Page 606 of 3369 results (0.009 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 0

Use-after-free vulnerability in Skia, as used in Google Chrome before 13.0.782.107, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Vulnerabilidad de tipo "usar después de liberar" en Skia, tal como se usa en Google Chrome en versiones anteriores a la 13.0.782.107, permite a atacantes remotos provocar una denegación de servicio o tener otro impacto sin especificar a través de vectores desconocidos. • http://code.google.com/p/chromium/issues/detail?id=87548 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html http://osvdb.org/74246 https://exchange.xforce.ibmcloud.com/vulnerabilities/68958 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14093 • CWE-416: Use After Free •

CVSS: 6.8EPSS: 4%CPEs: 4EXPL: 0

Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to HTML range handling. Vulnerabilidad use-after-free en Google Chrome anterior a v13.0.782.107 permite a atacantes remotos provocar una denegación de servicio o posiblemente tener otro impacto a través de vectores relacionados con el manejo de HTML. • http://code.google.com/p/chromium/issues/detail?id=87925 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html http://osvdb.org/74250 http://support.apple.com/kb/HT4981 http://support.apple.com/kb/HT4999 http://support.apple.com/kb • CWE-416: Use After Free •

CVSS: 6.8EPSS: 11%CPEs: 6EXPL: 0

Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to display box rendering. Vulnerabilidad de tipo "usar después de liberar" en Google Chrome en versiones anteriores a la 13.0.782.107 permite a atacantes remotos provocar una denegación de servicio o tener otro impacto sin especificar a través de vectores relacionados con la visualización del "display box". • http://code.google.com/p/chromium/issues/detail?id=88889 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html http://osvdb.org/74255 http://support.apple.com/kb/HT4981 http://support.apple.com/kb/HT4999 http://support.apple.com/kb • CWE-416: Use After Free •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site. Google Chrome anterior a v13.0.782.107 no restringe adecuadamente el acceso a esquemas internos, esto permite a atacantes remotos modificar un sitio web, lo que provocaría un impacto no especificado. • http://code.google.com/p/chromium/issues/detail?id=87815 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html http://osvdb.org/74248 https://exchange.xforce.ibmcloud.com/vulnerabilities/68960 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14284 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Google Chrome before 13.0.782.107 does not ensure that developer-mode NPAPI extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. Google Chrome anterior a v13.0.782.107 no asegura que en modo desarrolador, las instalaciones de extensión NPAPI han sido confirmadas por un cuadro de diálogo del navegador, lo que hace que sea más fácil para los atacantes remotos modificar la funcionalidad del producto a través de una extensión con un troyano. • http://code.google.com/p/chromium/issues/detail?id=83273 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html http://osvdb.org/74233 https://exchange.xforce.ibmcloud.com/vulnerabilities/68945 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14406 • CWE-20: Improper Input Validation •