Page 5 of 92 results (0.009 seconds)

CVSS: 6.4EPSS: 0%CPEs: 8EXPL: 0

Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp. Vulnerabilidad en Blink implementado en Google Chrome en versiones anteriores a la 44.0.2403.89, habilita una excepción en el quirks-mode que limita los casos en los que un documento Cascading Style Sheets (CSS) es requerido para obtener el tipo de contenido text/css, lo cual permite a atacantes remotos eludir la política del mismo origen a través de un sitio web manipulado, relacionado con core/fetch/CSSStyleSheetResource.cpp. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=419383 https://security.gentoo.org/glsa/201603-09 https://src.chromium.org/viewvc/blink?revision=195266&am • CWE-17: DEPRECATED: Code •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc. Vulnerabilidad de uso después de liberación de memoria en la implementación de procesos de la GPU en Google Chrome en versiones anteriores a la 44.0.2403.89, permitiendo a atacantes remotos causar una denegación de servicio, o posiblemente tener otro impacto no especificado mediante el aprovechamiento de la disponibilidad permanente de la estructura de datos GPUChannelHost durante el Blink shutdown. Error relacionado con content/browser/gpu/browser_gpu_channel_host_factory.cc y content/renderer/render_thread_impl.cc. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=451456 https://codereview.chromium.org/1128233004 https://codereview.chromium.org/867553003 https://security&# • CWE-416: Use After Free •

CVSS: 6.8EPSS: 1%CPEs: 8EXPL: 0

Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document. Vulnerabilidad de desbordamiento de buffer basada en memoria en j2k.c en OpenJPEG en sus versiones anteriores a r3002, implementado PDFium en Google Chrome en versiones anteriores a la 4.0.2403.89. Permite a atacantes remotos causar una denegación de servicio, o posiblemente tener otro impacto no especificado a través de un dato JPEG2000 inválido en un archivo PDF. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=459215 https://pdfium.googlesource.com/pdfium/+/cddfde0cddbc8467e0d5fa04c30405ee257750fc https://security.gentoo.org&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source. Vulnerabilidad en core/loader/ImageLoader.cpp en Blink implementado en Google Chrome en versiones anteriores a la 44.0.2403.89, no determina adecuadamente el contexto V8 de una micro tarea, lo cual permite a atacantes remotos eludir la restricción de la Política de Seguridad de Contenido, proporcionando una imagen desde una fuente no deseada. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=487155 https://security.gentoo.org/glsa/201603-09 https://src.chromium.org/viewvc/blink?revision=196071&am • CWE-254: 7PK - Security Features •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. Múltiples vulnerabilidades no especificadas en Google Chrome en versiones anteriores a la 44.0.2403.89, permite a atacantes causar una denegación de servicio o posiblemente tener otro impacto no especificado a través de vectores desconocidos. • http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html http://rhn.redhat.com/errata/RHSA-2015-1499.html http://www.debian.org/security/2015/dsa-3315 http://www.securityfocus.com/bid/75973 http://www.securitytracker.com/id/1033031 https://code.google.com/p/chromium/issues/detail?id=512110 https://crbug.com/398235 https://crbug.com/401995 https://crbug.com/404462 https://c •