilla.suse.com/1064298",[148],[155],{"url":161,"sources":162,"tags":163},"https://bugzilla.suse.com/1065405",[148],[155],{"url":165,"sources":166,"tags":167},"https://bugzilla.suse.com/1066851",[148],[155],{"url":169,"sources":170,"tags":171},"https://bugzilla.suse.com/1071691",[148],[155],{"url":173,"sources":174,"tags":175},"https://www.suse.com/security/cve/CVE-2017-15386",[148],[176],"WEB",{"url":178,"sources":179,"tags":180},"https://www.suse.com/security/cve/CVE-2017-15387",[148],[176],{"url":182,"sources":183,"tags":184},"https://www.suse.com/security/cve/CVE-2017-15388",[148],[176],{"url":186,"sources":187,"tags":188},"https://www.suse.com/security/cve/CVE-2017-15389",[148],[176],{"url":190,"sources":191,"tags":192},"https://www.suse.com/security/cve/CVE-2017-15390",[148],[176],{"url":194,"sources":195,"tags":196},"https://www.suse.com/security/cve/CVE-2017-15391",[148],[176],{"url":198,"sources":199,"tags":200},"https://www.suse.com/security/cve/CVE-2017-15392",[148],[176],{"url":202,"sources":203,"tags":204},"https://www.suse.com/security/cve/CVE-2017-15393",[148],[176],{"url":206,"sources":207,"tags":208},"https://www.suse.com/security/cve/CVE-2017-15394",[148],[176],{"url":210,"sources":211,"tags":212},"https://www.suse.com/security/cve/CVE-2017-15395",[148],[176],{"url":214,"sources":215,"tags":216},"https://www.suse.com/security/cve/CVE-2017-15396",[148],[176],{"url":218,"sources":219,"tags":220},"https://www.suse.com/security/cve/CVE-2017-15398",[148],[176],{"url":222,"sources":223,"tags":224},"https://www.suse.com/security/cve/CVE-2017-15399",[148],[176],{"url":226,"sources":227,"tags":228},"https://www.suse.com/security/cve/CVE-2017-15408",[148],[176],{"url":230,"sources":231,"tags":232},"https://www.suse.com/security/cve/CVE-2017-15409",[148],[176],{"url":234,"sources":235,"tags":236},"https://www.suse.com/security/cve/CVE-2017-15410",[148],[176],{"url":238,"sources":239,"tags":240},"https://www.suse.com/security/cve/CVE-2017-15411",[148],[176],{"url":242,"sources":243,"tags":244},"https://www.suse.com/security/cve/CVE-2017-15412",[148],[176],{"url":246,"sources":247,"tags":248},"https://www.suse.com/security/cve/CVE-2017-15413",[148],[176],{"url":250,"sources":251,"tags":252},"https://www.suse.com/security/cve/CVE-2017-15415",[148],[176],{"url":254,"sources":255,"tags":256},"https://www.suse.com/security/cve/CVE-2017-15416",[148],[176],{"url":258,"sources":259,"tags":260},"https://www.suse.com/security/cve/CVE-2017-15417",[148],[176],{"url":262,"sources":263,"tags":264},"https://www.suse.com/security/cve/CVE-2017-15418",[148],[176],{"url":266,"sources":267,"tags":268},"https://www.suse.com/security/cve/CVE-2017-15419",[148],[176],{"url":270,"sources":271,"tags":272},"https://www.suse.com/security/cve/CVE-2017-15420",[148],[176],{"url":274,"sources":275,"tags":276},"https://www.suse.com/security/cve/CVE-2017-15422",[148],[176],{"url":278,"sources":279,"tags":280},"https://www.suse.com/security/cve/CVE-2017-15423",[148],[176],{"url":282,"sources":283,"tags":284},"https://www.suse.com/security/cve/CVE-2017-15424",[148],[176],{"url":286,"sources":287,"tags":288},"https://www.suse.com/security/cve/CVE-2017-15425",[148],[176],{"url":290,"sources":291,"tags":292},"https://www.suse.com/security/cve/CVE-2017-15426",[148],[176],{"url":294,"sources":295,"tags":296},"https://www.suse.com/security/cve/CVE-2017-15427",[148],[176],{"url":298,"sources":299,"tags":300},"https://www.suse.com/security/cve/CVE-2017-5124",[148],[176],{"url":302,"sources":303,"tags":304},"https://www.suse.com/security/cve/CVE-2017-5125",[148],[176],{"url":306,"sources":307,"tags":308},"https://www.suse.com/security/cve/CVE-2017-5126",[148],[176],{"url":310,"sources":311,"tags":312},"https://www.suse.com/security/cve/CVE-2017-5127",[148],[176],{"url":314,"sources":315,"tags":316},"https://www.suse.com/security/cve/CVE-2017-5128",[148],[176],{"url":318,"sources":319,"tags":320},"https://www.suse.com/security/cve/CVE-2017-5129",[148],[176],{"url":322,"sources":323,"tags":324},"https://www.suse.com/security/cve/CVE-2017-5130",[148],[176],{"url":326,"sources":327,"tags":328},"https://www.suse.com/security/cve/CVE-2017-5131",[148],[176],{"url":330,"sources":331,"tags":332},"https://www.suse.com/security/cve/CVE-2017-5132",[148],[176],{"url":334,"sources":335,"tags":336},"https://www.suse.com/security/cve/CVE-2017-5133",[148],[176],[],[],[],[341],{"ecosystem":342,"name":343,"vendor":344,"product":345,"cpe_part":9,"purl_type":346,"purl_namespace":344,"purl_name":345,"source":9,"versions":347},"SUSE Linux Enterprise","chromium","suse","chromium&distro=SUSE Package Hub 12 SP2","rpm",[348],{"version":349,"is_range":350,"range_type":351,"version_start":9,"version_start_type":9,"version_end":352,"version_end_type":353,"fixed_in":9},"lt63_0_3239_84_40_1",true,"ecosystem","63.0.3239.84-40.1","excluding"]