Security Severity Ratings: Difference between revisions

Jump to navigation Jump to search
Add scary crashes to the list of sg:critical examples
(oops, my mistake, that's inaccurate)
(Add scary crashes to the list of sg:critical examples)
Line 15: Line 15:
   <p>Launching of arbitrary local application with provided arguments</p>
   <p>Launching of arbitrary local application with provided arguments</p>
   <p>Filetype spoofing where executables can masquerade as benign content types</p>
   <p>Filetype spoofing where executables can masquerade as benign content types</p>
   <p>Installation & execution of plugins/modules with chrome/native privileges, without user consent or via user dialog fatigue</p></td>
   <p>Installation & execution of plugins/modules with chrome/native privileges, without user consent or via user dialog fatigue</p>
  <p>Any crash where random memory or NULL is executed (the top of the stack is not a function)</p>
  <p>Any crash where random memory is accessed (these are usually marked as [sg:critical?] because they are harder to exploit)</p></td>
</tr>
</tr>
<tr>
<tr>
Confirmed users
729

edits

Navigation menu