Page 536 of 3354 results (0.016 seconds)

CVSS: 10.0EPSS: 7%CPEs: 58EXPL: 0

Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors. Vulnerabilidad de uso después de la liberación en la implementación de SVG en WebKit, como el usado en Google Chrome anteriores a v22.0.1229.94, permite a atacantes remotos ejecutar código a través de vectores no determinados. • http://archives.neohapsis.com/archives/bugtraq/2012-11/0012.html http://archives.neohapsis.com/archives/bugtraq/2012-11/0013.html http://blog.chromium.org/2012/10/pwnium-2-results-and-wrap-up_10.html http://code.google.com/p/chromium/issues/detail?id=154983 http://code.google.com/p/chromium/issues/detail?id=154987 http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html http://lists.apple.com/archives/security-announce/2012/Nov/msg00000.html http://lists • CWE-399: Resource Management Errors •

CVSS: 9.6EPSS: 1%CPEs: 1EXPL: 0

The Inter-process Communication (IPC) implementation in Google Chrome before 22.0.1229.94 allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process, a different vulnerability than CVE-2012-5112. La implementación de Inter-process Communication (IPC) en Google Chrome anteriores a v22.0.1229.94 permite a atacantes remotos evitar las restricciones del entorno de ejecución seguro "sandbox" establecidos y escribir en ficheros aprovechando el acceso a procesos de renderizado, es una vulnerabilidad distinta a CVE-2012-5112. • http://blog.chromium.org/2012/10/pwnium-2-results-and-wrap-up_10.html http://code.google.com/p/chromium/issues/detail?id=154983 http://code.google.com/p/chromium/issues/detail?id=154987 http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html http://osvdb.org/86156 http://secunia.com/advisories/50954 https://exchange.xforce.ibmcloud.com/vulnerabilities/79186 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15156 • CWE-269: Improper Privilege Management •

CVSS: 9.3EPSS: 0%CPEs: 56EXPL: 0

Race condition in Google Chrome before 22.0.1229.92 allows remote attackers to execute arbitrary code via vectors related to audio devices. Condición de carrera en Google Chorme antes de v22.0.1229.92, permite a atacantes remotos ejecutar código de su elección a través de vectores relacionados con dispositivos de audio. • http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html https://code.google.com/p/chromium/issues/detail?id=147499 https://exchange.xforce.ibmcloud.com/vulnerabilities/79064 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15651 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 56EXPL: 0

Google Chrome before 22.0.1229.92 does not monitor for crashes of Pepper plug-ins, which has unspecified impact and remote attack vectors. Google Chrome antes de v22.0.1229.92 no monitoriza los bloqueos de complementos Pepper, lo que tiene un impacto no especificado y vectores de ataque remotos. • http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html http://osvdb.org/86121 https://code.google.com/p/chromium/issues/detail?id=151895 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15517 •

CVSS: 7.5EPSS: 0%CPEs: 56EXPL: 0

Skia, as used in Google Chrome before 22.0.1229.92, does not properly render text, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. Skia, como se usa en Google Chrome antes de v22.0.1229.92, no renderiza apropiadamente el texto, lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente tener otros impactos a través de vectores no especificados. • http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html https://code.google.com/p/chromium/issues/detail?id=138208 https://exchange.xforce.ibmcloud.com/vulnerabilities/79063 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15725 •