Page 38 of 584 results (0.118 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode. Smarty versiones anteriores a 3.1.39, permite un Escape del Sandbox porque un $smarty.template_object puede ser accedido en el modo sandbox • https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html https://security.gentoo.org/glsa/202105-06 https://www.debian.org/security/2022/dsa-5151 •

CVSS: 9.6EPSS: 0%CPEs: 3EXPL: 0

Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Un uso de la memoria previamente liberada en Navigation en Google Chrome versiones anteriores a 88.0.4324.146, permitía a un atacante remoto que había comprometido el proceso del renderizador llevar a cabo potencialmente un escape del sandbox por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html https://crbug.com/1161705 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ACWYJ74Z3YN2XH4QMUEGNBC3VXX464L https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUQSMNV7INLDDSD3RKI5S5EAULX2QC7P https://security.gentoo.org/glsa/202104-08 • CWE-416: Use After Free •

CVSS: 9.6EPSS: 0%CPEs: 4EXPL: 0

Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. Un uso de la memoria previamente liberada en Payments en Google Chrome en Mac versiones anteriores a 88.0.4324.146, permitía que un atacante remoto pudiera llevar a cabo un escape del sandbox por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html https://crbug.com/1169317 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ACWYJ74Z3YN2XH4QMUEGNBC3VXX464L https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUQSMNV7INLDDSD3RKI5S5EAULX2QC7P https://security.gentoo.org/glsa/202104-08 • CWE-416: Use After Free •

CVSS: 9.6EPSS: 0%CPEs: 2EXPL: 0

Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension. Una implementación inapropiada en DevTools en Google Chrome versiones anteriores a 88.0.4324.96, permitió a un atacante remoto llevar a cabo potencialmente un escape del sandbox por medio de una Extension de Chrome diseñada • https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html https://crbug.com/1128206 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-21132 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file. Un uso de la memoria previamente liberada en DevTools en Google Chrome versiones anteriores a 88.0.4324.96, permitía a un atacante local llevar a cabo potencialmente un escape del sandbox por medio de un archivo diseñado • https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html https://crbug.com/1122487 • CWE-416: Use After Free •