CVE-2013-6641
https://notcve.org/view.php?id=CVE-2013-6641
Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of the past names map of a FORM element. Vulnerabilidad de uso despues de liberación en la función FormAssociatedElement::formRemovedFromTree en core/html/FormAssociatedElement.cpp en Blink, como es utilizado en Google Chrome anteriores a 32.0.1700.76 en Windows y anteriores a 32.0.1700.77 en Mac OS X y Linux permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado aprovechando el manejo impropio del mapa de últimos nombres de un elemento FORM. • http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html http://www.debian.org/security/2014/dsa-2862 https://chromium.googlesource.com/chromium/blink.git/+/1dfd387bd88cc0ebaef3a2302e72ac1c6101b91b https://code.google.com/p/chromium/issues/detail?id=326854 • CWE-416: Use After Free •
CVE-2013-6646
https://notcve.org/view.php?id=CVE-2013-6646
Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process. Vulnerabilidad de uso despues de liberación en la implementación de Web WOrkers en Google Chrome anteriores a 32.0.1700.76 en Windows y anteriores a 32.0.1700.77 en Mac OS X y Linux permite a atacantes remotos causar una denegación de servicio o posiblemente tener otroimpacto no especificado a través de vectores relacionados con la terminación de un proceso worker. • http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html http://www.debian.org/security/2014/dsa-2862 https://code.google.com/p/chromium/issues/detail?id=249502 https://src.chromium.org/viewvc/chrome?revision=233099&view=revision https://src.chromium.org/viewvc/chrome?revision=233367&view=revision • CWE-416: Use After Free •
CVE-2013-6642
https://notcve.org/view.php?id=CVE-2013-6642
Google Chrome through 32.0.1700.23 on Android allows remote attackers to spoof the address bar via unspecified vectors. Google Chrome hasta la versión 32.0.1700.23 en Android permite a atacantes remotos falsificar la barra de direcciones a través de vectores no especificados. • http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html https://code.google.com/p/chromium/issues/detail?id=324969 •
CVE-2013-6645
https://notcve.org/view.php?id=CVE-2013-6645
Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element. Vulnerabilidad de uso despues de liberación en la función OnWindowRemovingFromRootWindow de content/browser/web_contents/web_contents_view_aura.cc en Google Chrome anteriores a 32.0.1700.76 en Windows y anteriores a 32.0.1700.77 en Mac OS X y Linux permite a atacantes remotos asistidos por usuario causar una denegación de servicio o posiblemente tener otro impacto no especificado a través de vectores que involucran ciertas acciones de imprimir previsualización o cambio de pestaña que interactuan con un elemento de speech input • http://code.google.com/p/chromium/issues/detail?id=320183 http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html http://www.debian.org/security/2014/dsa-2862 https://code.google.com/p/chromium/issues/detail?id=318791 https://src.chromium.org/viewvc/chrome?revision=235302&view=revision • CWE-416: Use After Free •
CVE-2013-6643
https://notcve.org/view.php?id=CVE-2013-6643
The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog. La función OneClickSigninBubbleView::WindowClosing en browser/ui/views/sync/one_click_signin_bubble_view.cc en Google Chrome anteriores a 32.0.1700.78 en Windows y anteriores a 32.0.1700.77 en Mac OS X y Linux permite a atacantes disparar una sincronización con una cuenta Google arbitraria aprovechando el manejo impropio del cerrado de un dialogo de confirmación de acceso no confiable. • http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html http://www.debian.org/security/2014/dsa-2862 https://code.google.com/p/chromium/issues/detail?id=321940 https://src.chromium.org/viewvc/chrome?revision=237115&view=revision • CWE-287: Improper Authentication •