Page 534 of 3368 results (0.019 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Heap-based buffer overflow in the WebGL subsystem in Google Chrome OS before 23.0.1271.94 allows remote attackers to cause a denial of service (GPU process crash) or possibly have unspecified other impact via unknown vectors. Desbordamiento de búfer en memoria dinámica en el subsistema WebGL en Google Chrome OS antes de v23.0.1271.94, permite a atacantes remotos provocar una denegación de servicio (caída del proceso GPU) o posiblemente tener un impacto no especificado a través de vectores desconocidos. • http://googlechromereleases.blogspot.com/2012/11/stable-update-for-chrome-os_30.html http://www.ubuntu.com/usn/USN-1818-1 https://code.google.com/p/chromium/issues/detail?id=145525 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 2%CPEs: 64EXPL: 0

Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing. Vulnerabilidad de uso después de liberación en Google Chrome antes de v23.0.1271.91 permite a atacantes remotos provocar una denegación de servicio o posiblemente tener otro impacto no especificado a través de vectores relacionados con la impresión. • http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html http://osvdb.org/87886 http://www.securityfocus.com/bid/56684 http://www.securitytracker.com/id?1027815 https://code.google.com/p/chromium/issues/detail?id=159165 https://exchange.xforce.ibmcloud.com/vulnerabilities/80295 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15768 • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 1%CPEs: 64EXPL: 0

Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during handling of the INPUT element, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted HTML document. Google Chrome antes de v23.0.1271.91 no realiza adecuadamente una conversión de una variable específica durante la manipulación del elemento INPUT, lo que permite a atacantes remotos provocar una denegación de servicio o posiblemente otro impacto a través de un documento HTML manipulado. • http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html http://osvdb.org/87885 http://www.securityfocus.com/bid/56684 http://www.securitytracker.com/id?1027815 https://code.google.com/p/chromium/issues/detail?id=159829 https://exchange.xforce.ibmcloud.com/vulnerabilities/80296 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15929 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 63EXPL: 0

Google Chrome before 23.0.1271.91 on Mac OS X does not properly mitigate improper rendering behavior in the Intel GPU driver, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Google Chrome antes de v23.0.1271.91 en Mac OS X no mitiga adecuadamente el comportamiento de representación incorrecta en el controlador de Intel GPU, lo que permite a atacantes remotos provocar una denegación de servicio o posiblemente tener un impacto no especificado a través de vectores desconocidos. • http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html http://osvdb.org/87883 http://www.securitytracker.com/id?1027815 https://code.google.com/p/chromium/issues/detail?id=152746 •

CVSS: 5.0EPSS: 1%CPEs: 64EXPL: 0

Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service (application crash) via a response with chunked transfer coding. Google Chrome anterior a v23.0.1271.91 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de una respuesta con "chunked transfer coding" • http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html http://osvdb.org/87887 http://www.securityfocus.com/bid/56684 http://www.securitytracker.com/id?1027815 https://code.google.com/p/chromium/issues/detail?id=155711 https://exchange.xforce.ibmcloud.com/vulnerabilities/80293 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15040 •