Vulnerabilites related to yandex - yandex_browser
CVE-2020-27969 (GCVE-0-2020-27969)
Vulnerability from cvelistv5
Published
2021-09-13 11:44
Modified
2024-08-04 16:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- User Interface (UI) Misrepresentation of Critical Information
Summary
Yandex Browser for Android 20.8.4 allows remote attackers to perform SOP bypass and addresss bar spoofing
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser for Android |
Version: All versions prior to version 20.8.4. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:25:44.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version 20.8.4." } ] } ], "descriptions": [ { "lang": "en", "value": "Yandex Browser for Android 20.8.4 allows remote attackers to perform SOP bypass and addresss bar spoofing" } ], "problemTypes": [ { "descriptions": [ { "description": "User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-13T11:44:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2020-27969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for Android", "version": { "version_data": [ { "version_value": "All versions prior to version 20.8.4." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Browser for Android 20.8.4 allows remote attackers to perform SOP bypass and addresss bar spoofing" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "User Interface (UI) Misrepresentation of Critical Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", "refsource": "MISC", "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2020-27969", "datePublished": "2021-09-13T11:44:01", "dateReserved": "2020-10-28T00:00:00", "dateUpdated": "2024-08-04T16:25:44.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7327 (GCVE-0-2017-7327)
Vulnerability from cvelistv5
Published
2018-01-19 17:00
Modified
2024-09-16 21:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Dll hijacking
Summary
Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for Desktop |
Version: All versions prior to version 17.4.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for Desktop", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "All versions prior to version 17.4.1" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll." } ], "problemTypes": [ { "descriptions": [ { "description": "Dll hijacking", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-19T16:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "DATE_PUBLIC": "2018-01-18T00:00:00", "ID": "CVE-2017-7327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for Desktop", "version": { "version_data": [ { "version_value": "All versions prior to version 17.4.1" } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Dll hijacking" } ] } ] }, "references": { "reference_data": [ { "name": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2017-7327", "datePublished": "2018-01-19T17:00:00Z", "dateReserved": "2017-03-30T00:00:00", "dateUpdated": "2024-09-16T21:57:43.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25255 (GCVE-0-2021-25255)
Vulnerability from cvelistv5
Published
2025-05-21 07:04
Modified
2025-05-21 14:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Yandex Browser Lite for Android prior to version 21.1.0 allows remote attackers to cause a denial of service.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex | Browser Lite |
Version: 21.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-25255", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T14:07:35.324725Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-21T14:07:41.883Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Android" ], "product": "Browser Lite", "vendor": "Yandex", "versions": [ { "status": "affected", "version": "21.1.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Kirtikumar Anandrao Ramchandani" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Yandex Browser Lite for Android prior to version 21.1.0 allows remote attackers to cause a denial of service.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Yandex Browser Lite for Android prior to version 21.1.0 allows remote attackers to cause a denial of service." } ], "impacts": [ { "capecId": "CAPEC-130", "descriptions": [ { "lang": "en", "value": "CAPEC-130 Excessive Allocation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.3, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-21T07:04:02.436Z", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Yandex Browser Lite for Android prior to version 21.1.0 allows remote attackers to cause a denial of service.", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2021-25255", "datePublished": "2025-05-21T07:04:02.436Z", "dateReserved": "2021-01-15T16:29:27.867Z", "dateUpdated": "2025-05-21T14:07:41.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8507 (GCVE-0-2016-8507)
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Insecure pocessing of facetime URL schemes
Summary
Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user's approval and obtain video and audio data from a device via a crafted web site.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for iOS |
Version: before 16.10.0.2357 for iOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-16-10" }, { "name": "96517", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96517" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for iOS", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "before 16.10.0.2357 for iOS" } ] } ], "datePublic": "2017-02-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user\u0027s approval and obtain video and audio data from a device via a crafted web site." } ], "problemTypes": [ { "descriptions": [ { "description": "Insecure pocessing of facetime URL schemes", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-03T10:57:02", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-16-10" }, { "name": "96517", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96517" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for iOS", "version": { "version_data": [ { "version_value": "before 16.10.0.2357 for iOS" } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user\u0027s approval and obtain video and audio data from a device via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure pocessing of facetime URL schemes" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/blog/security-changelogs/fixed-in-version-16-10", "refsource": "CONFIRM", "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-16-10" }, { "name": "96517", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96517" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8507", "datePublished": "2017-03-01T15:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27970 (GCVE-0-2020-27970)
Vulnerability from cvelistv5
Published
2021-09-13 11:46
Modified
2024-08-04 16:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- User Interface (UI) Misrepresentation of Critical Information
Summary
Yandex Browser before 20.10.0 allows remote attackers to spoof the address bar
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser Lite for Android |
Version: All versions prior to version 20.10.0. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:25:44.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser Lite for Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version 20.10.0." } ] } ], "descriptions": [ { "lang": "en", "value": "Yandex Browser before 20.10.0 allows remote attackers to spoof the address bar" } ], "problemTypes": [ { "descriptions": [ { "description": "User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-13T11:46:00", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2020-27970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser Lite for Android", "version": { "version_data": [ { "version_value": "All versions prior to version 20.10.0." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Browser before 20.10.0 allows remote attackers to spoof the address bar" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "User Interface (UI) Misrepresentation of Critical Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", "refsource": "MISC", "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2020-27970", "datePublished": "2021-09-13T11:46:00", "dateReserved": "2020-10-28T00:00:00", "dateUpdated": "2024-08-04T16:25:44.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8504 (GCVE-0-2016-8504)
Vulnerability from cvelistv5
Published
2016-10-26 18:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Profile synchronization form CSRF
Summary
CSRF of synchronization form in Yandex Browser for desktop before version 16.6 could be used by remote attacker to steal saved data in browser profile.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for desktop |
Version: before 16.6 for OSx and Windows |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93924", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93924" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for desktop", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "before 16.6 for OSx and Windows" } ] } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "CSRF of synchronization form in Yandex Browser for desktop before version 16.6 could be used by remote attacker to steal saved data in browser profile." } ], "problemTypes": [ { "descriptions": [ { "description": "Profile synchronization form CSRF", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "name": "93924", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93924" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for desktop", "version": { "version_data": [ { "version_value": "before 16.6 for OSx and Windows" } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CSRF of synchronization form in Yandex Browser for desktop before version 16.6 could be used by remote attacker to steal saved data in browser profile." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Profile synchronization form CSRF" } ] } ] }, "references": { "reference_data": [ { "name": "93924", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93924" }, { "name": "https://browser.yandex.com/security/changelogs/", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8504", "datePublished": "2016-10-26T18:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25261 (GCVE-0-2021-25261)
Vulnerability from cvelistv5
Published
2022-06-15 19:05
Modified
2024-08-03 19:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser (Desktop) |
Version: All versions prior to version 22.5.0.862 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser (Desktop)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version 22.5.0.862" } ] } ], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T19:05:54", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2021-25261", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser (Desktop)", "version": { "version_data": [ { "version_value": "All versions prior to version 22.5.0.862" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", "refsource": "MISC", "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2021-25261", "datePublished": "2022-06-15T19:05:54", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28225 (GCVE-0-2022-28225)
Vulnerability from cvelistv5
Published
2022-06-15 19:10
Modified
2024-08-03 05:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser (Desktop) |
Version: All versions prior to version 22.3.3.684 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser (Desktop)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version 22.3.3.684" } ] } ], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T19:10:32", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2022-28225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser (Desktop)", "version": { "version_data": [ { "version_value": "All versions prior to version 22.3.3.684" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", "refsource": "MISC", "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2022-28225", "datePublished": "2022-06-15T19:10:32", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8503 (GCVE-0-2016-8503)
Vulnerability from cvelistv5
Published
2016-10-26 18:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Password brute-force through Yandex Protect Anti-phishing message
Summary
Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 16.7 to 16.9 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for desktop |
Version: 16.7 to 16.9 for Windows and OSx. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:39.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93921", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93921" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for desktop", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "16.7 to 16.9 for Windows and OSx." } ] } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 16.7 to 16.9 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "Password brute-force through Yandex Protect Anti-phishing message", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "name": "93921", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93921" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8503", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for desktop", "version": { "version_data": [ { "version_value": "16.7 to 16.9 for Windows and OSx." } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 16.7 to 16.9 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Password brute-force through Yandex Protect Anti-phishing message" } ] } ] }, "references": { "reference_data": [ { "name": "93921", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93921" }, { "name": "https://browser.yandex.com/security/changelogs/", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8503", "datePublished": "2016-10-26T18:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:39.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25262 (GCVE-0-2021-25262)
Vulnerability from cvelistv5
Published
2025-05-21 07:07
Modified
2025-05-21 13:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-116 - Improper Encoding or Escaping of Output
Summary
Yandex Browser for Android prior to version 21.3.0 allows remote attackers to perform IDN homograph attack.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-25262", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T13:51:35.327719Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-21T13:51:43.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Android" ], "product": "Browser", "vendor": "Yandex", "versions": [ { "status": "affected", "version": "21.3.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Kirtikumar Anandrao Ramchandani" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Yandex Browser for Android prior to version 21.3.0 allows remote attackers to perform IDN homograph attack." } ], "value": "Yandex Browser for Android prior to version 21.3.0 allows remote attackers to perform IDN homograph attack." } ], "impacts": [ { "capecId": "CAPEC-113", "descriptions": [ { "lang": "en", "value": "CAPEC-113 Interface Manipulation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-21T07:07:29.310Z", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Yandex Browser for Android prior to version 21.3.0 allows remote attackers to perform IDN homograph attack.", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2021-25262", "datePublished": "2025-05-21T07:07:29.310Z", "dateReserved": "2021-01-15T16:29:27.870Z", "dateUpdated": "2025-05-21T13:51:43.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8506 (GCVE-0-2016-8506)
Vulnerability from cvelistv5
Published
2016-10-26 18:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Yandex Browser Translater XSS
Summary
XSS in Yandex Browser Translator in Yandex browser for desktop for versions from 15.12 to 16.2 could be used by remote attacker for evaluation arbitrary javascript code.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for desktop |
Version: 15.12 to 16.2 for OSx and Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "name": "93927", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93927" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for desktop", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "15.12 to 16.2 for OSx and Linux" } ] } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "XSS in Yandex Browser Translator in Yandex browser for desktop for versions from 15.12 to 16.2 could be used by remote attacker for evaluation arbitrary javascript code." } ], "problemTypes": [ { "descriptions": [ { "description": "Yandex Browser Translater XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "name": "93927", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93927" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8506", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for desktop", "version": { "version_data": [ { "version_value": "15.12 to 16.2 for OSx and Linux" } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XSS in Yandex Browser Translator in Yandex browser for desktop for versions from 15.12 to 16.2 could be used by remote attacker for evaluation arbitrary javascript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Yandex Browser Translater XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://browser.yandex.com/security/changelogs/", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/" }, { "name": "93927", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93927" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8506", "datePublished": "2016-10-26T18:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6473 (GCVE-0-2024-6473)
Vulnerability from cvelistv5
Published
2024-09-03 10:35
Modified
2024-09-03 13:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-426 - Untrusted Search Path
Summary
Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "yandex_browser", "vendor": "yandex", "versions": [ { "lessThan": "24.7.1.380", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6473", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T13:50:44.729657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T13:55:15.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Browser", "vendor": "Yandex", "versions": [ { "lessThan": "24.7.1.380", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Doctor Web, Ltd." } ], "datePublic": "2024-09-03T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used.\u003cp\u003e\u003c/p\u003e" } ], "value": "Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.4, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T10:35:59.145Z", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "source": { "discovery": "EXTERNAL" }, "title": "DLL Hijacking in Yandex Browser", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2024-6473", "datePublished": "2024-09-03T10:35:59.145Z", "dateReserved": "2024-07-03T10:56:50.777Z", "dateUpdated": "2024-09-03T13:55:15.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8501 (GCVE-0-2016-8501)
Vulnerability from cvelistv5
Published
2016-10-26 18:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Security WiFi bypass
Summary
Security WiFi bypass in Yandex Browser from version 15.10 to 15.12 allows remote attacker to sniff traffic in open or WEP-protected wi-fi networks despite of special security mechanism is enabled.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser for desktop Versions from 15.10 to 15.12 |
Version: Yandex Browser for desktop Versions from 15.10 to 15.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:39.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93920", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for desktop Versions from 15.10 to 15.12", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Yandex Browser for desktop Versions from 15.10 to 15.12" } ] } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Security WiFi bypass in Yandex Browser from version 15.10 to 15.12 allows remote attacker to sniff traffic in open or WEP-protected wi-fi networks despite of special security mechanism is enabled." } ], "problemTypes": [ { "descriptions": [ { "description": "Security WiFi bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "name": "93920", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for desktop Versions from 15.10 to 15.12", "version": { "version_data": [ { "version_value": "Yandex Browser for desktop Versions from 15.10 to 15.12" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Security WiFi bypass in Yandex Browser from version 15.10 to 15.12 allows remote attacker to sniff traffic in open or WEP-protected wi-fi networks despite of special security mechanism is enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security WiFi bypass" } ] } ] }, "references": { "reference_data": [ { "name": "93920", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93920" }, { "name": "https://browser.yandex.com/security/changelogs/", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8501", "datePublished": "2016-10-26T18:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:39.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7369 (GCVE-0-2020-7369)
Vulnerability from cvelistv5
Published
2020-10-20 16:40
Modified
2024-09-17 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-451 - User Interface (UI) Misrepresentation of Critical Information
Summary
User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex | Yandex Browser |
Version: 20.8.3 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:25:49.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser", "vendor": "Yandex", "versions": [ { "lessThanOrEqual": "20.8.3", "status": "affected", "version": "20.8.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was discovered by Rafay Baloch, and disclosed in accordance with Rapid7\u0027s coordinated vulnerability disclosure policy at https://www.rapid7.com/security/disclosure#zeroday" } ], "datePublic": "2020-10-20T00:00:00", "descriptions": [ { "lang": "en", "value": "User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-451", "description": "CWE-451 User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T16:40:24", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Yandex Browser Address Bar Spooofing", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@rapid7.com", "DATE_PUBLIC": "2020-10-20T13:00:00.000Z", "ID": "CVE-2020-7369", "STATE": "PUBLIC", "TITLE": "Yandex Browser Address Bar Spooofing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "20.8.3", "version_value": "20.8.3" } ] } } ] }, "vendor_name": "Yandex" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was discovered by Rafay Baloch, and disclosed in accordance with Rapid7\u0027s coordinated vulnerability disclosure policy at https://www.rapid7.com/security/disclosure#zeroday" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-451 User Interface (UI) Misrepresentation of Critical Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html", "refsource": "MISC", "url": "https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html" }, { "name": "https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/", "refsource": "MISC", "url": "https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2020-7369", "datePublished": "2020-10-20T16:40:24.201075Z", "dateReserved": "2020-01-21T00:00:00", "dateUpdated": "2024-09-17T01:21:44.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7326 (GCVE-0-2017-7326)
Vulnerability from cvelistv5
Published
2018-01-19 17:00
Modified
2024-09-17 03:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory corruption
Summary
Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for Android |
Version: All versions prior to version 17.4.0.16. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for Android", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "All versions prior to version 17.4.0.16." } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page" } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-19T16:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "DATE_PUBLIC": "2018-01-18T00:00:00", "ID": "CVE-2017-7326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for Android", "version": { "version_data": [ { "version_value": "All versions prior to version 17.4.0.16." } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2017-7326", "datePublished": "2018-01-19T17:00:00Z", "dateReserved": "2017-03-30T00:00:00", "dateUpdated": "2024-09-17T03:37:27.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8508 (GCVE-0-2016-8508)
Vulnerability from cvelistv5
Published
2017-03-01 15:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Yandex Browser Protect mechanism bypass
Summary
Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for desktop |
Version: before 17.1.1.227 for OSx and Windows |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96514", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96514" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-17-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for desktop", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "before 17.1.1.227 for OSx and Windows" } ] } ], "datePublic": "2017-02-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site." } ], "problemTypes": [ { "descriptions": [ { "description": "Yandex Browser Protect mechanism bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-03T10:57:02", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "name": "96514", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96514" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-17-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for desktop", "version": { "version_data": [ { "version_value": "before 17.1.1.227 for OSx and Windows" } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Yandex Browser Protect mechanism bypass" } ] } ] }, "references": { "reference_data": [ { "name": "96514", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96514" }, { "name": "https://yandex.com/blog/security-changelogs/fixed-in-version-17-1", "refsource": "CONFIRM", "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-17-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8508", "datePublished": "2017-03-01T15:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28226 (GCVE-0-2022-28226)
Vulnerability from cvelistv5
Published
2022-06-15 19:06
Modified
2024-08-03 05:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.801 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating temporary files in directory with insecure permissions during Yandex Browser update process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser (Desktop) |
Version: All versions prior to version 22.3.3.801 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser (Desktop)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version 22.3.3.801" } ] } ], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.801 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating temporary files in directory with insecure permissions during Yandex Browser update process." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T19:06:17", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2022-28226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser (Desktop)", "version": { "version_data": [ { "version_value": "All versions prior to version 22.3.3.801" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.801 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating temporary files in directory with insecure permissions during Yandex Browser update process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", "refsource": "MISC", "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2022-28226", "datePublished": "2022-06-15T19:06:17", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8502 (GCVE-0-2016-8502)
Vulnerability from cvelistv5
Published
2016-10-26 18:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Password brute-force through Yandex Protect Anti-phishing message
Summary
Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 15.12.0 to 16.2 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser for desktop |
Version: 15.12.0 to 16.2 for Windows and OSx. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93923", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93923" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser for desktop", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "15.12.0 to 16.2 for Windows and OSx." } ] } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 15.12.0 to 16.2 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "Password brute-force through Yandex Protect Anti-phishing message", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "name": "93923", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93923" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2016-8502", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser for desktop", "version": { "version_data": [ { "version_value": "15.12.0 to 16.2 for Windows and OSx." } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 15.12.0 to 16.2 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Password brute-force through Yandex Protect Anti-phishing message" } ] } ] }, "references": { "reference_data": [ { "name": "93923", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93923" }, { "name": "https://browser.yandex.com/security/changelogs/", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2016-8502", "datePublished": "2016-10-26T18:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7325 (GCVE-0-2017-7325)
Vulnerability from cvelistv5
Published
2018-01-19 17:00
Modified
2024-09-16 22:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Address bar spoofing
Summary
Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex N.V. | Yandex Browser |
Version: All versions prior to version 16.9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-16-9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser", "vendor": "Yandex N.V.", "versions": [ { "status": "affected", "version": "All versions prior to version 16.9.0" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open." } ], "problemTypes": [ { "descriptions": [ { "description": "Address bar spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-19T16:57:01", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-16-9" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "DATE_PUBLIC": "2018-01-18T00:00:00", "ID": "CVE-2017-7325", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser", "version": { "version_data": [ { "version_value": "All versions prior to version 16.9.0" } ] } } ] }, "vendor_name": "Yandex N.V." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Address bar spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://browser.yandex.com/security/changelogs/fixed-in-version-16-9", "refsource": "CONFIRM", "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-16-9" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2017-7325", "datePublished": "2018-01-19T17:00:00Z", "dateReserved": "2017-03-30T00:00:00", "dateUpdated": "2024-09-16T22:36:01.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25263 (GCVE-0-2021-25263)
Vulnerability from cvelistv5
Published
2021-08-17 18:34
Modified
2024-08-03 19:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 21.9.0.390 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating files in directory with insecure permissions during Yandex Browser update process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Yandex Browser (Desktop) |
Version: All versions prior to version 21.9.0.390 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yandex Browser (Desktop)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to version 21.9.0.390" } ] } ], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 21.9.0.390 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating files in directory with insecure permissions during Yandex Browser update process." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T19:06:06", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "browser-security@yandex-team.ru", "ID": "CVE-2021-25263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yandex Browser (Desktop)", "version": { "version_data": [ { "version_value": "All versions prior to version 21.9.0.390" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 21.9.0.390 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating files in directory with insecure permissions during Yandex Browser update process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", "refsource": "MISC", "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ] } } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2021-25263", "datePublished": "2021-08-17T18:34:04", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25254 (GCVE-0-2021-25254)
Vulnerability from cvelistv5
Published
2025-05-21 06:58
Modified
2025-05-21 22:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-116 - Improper Encoding or Escaping of Output
Summary
Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yandex | Browser Lite |
Version: 21.1.0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-25254", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-21T22:09:21.003649Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-21T22:09:29.774Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Android" ], "product": "Browser Lite", "vendor": "Yandex", "versions": [ { "status": "affected", "version": "21.1.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Kirtikumar Anandrao Ramchandani" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar." } ], "value": "Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar." } ], "impacts": [ { "capecId": "CAPEC-113", "descriptions": [ { "lang": "en", "value": "CAPEC-113 Interface Manipulation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.2, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-21T06:58:00.753Z", "orgId": "a51c9250-e584-488d-808b-03e6f1386796", "shortName": "yandex" }, "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar.", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a51c9250-e584-488d-808b-03e6f1386796", "assignerShortName": "yandex", "cveId": "CVE-2021-25254", "datePublished": "2025-05-21T06:58:00.753Z", "dateReserved": "2021-01-15T16:29:27.867Z", "dateUpdated": "2025-05-21T22:09:29.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2016-10-26 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 16.7 to 16.9 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/93921 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93921 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | 16.7.0.3342 | |
yandex | yandex_browser | 16.7.1.20808 | |
yandex | yandex_browser | 16.9.1.1131 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:16.7.0.3342:*:*:*:*:*:*:*", "matchCriteriaId": "B267D322-7F4C-4A0A-8AC1-CC96A4C90581", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:16.7.1.20808:*:*:*:*:*:*:*", "matchCriteriaId": "88EC4B52-B839-4BC2-80F7-04888A9E6A87", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:16.9.1.1131:*:*:*:*:*:*:*", "matchCriteriaId": "44733D7C-849A-4526-BB32-FD41F8B2ABB6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 16.7 to 16.9 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript." }, { "lang": "es", "value": "Yandex Protect de alerta Anti-phishing en Yandex Browser para escritorio desde la versi\u00f3n 16.7 hasta la versi\u00f3n 16.9 podr\u00eda ser utilizado por un atacante remoto para forzar contrase\u00f1as a trav\u00e9s de un ataque de fuerza bruta desde importantes recursos web con JavaScript especial." } ], "id": "CVE-2016-8503", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-26T18:59:04.190", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93921" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-19 17:29
Modified
2024-11-21 03:31
Severity ?
Summary
Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:android:*:*", "matchCriteriaId": "85143647-4C03-4D61-811A-C6029A1A9B04", "versionEndIncluding": "17.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition issue in Yandex Browser for Android before 17.4.0.16 allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page" }, { "lang": "es", "value": "Un problema de condici\u00f3n de carrera en Yandex Browser for Android, en versiones anteriores a la 17.4.0.16, permit\u00eda que un atacante remoto explotase potencialmente una corrupci\u00f3n de memoria mediante una p\u00e1gina HTML manipulada." } ], "id": "CVE-2017-7326", "lastModified": "2024-11-21T03:31:38.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-19T17:29:00.523", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-20 17:15
Modified
2024-11-21 05:37
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Summary
User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020.
References
▶ | URL | Tags | |
---|---|---|---|
cve@rapid7.com | https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ | Exploit, Mitigation, Third Party Advisory | |
cve@rapid7.com | https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/ | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:android:*:*", "matchCriteriaId": "8749B748-DF80-4ACD-8164-ABD646DFCAD1", "versionEndExcluding": "20.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020." }, { "lang": "es", "value": "Una vulnerabilidad de Representaci\u00f3n Inapropiada de la Interfaz de Usuario (UI) de una Informaci\u00f3n Cr\u00edtica en la barra de direcciones del Yandex Browser permite a un atacante ocultar la verdadera fuente de datos tal como se presentaba en el navegador.\u0026#xa0;Este problema afecta a Yandex Browser versi\u00f3n 20.8.3 y versiones anteriores, y se corrigi\u00f3 en la versi\u00f3n 20.8.4 publicada el 1 de octubre de 2020" } ], "id": "CVE-2020-7369", "lastModified": "2024-11-21T05:37:07.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cve@rapid7.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-20T17:15:13.327", "references": [ { "source": "cve@rapid7.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/" }, { "source": "cve@rapid7.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html" } ], "sourceIdentifier": "cve@rapid7.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-451" } ], "source": "cve@rapid7.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-21 07:16
Modified
2025-06-10 15:49
Severity ?
Summary
Yandex Browser for Android prior to version 21.3.0 allows remote attackers to perform IDN homograph attack.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | https://yandex.com/bugbounty/i/hall-of-fame-browser/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * | |
android | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "0135C6B0-3140-4C01-B6E6-BFE83F2FF008", "versionEndExcluding": "21.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser for Android prior to version 21.3.0 allows remote attackers to perform IDN homograph attack." }, { "lang": "es", "value": "Yandex Browser para Android anterior a la versi\u00f3n 21.3.0 permite a atacantes remotos realizar ataques de hom\u00f3grafos IDN." } ], "id": "CVE-2021-25262", "lastModified": "2025-06-10T15:49:44.813", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }, "published": "2025-05-21T07:16:00.653", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-03 11:15
Modified
2024-09-05 14:19
Severity ?
Summary
Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | https://yandex.com/bugbounty/i/hall-of-fame-browser/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04F558A-7FDC-440D-BBCC-4011C9858C1E", "versionEndExcluding": "24.7.1.380", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used." }, { "lang": "es", "value": "El navegador Yandex para escritorio anterior a la versi\u00f3n 24.7.1.380 tiene una vulnerabilidad de secuestro de DLL porque se utiliza una ruta de b\u00fasqueda que no es confiable." } ], "id": "CVE-2024-6473", "lastModified": "2024-09-05T14:19:45.153", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }, "published": "2024-09-03T11:15:15.800", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "browser-security@yandex-team.ru", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-19 17:29
Modified
2024-11-21 03:31
Severity ?
Summary
Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E68E8AC-2E6D-474B-AEED-4A909A093B0F", "versionEndExcluding": "16.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser before 16.9.0 allows remote attackers to spoof the address bar via window.open." }, { "lang": "es", "value": "Yandex Browser, en versiones anteriores a la 16.9.0, permite que atacantes remotos suplanten la barra de direcciones mediante window.open." } ], "id": "CVE-2017-7325", "lastModified": "2024-11-21T03:31:38.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-19T17:29:00.477", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-16-9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-16-9" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-26 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
XSS in Yandex Browser Translator in Yandex browser for desktop for versions from 15.12 to 16.2 could be used by remote attacker for evaluation arbitrary javascript code.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/93927 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93927 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | 15.2.2214.3645 | |
yandex | yandex_browser | 15.4.2272.3429 | |
yandex | yandex_browser | 15.6.2311.5029 | |
yandex | yandex_browser | 15.12.0.6151 | |
yandex | yandex_browser | 15.12.1.6475 | |
yandex | yandex_browser | 16.2.0.3539 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.2.2214.3645:*:*:*:*:*:*:*", "matchCriteriaId": "85BD2680-01D4-4B05-9358-EB550E91A9FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.4.2272.3429:*:*:*:*:*:*:*", "matchCriteriaId": "00F9C181-CEDC-4E2C-8776-31C56B950D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.6.2311.5029:*:*:*:*:*:*:*", "matchCriteriaId": "E8D32042-ECD2-4D04-ADFB-4C45F22E7977", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.12.0.6151:*:*:*:*:*:*:*", "matchCriteriaId": "728028D5-E37F-41A2-BDCF-1F700DB1C313", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.12.1.6475:*:*:*:*:*:*:*", "matchCriteriaId": "02ADC9FA-45D1-4D84-B330-E60D6FCF3680", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:16.2.0.3539:*:*:*:*:*:*:*", "matchCriteriaId": "A340C337-7203-4817-AE86-6B767C03B1F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XSS in Yandex Browser Translator in Yandex browser for desktop for versions from 15.12 to 16.2 could be used by remote attacker for evaluation arbitrary javascript code." }, { "lang": "es", "value": "XSS en Yandex Browser Translator en navegador Yandex para escritorio para versiones desde 15.12 hasta 16.2 podr\u00eda ser usado por atacantes remotos para una evaluaci\u00f3n arbitraria de un c\u00f3digo javascript." } ], "id": "CVE-2016-8506", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-26T18:59:08.533", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93927" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-13 12:15
Modified
2024-11-21 05:22
Severity ?
Summary
Yandex Browser before 20.10.0 allows remote attackers to spoof the address bar
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB6EFFCE-6931-4F35-A007-80506B64EE1A", "versionEndExcluding": "20.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser before 20.10.0 allows remote attackers to spoof the address bar" }, { "lang": "es", "value": "Yandex Browser versiones anteriores a 20.10.0, permite a atacantes remotos falsificar la barra de direcciones" } ], "id": "CVE-2020-27970", "lastModified": "2024-11-21T05:22:07.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-13T12:15:08.703", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-26 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 15.12.0 to 16.2 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/93923 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93923 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | 15.12.0.6151 | |
yandex | yandex_browser | 15.12.1.6475 | |
yandex | yandex_browser | 16.2.0.3539 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.12.0.6151:*:*:*:*:*:*:*", "matchCriteriaId": "728028D5-E37F-41A2-BDCF-1F700DB1C313", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.12.1.6475:*:*:*:*:*:*:*", "matchCriteriaId": "02ADC9FA-45D1-4D84-B330-E60D6FCF3680", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:16.2.0.3539:*:*:*:*:*:*:*", "matchCriteriaId": "A340C337-7203-4817-AE86-6B767C03B1F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Protect Anti-phishing warning in Yandex Browser for desktop from version 15.12.0 to 16.2 could be used by remote attacker for brute-forcing passwords from important web-resource with special JavaScript." }, { "lang": "es", "value": "Alerta Anti-phishing de Yandex Protect en Yandex Browser para escritorio desde la versi\u00f3n 15.12.0 hasta la versi\u00f3n 16.2 podr\u00eda ser utilizada por un atacante remoto para forzar contrase\u00f1as a trav\u00e9s de un ataque de fuerza bruta desde importantes recursos web con un JavaScript especial." } ], "id": "CVE-2016-8502", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-26T18:59:02.250", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93923" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-26 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
CSRF of synchronization form in Yandex Browser for desktop before version 16.6 could be used by remote attacker to steal saved data in browser profile.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/93924 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93924 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "274E14F1-FEB9-45DB-A170-9A7C8C8269EF", "versionEndIncluding": "16.6.1.30165", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CSRF of synchronization form in Yandex Browser for desktop before version 16.6 could be used by remote attacker to steal saved data in browser profile." }, { "lang": "es", "value": "CSRF de forma de sincronizaci\u00f3n en Yandex Browser para escritorio en versiones anteriores a 16.6 podr\u00eda ser usado por atacantes remotos para robar datos guardados en el perfil del navegador." } ], "id": "CVE-2016-8504", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-26T18:59:05.940", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93924" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-21 07:15
Modified
2025-06-10 15:51
Severity ?
Summary
Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | https://yandex.com/bugbounty/i/hall-of-fame-browser/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:lite:android:*:*", "matchCriteriaId": "95A0B10D-4D67-429C-8985-DD8713E555F0", "versionEndExcluding": "21.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar." }, { "lang": "es", "value": "Yandex Browser Lite para Android anterior a 21.1.0 permite a atacantes remotos falsificar la barra de direcciones." } ], "id": "CVE-2021-25254", "lastModified": "2025-06-10T15:51:27.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }, "published": "2025-05-21T07:15:59.357", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-21 07:16
Modified
2025-06-10 15:50
Severity ?
Summary
Yandex Browser Lite for Android prior to version 21.1.0 allows remote attackers to cause a denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | https://yandex.com/bugbounty/i/hall-of-fame-browser/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:lite:android:*:*", "matchCriteriaId": "95A0B10D-4D67-429C-8985-DD8713E555F0", "versionEndExcluding": "21.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser Lite for Android prior to version 21.1.0 allows remote attackers to cause a denial of service." }, { "lang": "es", "value": "Yandex Browser Lite para Android anterior a la versi\u00f3n 21.1.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2021-25255", "lastModified": "2025-06-10T15:50:05.830", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }, "published": "2025-05-21T07:16:00.500", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "browser-security@yandex-team.ru", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-15 20:15
Modified
2024-11-21 06:56
Severity ?
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DC2BB44-C052-426D-9E1F-50D3946962F9", "versionEndExcluding": "22.3.3.684", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process." }, { "lang": "es", "value": "Una vulnerabilidad de privilegio local en Yandex Browser para Windows versiones anteriores 22.3.3.684, permite a un atacante local, con pocos privilegios, ejecutar c\u00f3digo arbitrario con los privilegios SYSTEM a mediante la manipulaci\u00f3n de enlaces simb\u00f3licos al archivo de instalaci\u00f3n durante el proceso de actualizaci\u00f3n de Yandex Browser" } ], "id": "CVE-2022-28225", "lastModified": "2024-11-21T06:56:59.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-15T20:15:17.783", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-17 19:15
Modified
2024-11-21 05:54
Severity ?
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 21.9.0.390 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating files in directory with insecure permissions during Yandex Browser update process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:windows:*:*", "matchCriteriaId": "21AC29BD-6018-46C2-9BE7-225090DDC637", "versionEndExcluding": "21.9.0.390", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 21.9.0.390 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating files in directory with insecure permissions during Yandex Browser update process." }, { "lang": "es", "value": "La vulnerabilidad de privilegios locales en Yandex Browser para Windows anterior a la versi\u00f3n 21.9.0.390 permite a un atacante local, con pocos privilegios, ejecutar c\u00f3digo arbitrario con los privilegios del SISTEMA a trav\u00e9s de la manipulaci\u00f3n de archivos en el directorio con permisos inseguros durante el proceso de actualizaci\u00f3n de Yandex Browser" } ], "id": "CVE-2021-25263", "lastModified": "2024-11-21T05:54:38.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-17T19:15:08.103", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2025-04-20 01:37
Severity ?
Summary
Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/96514 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://yandex.com/blog/security-changelogs/fixed-in-version-17-1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96514 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://yandex.com/blog/security-changelogs/fixed-in-version-17-1 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E04D5E5-9981-434D-9153-193C68643C97", "versionEndExcluding": "17.1.1.227", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site." }, { "lang": "es", "value": "Yandex Browser para escritorio en versiones anteriores a 17.1.1.227 no muestra las advertencias de Protect (similar a Safebrowsing en Chromium) en sitios web con un tipo de contenido especial, lo que podr\u00eda ser usado por atacantes remotos para prevenir la advertencia Protect en su propio sitio web malicioso." } ], "id": "CVE-2016-8508", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-01T15:59:00.353", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96514" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-17-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-17-1" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-19 17:29
Modified
2024-11-21 03:31
Severity ?
Summary
Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A7E9CA-77CE-4BD3-956C-A2D942389061", "versionEndIncluding": "17.4.0.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser installer for Desktop before 17.4.1 has a DLL Hijacking Vulnerability because an untrusted search path is used for dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll or profapi.dll." }, { "lang": "es", "value": "Yandex Browser installer for Desktop en versiones anteriores a la 17.4.1 tiene una vulnerabilidad de secuestro de DLL debido a que se emplea una ruta de b\u00fasqueda no fiable para dnsapi.dll, winmm.dll, ntmarta.dll, cryptbase.dll o profapi.dll." } ], "id": "CVE-2017-7327", "lastModified": "2024-11-21T03:31:38.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-19T17:29:00.570", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/fixed-in-version-17-4" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-15 20:15
Modified
2024-11-21 05:54
Severity ?
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7BAE67-AF47-488D-8252-B712530F284B", "versionEndExcluding": "22.5.0.862", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process." }, { "lang": "es", "value": "Una vulnerabilidad de privilegios locales en Yandex Browser para Windows versiones anteriores a 22.5.0.862 permite a un atacante local, con pocos privilegios, ejecutar c\u00f3digo arbitrario con los privilegios del SISTEMA a trav\u00e9s de la manipulaci\u00f3n de enlaces simb\u00f3licos al archivo de instalaci\u00f3n durante el proceso de actualizaci\u00f3n de Yandex Browser" } ], "id": "CVE-2021-25261", "lastModified": "2024-11-21T05:54:38.350", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-15T20:15:17.093", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-01 15:59
Modified
2025-04-20 01:37
Severity ?
Summary
Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user's approval and obtain video and audio data from a device via a crafted web site.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/96517 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://yandex.com/blog/security-changelogs/fixed-in-version-16-10 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96517 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://yandex.com/blog/security-changelogs/fixed-in-version-16-10 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "92ECBF6C-301C-4B47-BC97-AE9C6B9CAA3B", "versionEndExcluding": "16.10.0.2357", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser for iOS before 16.10.0.2357 does not properly restrict processing of facetime:// URLs, which allows remote attackers to initiate facetime-call without user\u0027s approval and obtain video and audio data from a device via a crafted web site." }, { "lang": "es", "value": "Yandex Browser para iOS en versiones anteriores a 16.10.0.2357 no restringe adecuadamente el procesamiento de URLs de facetime://, lo que permite a atacantes remotos iniciar la llamada cara a cara sin la aprobaci\u00f3n del usuario y obtener datos de v\u00eddeo y audio desde un dispositivo a trav\u00e9s de un sitio web manipulado." } ], "id": "CVE-2016-8507", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-01T15:59:00.320", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96517" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-16-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/blog/security-changelogs/fixed-in-version-16-10" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-13 12:15
Modified
2024-11-21 05:22
Severity ?
Summary
Yandex Browser for Android 20.8.4 allows remote attackers to perform SOP bypass and addresss bar spoofing
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * | |
yandex | yandex_browser | 20.8.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:android:*:*", "matchCriteriaId": "8749B748-DF80-4ACD-8164-ABD646DFCAD1", "versionEndExcluding": "20.8.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:20.8.4:*:*:*:*:android:*:*", "matchCriteriaId": "BC97D657-2A71-43BC-9861-1AC5BE294817", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yandex Browser for Android 20.8.4 allows remote attackers to perform SOP bypass and addresss bar spoofing" }, { "lang": "es", "value": "Yandex Browser para Android versi\u00f3n 20.8.4, permite a atacantes remotos llevar a cabo una omisi\u00f3n del SOP y una suplantaci\u00f3n de la barra de direcciones" } ], "id": "CVE-2020-27969", "lastModified": "2024-11-21T05:22:07.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-13T12:15:07.260", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-15 20:15
Modified
2024-11-21 06:56
Severity ?
Summary
Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.801 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating temporary files in directory with insecure permissions during Yandex Browser update process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A4CFA0-E00D-47DA-A0E6-4C5F7BC85449", "versionEndExcluding": "22.3.3.801", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.801 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating temporary files in directory with insecure permissions during Yandex Browser update process." }, { "lang": "es", "value": "Una vulnerabilidad de privilegio local en Yandex Browser para Windows versiones anteriores a 22.3.3.801, permite a un atacante local, con pocos privilegios, ejecutar c\u00f3digo arbitrario con los privilegios SYSTEM mediante la manipulaci\u00f3n de archivos temporales en el directorio con permisos no seguros durante el proceso de actualizaci\u00f3n de Yandex Browser" } ], "id": "CVE-2022-28226", "lastModified": "2024-11-21T06:56:59.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-15T20:15:17.823", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-26 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Security WiFi bypass in Yandex Browser from version 15.10 to 15.12 allows remote attacker to sniff traffic in open or WEP-protected wi-fi networks despite of special security mechanism is enabled.
References
▶ | URL | Tags | |
---|---|---|---|
browser-security@yandex-team.ru | http://www.securityfocus.com/bid/93920 | Third Party Advisory, VDB Entry | |
browser-security@yandex-team.ru | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93920 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://browser.yandex.com/security/changelogs/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yandex | yandex_browser | 15.10.2454.3845 | |
yandex | yandex_browser | 15.12.0.6151 | |
yandex | yandex_browser | 15.12.1.6475 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.10.2454.3845:*:*:*:*:*:*:*", "matchCriteriaId": "6FAEA553-A29E-4C0D-A27D-D1D8E1C2C2FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.12.0.6151:*:*:*:*:*:*:*", "matchCriteriaId": "728028D5-E37F-41A2-BDCF-1F700DB1C313", "vulnerable": true }, { "criteria": "cpe:2.3:a:yandex:yandex_browser:15.12.1.6475:*:*:*:*:*:*:*", "matchCriteriaId": "02ADC9FA-45D1-4D84-B330-E60D6FCF3680", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Security WiFi bypass in Yandex Browser from version 15.10 to 15.12 allows remote attacker to sniff traffic in open or WEP-protected wi-fi networks despite of special security mechanism is enabled." }, { "lang": "es", "value": "Elusi\u00f3n de Security WiFi en Yandex Browser en versiones desde 15.10 hasta 15.12 permite a atacantes remotos espiar el tr\u00e1fico en redes Wi-Fi abiertas o protegidas por WEP a pesar de que los mecanismos especiales de seguridad est\u00e9n activos." } ], "id": "CVE-2016-8501", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-26T18:59:00.173", "references": [ { "source": "browser-security@yandex-team.ru", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93920" }, { "source": "browser-security@yandex-team.ru", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://browser.yandex.com/security/changelogs/" } ], "sourceIdentifier": "browser-security@yandex-team.ru", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }