Page 646 of 3364 results (0.014 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

The WebSockets implementation in Google Chrome before 6.0.472.53 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors. La implementación de WebSockets en Google Chrome anterior a v6.0.472.53 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo -NULL- y caída de la aplicación) a través de vectores sin especificar. • http://code.google.com/p/chromium/issues/detail?id=46750 http://code.google.com/p/chromium/issues/detail?id=51846 http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11553 • CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Google Chrome before 6.0.472.53 allows remote attackers to enumerate the set of installed extensions via unknown vectors. Vulnerabilidad sin especificar en Google Chrome anterior a v6.0.472.53 permite a atacantes remotos enumerar el conjunto de extensiones instaladas a través de vectores desconocidos. • http://code.google.com/p/chromium/issues/detail?id=45876 http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12106 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Google Chrome before 6.0.472.53 does not properly restrict the characters in URLs, which allows remote attackers to spoof the appearance of the URL bar via homographic sequences. Google Chrome anterior a v6.0.472.53 no restringe adecuadamente los caracteres en las URLs, lo que podría permitir a atacantes remotos manipular la apariencia de la barra de URL a través de secuencias homográficas • http://code.google.com/p/chromium/issues/detail?id=37201 http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12176 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 8EXPL: 0

WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, does not properly restrict read access to images derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive image data via a crafted web site. Google Chrome anterior a v6.0.472.53 no restringe apropiadamente el acceso de lectura a las imágenes, lo que permite a atacantes remotos evitar la "Same Origin Policy" y obtener información potencialmente sensible a través de vectores sin especificar • http://code.google.com/p/chromium/issues/detail?id=53001 http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/41856 http://secunia.com/advisories/42314 http://secunia.com/advisories/43068 http://secunia&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. La implementación de los permisos de notificación en Google Chrome anterior a v6.0.472.53 permite a atacantes provocar una denegación de servicio (corrupción de memoria) o posiblemente tenga otro impacto sin especificar a través de vectores desconocidos. • http://code.google.com/p/chromium/issues/detail?id=50839 http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11480 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •