Page 664 of 3368 results (0.014 seconds)

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 1

WebKit, as used in Google Chrome before 4.0.249.78 and Apple Safari, allows remote attackers to bypass intended restrictions on popup windows via crafted use of a mouse click event. WebKit, usado en Google Chrome, anterior a v4.0.249.78 y Apple Safari, permite a atacantes remotos evitar las restricciones destinadas a ventanas emergentes mediante el uso de un evento de clic de ratón manipulado. • http://code.google.com/p/chromium/issues/detail?id=3275 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/41856 http://secunia.com/advisories/43068 http://securitytracker.com/id?1023506 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 http://www.securityfoc • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 3%CPEs: 49EXPL: 0

Multiple integer overflows in Skia, as used in Google Chrome before 4.0.249.78, allow remote attackers to execute arbitrary code in the Chrome sandbox or cause a denial of service (memory corruption and application crash) via vectors involving CANVAS elements. Múltiples desbordamientos de enteros en Skia, usado en Google Chrome anterior a v4.0.249.78 , permite a atacantes remotos ejecutar código arbitrario en la zona de seguridad de Chrome (sandbox) o causar una denegación de servicio (corrupción de la memoria y cuelgue de la aplicación) a través de vectores que contienen elementos CANVAS (lienzo). • http://code.google.com/p/chromium/issues/detail?id=24071 http://code.google.com/p/chromium/issues/detail?id=24646 http://code.google.com/p/chromium/issues/detail?id=8864 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://securitytracker.com/id?1023506 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13852 • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

WebKit before r52784, as used in Google Chrome before 4.0.249.78 and Apple Safari before 4.0.5, permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document. WebKit anterior a versión r52784, tal como es usado en Google Chrome anterior a versión 4.0.249.78 y Apple Safari anterior a versión 4.0.5, permite la carga de hojas de estilos CSS de origen cruzado, incluso cuando la descarga de hojas de estilo tiene un tipo MIME incorrecto y el documento de hojas de estilo está malformado, lo que permite a los atacantes remotos obtener información confidencial por medio de un documento especialmente diseñado. • http://code.google.com/p/chromium/issues/detail?id=9877 http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://scarybeastsecurity.blogspot.com/2009/12/generic-cross-browser-cross-domain.html http://secunia.com/advisories/41856 http://secunia.com/advisories/43068 http://securitytracker.com/id?1023506 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http: • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 6%CPEs: 49EXPL: 0

WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence. WebKit anterior r53525, como el usado en Google Chrome anterior v4.0.249.89, permite a atacantes remotos ejecutar código en el sandbox a través de un elemento RUBY malformado, como queda demostrado con la secuencia <ruby>><table><rt>. • http://code.google.com/p/chromium/issues/detail?id=31692 http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/38545 http://secunia.com/advisories/41856 http://secunia.com/advisories/43068 http://securitytracker.com/id?1023583 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http://trac.webkit.org/changeset/53525 http:/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 19%CPEs: 49EXPL: 1

Multiple integer signedness errors in factory.cc in Google V8 before r3560, as used in Google Chrome before 4.0.249.89, allow remote attackers to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays. Multiples errores de enteros sin signo en factory.cc en Google V8 anterior r3560, como el usado en Google Chrome anterior v4.0.249.89, permite a atacantes remotos ejecutar código de su elección en el sandbox de Chrome a través de un uso manipulado de arrays JavaScript. • http://code.google.com/p/chromium/issues/detail?id=31009 http://code.google.com/p/v8/source/detail?r=3560 http://codereview.chromium.org/525064 http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html http://secunia.com/advisories/38545 http://securitytracker.com/id?1023583 http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs http://www.osvdb.org/62316 http://www.securityfocus.com/bid/38177 http://www.vupen.com/english&# • CWE-189: Numeric Errors •