Page 643 of 3368 results (0.022 seconds)

CVSS: 5.0EPSS: 0%CPEs: 179EXPL: 0

Google Chrome before 7.0.517.41 does not properly implement the autofill and autocomplete functionality, which allows remote attackers to conduct "profile spamming" attacks via unspecified vectors. Google Chrome anterior a v.7.0.517.41 no implementa adecuadamente la función autofill y autocompletado, permite que atacantes remotos dirijan un ataque "profile spamming" a través de vectores no especificados. • http://code.google.com/p/chromium/issues/detail?id=48225 http://code.google.com/p/chromium/issues/detail?id=51727 http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html http://secunia.com/advisories/41888 http://www.securityfocus.com/bid/44241 http://www.vupen.com/english/advisories/2010/2731 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7159 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Google Chrome before 6.0.472.62 does not properly use information about the origin of a document to manage properties, which allows remote attackers to have an unspecified impact via a crafted web site, related to a "property pollution" issue. Google Chrome anterior a v6.0.472.62 no usa adecuadamente la información sobre el origen de un documento para manejar las propiedades, lo que permite a atacantes remotos tener un impacto no especificado a través de un sitio web manipulado, relacionado con la cuestión "property pollution". • http://code.google.com/p/chromium/issues/detail?id=55350 http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7313 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The SPDY protocol implementation in Google Chrome before 6.0.472.62 does not properly manage buffers, which might allow remote attackers to execute arbitrary code via unspecified vectors. La implementación del protocolo SPDY en Google Chrome anterior a v6.0.472.62 no maneja adecuadamente los búfers. lo que podría permitir a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://code.google.com/p/chromium/issues/detail?id=55119 http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7380 • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.8EPSS: 1%CPEs: 5EXPL: 1

WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3 and Google Chrome before 6.0.472.62, does not properly perform a cast of an unspecified variable, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG element in a non-SVG document. WebKit, tal y como es usado en Safari de Apple anterior a versión 4.1.3 y versiones 5.0.x anteriores a 5.0.3 y Chrome de Google anterior a versión 6.0.472.62, no realiza apropiadamente una conversión de una variable no especificada, que permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo de aplicación) por medio de un elemento SVG en un documento que no sea SVG. • http://code.google.com/p/chromium/issues/detail?id=55114 http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/42314 http://secunia.com/advisories/43068 http://support.apple.com/kb/HT4455 http://support • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 9.7EPSS: 3%CPEs: 2EXPL: 1

Use-after-free vulnerability in WebKit, as used in Apple iTunes before 10.2 on Windows, Apple Safari, and Google Chrome before 6.0.472.59, allows remote attackers to execute arbitrary code or cause a denial of service via vectors related to SVG styles, the DOM tree, and error messages. Vulnerabilidad de usar después de liberar en WebKit, como se utiliza en Google Chrome en versiones anteriores a la v6.0.472.59, permiten a atacantes remotos provocar una denegación de servicio y posiblemente provocar otros daños a través de vectores de ataque relacionados con estilos SVG. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari's Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the methodology the application takes to inform a user about an error while parsing a malformed document. When displaying the error message, the application will append the message to the current instance of the DOM tree causing another element to be removed which will lead to the styles being recalculated. • http://code.google.com/p/chromium/issues/detail?id=50712 http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/43068 http://support.apple.com/kb/HT4554 http://support.apple.com/kb/HT4566 http://www.vupen.com/english/advisories/2011/0212 http://www.zerodayinitiative.com/advisories&#x • CWE-416: Use After Free •