Page 81 of 425 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable. En PuTTY, en versiones anteriores a la 0.71 en Windows, los atacantes locales podrían secuestrar la aplicación colocando un archivo de ayuda malicioso en el mismo directorio que el ejecutable. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00020.html https://security.netapp.com/advisory/ntap-20190404-0001 https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 1

An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Un desbordamiento de enteros que provoca un uso de memoria previamente liberada (use-after-free) en WebMIDI en Google Chrome en Windows antes de la versión 73.0.3683.75, permitió que un atacante remoto que había comprometido el proceso del renderizador ejecutara código arbitrario por medio de una página HTML creada. Chrome suffers from a use-after-free vulnerability in MidiManagerWin. • https://www.exploit-db.com/exploits/46570 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/921581 https://access.redhat.com/security/cve/CVE-2019-5789 https://bugzilla.redhat.com/show_bug.cgi?id=1688191 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 1

An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Un desbordamiento de enteros que provoca un uso de memoria previamente liberada (use-after-free) en Blink Storage en Google Chrome sobre Linux antes de la versión 73.0.3683.75, permitió que un atacante remoto que había comprometido el proceso del renderizador ejecutara código arbitrario por medio de una página HTML creada. Chrome suffers from a use-after-free vulnerability in FileSystemOperationRunner. • https://www.exploit-db.com/exploits/46571 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/925864 https://access.redhat.com/security/cve/CVE-2019-5788 https://bugzilla.redhat.com/show_bug.cgi?id=1688190 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 7.5EPSS: 33%CPEs: 5EXPL: 1

Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. La carrera de datos en Extensions Guest View en Google Chrome antes de la versión 73.0.3683.75, permitió a un atacante remoto explotar potencialmente una corrupción de pila por medio de una página HTML creada. There appears to be a race condition in the destruction of the ExtensionsGuestViewMessageFilter if the ProcessIdToFilterMap is modified concurrently in Chrome. • https://www.exploit-db.com/exploits/46566 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/918861 https://access.redhat.com/security/cve/CVE-2019-5796 https://bugzilla.redhat.com/show_bug.cgi?id=1688198 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-787: Out-of-bounds Write •

CVSS: 9.1EPSS: 1%CPEs: 4EXPL: 1

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is an out-of-bounds read in the function bit_read_B at bits.c. Se ha descubierto un problema en las versiones 0.7 y 0.7.1645 de GNU LibreDWG. Hay una lectura fuera de límites en la función bit_read_B en bits.c. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html http://www.securityfocus.com/bid/107447 https://github.com/LibreDWG/libredwg/issues/99 https://savannah.gnu.org/bugs/index.php?55893 • CWE-125: Out-of-bounds Read •