CVE-2010-0647
https://notcve.org/view.php?id=CVE-2010-0647
WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence. WebKit anterior r53525, como el usado en Google Chrome anterior v4.0.249.89, permite a atacantes remotos ejecutar código en el sandbox a través de un elemento RUBY malformado, como queda demostrado con la secuencia <ruby>><table><rt>. • http://code.google.com/p/chromium/issues/detail?id=31692 http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/38545 http://secunia.com/advisories/41856 http://secunia.com/advisories/43068 http://securitytracker.com/id?1023583 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http://trac.webkit.org/changeset/53525 http:/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2010-0656
https://notcve.org/view.php?id=CVE-2010-0656
WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document. WebKit anterior a r51295 , usado en Google Chrome v4.0.249.78, presenta una página de listado de directorio en respuesta a un XMLHttpRequest de una URL file:// que corresponde a un directorio, lo cual permite a los atacantes obtener información sensible o posiblemente tener otro impacto no especificado a través de un documento HTML local manipulado. • http://code.google.com/p/chromium/issues/detail?id=20450 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/41856 http://secunia.com/ • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2009-3933
https://notcve.org/view.php?id=CVE-2009-3933
WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions. WebKit en versiones anteriores a la r50173, tal como se usa en Google Chrome en versiones anteriores a la 3.0.195.32, permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) mediante una página web que llama al método JavaScript setInterval, el cual dispara una incompatibilidad entre las funciones WTF::currentTime y base::Time. • http://code.google.com/p/chromium/issues/detail?id=25892 http://codereview.chromium.org/339039 http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/43068 http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/webkit.gyp?r1=30311&r2=30310 http://src.chromium.org/viewvc/chrome?view=rev&revision=30311 http://trac.webkit.org/changeset/50173 http://www.o • CWE-399: Resource Management Errors •