CVE-2020-16020
https://notcve.org/view.php?id=CVE-2020-16020
Inappropriate implementation in cryptohome in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass discretionary access control via a malicious file. Una implementación inapropiada en cryptohome en Google Chrome en ChromeOS versiones anteriores a 87.0.4280.66, permitió a un atacante remoto que había comprometido el proceso del navegador omitir el control de acceso discrecional por medio de un archivo malicioso • https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html https://crbug.com/1139411 •
CVE-2020-16038
https://notcve.org/view.php?id=CVE-2020-16038
Use after free in media in Google Chrome on OS X prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de la memoria previamente liberada en media en Google Chrome en OS X versiones anteriores a 87.0.4280.88, permitió a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html https://crbug.com/1138683 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •
CVE-2020-16024 – Chrome SkBitmapOperations::UnPreMultiply Heap Buffer Overflow
https://notcve.org/view.php?id=CVE-2020-16024
Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Un desbordamiento del búfer de la pila en UI de Google Chrome versiones anteriores a 87.0.4280.66, permitió a un atacante remoto que había comprometido el proceso del renderizador llevar a cabo potencialmente un escape del sandbox por medio de una página HTML diseñada Chrome suffers from a heap buffer overflow vulnerability in SkBitmapOperations::UnPreMultiply. • http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html https://crbug.com/1147430 • CWE-787: Out-of-bounds Write •
CVE-2020-9746 – Exploitable NULL pointer deref could lead to arbitrary code execution
https://notcve.org/view.php?id=CVE-2020-9746
Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and arbitrary code execution. Exploitation of this issue requires an attacker to insert malicious strings in an HTTP response that is by default delivered over TLS/SSL. Adobe Flash Player versión 32.0.0.433 (y anteriores) está afectada por una vulnerabilidad explotable de desreferencia del puntero NULL que podría causar un bloqueo y una ejecución de código arbitraria. Una explotación de este problema requiere que un atacante inserte cadenas maliciosas en una respuesta HTTP que es enviada por defecto a través de TLS/SSL • https://helpx.adobe.com/security/products/flash-player/apsb20-58.html https://access.redhat.com/security/cve/CVE-2020-9746 https://bugzilla.redhat.com/show_bug.cgi?id=1888018 • CWE-476: NULL Pointer Dereference •
CVE-2020-15984 – chromium-browser: Insufficient policy enforcement in Omnibox
https://notcve.org/view.php?id=CVE-2020-15984
Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL. Una aplicación de políticas insuficiente en Omnibox en Google Chrome en iOS anterior a versión 86.0.4240.75, permitía a un atacante remoto falsificar el contenido del Omnibox (barra de URL) por medio de una URL diseñada • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html https://crbug.com/1080395 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5P •