Page 618 of 3368 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Google Chrome before 11.0.696.57 allows remote attackers to bypass the Same Origin Policy via vectors involving blobs. Google Chrome anterior a v11.0.696.57 permite a atacantes remotos evitar la política del mismo origen (Same Origin Policy) a través de vectores que implican blobs • http://code.google.com/p/chromium/issues/detail?id=74653 http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html https://exchange.xforce.ibmcloud.com/vulnerabilities/67145 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14621 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 3%CPEs: 1EXPL: 1

Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors. Vulnerabilidad de tipo usar-después-de-liberar en el proceso GPU de Google Chrome en versiones anteriores a la 10.0.648.205 permite a atacantes remotos ejecutar código arbitrario a partir de vectores desconocidos. • http://code.google.com/p/chromium/issues/detail?id=75629 http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html http://secunia.com/advisories/44141 http://www.securityfocus.com/bid/47377 http://www.securitytracker.com/id?1025377 http://www.vupen.com/english/advisories/2011/1006 https://exchange.xforce.ibmcloud.com/vulnerabilities/66767 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14509 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 2%CPEs: 16EXPL: 0

The Program::getActiveUniformMaxLength function in libGLESv2/Program.cpp in libGLESv2.dll in the WebGLES library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox 4.x before 4.0.1 on Windows and in the GPU process in Google Chrome before 10.0.648.205 on Windows, allows remote attackers to execute arbitrary code via unspecified vectors, related to an "off-by-three" error. La función Program::getActiveUniformMaxLength en el archivo libGLESv2/Program.cpp en la biblioteca libGLESv2.dll en la biblioteca WebGLES en Almost Native Graphics Layer Engine (ANGLE), como es usado en Mozilla Firefox versiones 4.x anteriores a 4.0.1 en Windows y en el proceso GPU en Google Chrome anterior a versión 10.0.648.205 en Windows, permite a los atacantes remotos ejecutar código arbitrario por medio de vectores no especificados, relacionado con un error "off-by-three". • http://code.google.com/p/angleproject/source/detail?r=611 http://code.google.com/p/chromium/issues/detail?id=70070 http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html http://secunia.com/advisories/44141 http://www.mozilla.org/security/announce/2011/mfsa2011-17.html http://www.securityfocus.com/bid/47377 http://www.securitytracker.com/id?1025377 http://www.vupen.com/english/advisories/2011/1006 https://bugzilla.mozilla.org/show_bug.cgi?id=623791 https:/ • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 7%CPEs: 1EXPL: 0

Heap-based buffer overflow in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors. Desbordamiento de buffer en la memoria dinámica en el proceso GPU de Google Chrome en versiones anteriores a la 10.0.648.205 permite a atacantes remotos ejecutar código arbitrario a través de vectores de ataque desconocidos. • http://code.google.com/p/chromium/issues/detail?id=78524 http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html http://secunia.com/advisories/44141 http://www.securityfocus.com/bid/47377 http://www.securitytracker.com/id?1025377 http://www.vupen.com/english/advisories/2011/1006 https://exchange.xforce.ibmcloud.com/vulnerabilities/66768 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14737 • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

The counterToCSSValue function in CSSComputedStyleDeclaration.cpp in the Cascading Style Sheets (CSS) implementation in WebCore in WebKit before r82222, as used in Google Chrome before 11.0.696.43 and other products, does not properly handle access to the (1) counterIncrement and (2) counterReset attributes of CSSStyleDeclaration data provided by a getComputedStyle method call, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted JavaScript code. La función counterToCSSValue en CSSComputedStyleDeclaration.cpp en las Hojas de Estilo en Cascada (CSS) implementada en WebCore en WebKit anterior a r82222, tal como se usa en Google Chrome anterior a v11.0.696.43 y otros productos, no controla correctamente el acceso a los atributos counterIncrement (1) y (2) counterReset de CSSStyleDeclaration proporcionado por una llamada al método getComputedStyle, permitiendo a atacantes remotos provocar una denegación de servicio (desreferencia a puntero NULL y caída de la aplicación) a través de código JavaScript manipulado. • http://code.google.com/p/chromium/issues/detail?id=77665 http://googlechromereleases.blogspot.com/2011/04/beta-channel-update_12.html http://trac.webkit.org/changeset/82222 https://bugs.webkit.org/show_bug.cgi?id=57266 https://exchange.xforce.ibmcloud.com/vulnerabilities/66818 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14365 • CWE-476: NULL Pointer Dereference •