Page 22 of 470 results (0.033 seconds)

CVSS: 8.8EPSS: 1%CPEs: 2EXPL: 0

03 Nov 2020 — Use after free in passwords in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2020/10/chrome-for-android-update_31.html • CWE-416: Use After Free •

CVSS: 9.6EPSS: 1%CPEs: 6EXPL: 0

13 Oct 2020 — Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 0

13 Oct 2020 — Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 0

13 Oct 2020 — Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 0

13 Oct 2020 — Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 0

13 Oct 2020 — Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html • CWE-416: Use After Free •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

23 Sep 2020 — A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM. • http://www.openwall.com/lists/oss-security/2020/09/23/1 •

CVSS: 9.6EPSS: 1%CPEs: 9EXPL: 1

21 Sep 2020 — Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html •

CVSS: 9.6EPSS: 1%CPEs: 9EXPL: 1

21 Sep 2020 — Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00087.html •

CVSS: 9.0EPSS: 3%CPEs: 1EXPL: 1

17 Sep 2020 — A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. • https://github.com/felmoltor • CWE-269: Improper Privilege Management •