Page 662 of 3354 results (0.012 seconds)

CVSS: 9.3EPSS: 0%CPEs: 48EXPL: 0

Google Chrome before 4.0.249.78 on Windows does not perform the expected encoding, escaping, and quoting for the URL in the --app argument in a desktop shortcut, which allows user-assisted remote attackers to execute arbitrary programs or obtain sensitive information by tricking a user into creating a crafted shortcut. Google Chrome anterior a v4.0.249.78 en Windows no realiza la codificación esperada, escapando, y entrecomillando para la URL en el argumento --app en un acceso directo de escritorio , lo cual permite a atacantes remotos asistidos por usuarios ejecutar programas a su elección u obtener información sensible engañando a un usuario en la creación de un acceso directo manipulado. • http://code.google.com/p/chromium/issues/detail?id=23693 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://securitytracker.com/id?1023506 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14306 •

CVSS: 4.3EPSS: 0%CPEs: 49EXPL: 0

WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document. WebKit anterior a r51295 , usado en Google Chrome v4.0.249.78, presenta una página de listado de directorio en respuesta a un XMLHttpRequest de una URL file:// que corresponde a un directorio, lo cual permite a los atacantes obtener información sensible o posiblemente tener otro impacto no especificado a través de un documento HTML local manipulado. • http://code.google.com/p/chromium/issues/detail?id=20450 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/41856 http://secunia.com/ • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 47EXPL: 0

The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not initialize the memory locations that will hold bitmap data, which might allow remote attackers to obtain potentially sensitive information from process memory by providing insufficient data, related to use of a (1) thumbnail database or (2) HTML canvas. La función ParamTraits<SkBitmap>::Read en common/common_param_traits.cc en Google Chrome anterior a v4.0.249.78 no inicializa las ubicaciones de memoria que almacenan los datos de mapa de bits lo cual podría permitir a atacantes remotos obtener información potencialmente sensible de la memoria del proceso proporcionando datos insuficientes, relacionados con el uso de una base de datos (1) de miniaturas (thumbnail)o de (2) lienzo HTML. • http://code.google.com/p/chromium/issues/detail?id=31307 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://securitytracker.com/id?1023506 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14002 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 4%CPEs: 47EXPL: 0

Multiple integer overflows in factory.cc in Google V8 before r3560, as used in Google Chrome before 4.0.249.89, allow remote attackers to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays. Multiples errores de enteros sin signo en factory.cc en Google V8 anterior r3560, como el usado en Google Chrome anterior v4.0.249.89, permite a atacantes remotos ejecutar código arbitrario en el Sandbox de Chrome a través de un uso manipulado de arrays JavaScript. • http://code.google.com/p/chromium/issues/detail?id=31009 http://code.google.com/p/v8/source/detail?r=3560 http://codereview.chromium.org/525064 http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html http://secunia.com/advisories/38545 http://securitytracker.com/id?1023583 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http://www.osvdb.org/62316 http://www.securityfocus.com/bid/38177 http://www.vupen.com/english&# • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 0%CPEs: 47EXPL: 0

browser/login/login_prompt.cc in Google Chrome before 4.0.249.89 populates an authentication dialog with credentials that were stored by Password Manager for a different web site, which allows user-assisted remote HTTP servers to obtain sensitive information via a URL that requires authentication, as demonstrated by a URL in the SRC attribute of an IMG element. browser/login/login_prompt.cc en Google Chrome anterior v4.0.249.89 con un diálogo de autenticación con credenciales que fueron almacenadas por Password Manager para sitios web diferentes, permite a servidores HTTP remotos asistidos por usuarios obtener información sensible a través de una URL que requiere autenticación, como quedó demostrado por una URL en el atributo SRC de un elemento IMG. • http://code.google.com/p/chromium/issues/detail?id=32718 http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html http://secunia.com/advisories/38545 http://securitytracker.com/id?1023583 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http://www.osvdb.org/62319 http://www.securityfocus.com/archive/1/509543/100/0/threaded http://www.securityfocus.com/bid/38177 http://www.vsecurity.com/advisory/20100215-1.txt http:/ • CWE-255: Credentials Management Errors •