Page 54 of 3371 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Use after free in ANGLE in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de memoria previamente liberada en ANGLE en Google Chrome versiones anteriores a 101.0.4951.64, permitía a un atacante remoto explotar potencialmente la corrupción de la pila por medio de una página HTML diseñada. Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. Versi... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_10.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. Un uso de memoria previamente liberada en Sharing en Google Chrome versiones anteriores a 101.0.4951.64 permitía que un atacante remoto que convenciera a un usuario de participar en interacciones específicas de la interfaz de usuario explotara potencialmente la corrupción de la pila por medio de ... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_10.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

28 May 2022 — Use after free in Web UI Diagnostics in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interaction. Un uso de memoria previamente liberada en Web UI Diagnostics en Google Chrome en Chrome OS versiones anteriores a 101.0.4951.64 permitió que un atacante remoto que convenció a un usuario para participar en las interacciones específicas de la interfaz de usuario para ... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_10.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. Un uso de memoria previamente liberada en Indexed DB en Google Chrome versiones anteriores a 102.0.5005.61, permitía a un atacante remoto llevar a cabo una fuga de la caja de arena a través de una página HTML diseñada Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. Ve... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de memoria previamente liberada en ANGLE en Google Chrome versiones anteriores a 102.0.5005.61, permitía a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. Versi... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Use after free in Messaging in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de memoria previamente liberada en Messaging en Google Chrome versiones anteriores a 102.0.5005.61, permitía a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code executio... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. Una aplicación insuficiente de políticas en File System API de Google Chrome versiones anteriores a 102.0.5005.61, permitía a un atacante remoto omitir las restricciones del sistema de archivos por medio de una página HTML diseñada Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could resu... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page. Una implementación inapropiada en Extensions en Google Chrome versiones anteriores a 102.0.5005.61, permitía a un atacante que convenciera a un usuario de instalar una extensión maliciosa para omitir las restricciones de perfil por medio de una página HTML diseñada Multiple vulnerabilities have bee... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Insufficient validation of untrusted input in Data Transfer in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass same origin policy via a crafted clipboard content. Una comprobación insuficiente de las entradas no confiables en Data Transfer en Google Chrome versiones anteriores a 102.0.5005.61, permitía a un atacante remoto omitir la política de mismo origen por medio de un contenido del portapapeles diseñado Multiple vulnerabilities have been found in Chromium and its derivatives, t... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2022 — Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. Una implementación inapropiada es Extensions API en Google Chrome versiones anteriores a 102.0.5005.61, permitía que un atacante que convenciera a un usuario de instalar una extensión maliciosa omitir las restricciones de navegación por medio de una página HTML diseñada Multiple vulnerabilit... • https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html •