CVE-2020-16041 – Chrome DataElement Out-Of-Bounds Read
https://notcve.org/view.php?id=CVE-2020-16041
Out of bounds read in networking in Google Chrome prior to 87.0.4280.88 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. Una lectura fuera de límites en networking en Google Chrome versiones anteriores a 87.0.4280.88, permitió a un atacante remoto que había comprometido el proceso del renderizador conseguir información potencialmente confidencial de la memoria del proceso por medio de una página HTML diseñada Chrome suffers from an out-of-bounds read vulnerability in network DataElement struct traits. • http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html https://crbug.com/1151865 • CWE-125: Out-of-bounds Read •
CVE-2020-16012 – Mozilla: Variable time processing of cross-origin images during drawImage calls
https://notcve.org/view.php?id=CVE-2020-16012
Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page. Un filtrado de información de canal lateral en graphics en Google Chrome versiones anteriores a 87.0.4280.66, permitió a un atacante remoto filtrar datos de origen cruzado por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html https://crbug.com/1088224 https://access.redhat.com/security/cve/CVE-2020-16012 https://bugzilla.redhat.com/show_bug.cgi?id=1898732 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •
CVE-2020-16017 – Google Chrome Use-After-Free Vulnerability
https://notcve.org/view.php?id=CVE-2020-16017
Use after free in site isolation in Google Chrome prior to 86.0.4240.198 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Un uso de la memoria previamente liberada en site isolation en Google Chrome versiones anteriores a 86.0.4240.198, permitió a un atacante remoto que había comprometido el proceso del renderizador llevar a cabo potencialmente un escape del sandbox por medio de una página HTML diseñada Google Chrome contains a use-after-free vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html https://crbug.com/1146709 https://access.redhat.com/security/cve/CVE-2020-16017 https://bugzilla.redhat.com/show_bug.cgi?id=1897207 • CWE-416: Use After Free •
CVE-2020-16013 – Google Chromium V8 Incorrect Implementation Vulnerabililty
https://notcve.org/view.php?id=CVE-2020-16013
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Una implementación inapropiada en V8 en Google Chrome versiones anteriores a 86.0.4240.198, permitió a un atacante remoto explotar potencialmente una corrupción de la memoria por medio de una página HTML diseñada Google Chromium V8 Engine contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. • https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html https://crbug.com/1147206 https://access.redhat.com/security/cve/CVE-2020-16013 https://bugzilla.redhat.com/show_bug.cgi?id=1897206 • CWE-358: Improperly Implemented Security Check for Standard CWE-787: Out-of-bounds Write •
CVE-2020-16016 – chromium-browser: Inappropriate implementation in base
https://notcve.org/view.php?id=CVE-2020-16016
Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Una implementación inapropiada en base de Google Chrome versiones anteriores a 86.0.4240.193, permitió a un atacante remoto que había comprometido el proceso del renderizador llevar a cabo potencialmente un escape del sandbox por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_9.html https://crbug.com/1146679 https://access.redhat.com/security/cve/CVE-2020-16016 https://bugzilla.redhat.com/show_bug.cgi?id=1896641 •