Page 64 of 1223 results (0.010 seconds)

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Un desbordamiento del búfer de la pila en BFCache en Google Chrome versiones anteriores a 96.0.4664.93, permitía a un atacante remoto que hubiera comprometido el proceso de renderización explotar potencialmente la corrupción de montón por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html https://crbug.com/1272403 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744 https://security.gentoo.org/glsa/202208-25 https://www.debian.org/security/2022/dsa-5046 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Una confusión de tipo en V8 en Google Chrome versiones anteriores a 96.0.4664.93, permitía a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html https://crbug.com/1271456 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744 https://security.gentoo.org/glsa/202208-25 https://www.debian.org/security/2022/dsa-5046 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page. Una comprobación insuficiente de datos en loader en Google Chrome versiones anteriores a 96.0.4664.93, permitía a un atacante remoto filtrar datos de origen cruzado por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html https://crbug.com/1270990 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744 https://security.gentoo.org/glsa/202208-25 https://www.debian.org/security/2022/dsa-5046 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un desbordamiento del búfer de la pila en ANGLE en Google Chrome versiones anteriores a 96.0.4664.93, permitía a un atacante remoto aprovechar una corrupción de la pila por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html https://crbug.com/1267496 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744 https://security.gentoo.org/glsa/202208-25 https://www.debian.org/security/2022/dsa-5046 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 3%CPEs: 4EXPL: 0

Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Un uso de memoria previamente liberada en file API en Google Chrome versiones anteriores a 96.0.4664.93, permitía a un atacante remoto que hubiera comprometido el proceso de renderización explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada Chrome suffers from a heap use-after-free vulnerability in storage::BlobURLStoreImpl::Revoke. • http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html https://crbug.com/1262183 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744 https://security.gentoo.org/glsa/202208-25 https://www.debian.org/security/2022/dsa-5046 • CWE-416: Use After Free •