Filtered by vendor Debian
Subscribe
Total
8236 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-2750 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2017-09-20 | 5.8 MEDIUM | 6.1 MEDIUM |
Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence. | |||||
CVE-2016-10243 | 3 Debian, Fedoraproject, Tug | 3 Debian Linux, Fedora, Tex Live | 2017-09-18 | 7.5 HIGH | 9.8 CRITICAL |
TeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file. | |||||
CVE-2013-2858 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in the HTML5 Audio implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2013-2859 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 27.0.1453.110 allows remote attackers to bypass the Same Origin Policy and trigger namespace pollution via unspecified vectors. | |||||
CVE-2013-2855 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
The Developer Tools API in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2013-2856 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input. | |||||
CVE-2013-2857 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of images. | |||||
CVE-2013-2860 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving access to a database API by a worker process. | |||||
CVE-2013-2861 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in the SVG implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2013-2862 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Skia, as used in Google Chrome before 27.0.1453.110, does not properly handle GPU acceleration, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2013-2863 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 10.0 HIGH | N/A |
Google Chrome before 27.0.1453.110 does not properly handle SSL sockets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | |||||
CVE-2013-2865 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.110 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | |||||
CVE-2013-2867 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 28.0.1500.71 does not properly prevent pop-under windows, which allows remote attackers to have an unspecified impact via a crafted web site. | |||||
CVE-2013-2868 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
common/extensions/sync_helper.cc in Google Chrome before 28.0.1500.71 proceeds with sync operations for NPAPI extensions without checking for a certain plugin permission setting, which might allow remote attackers to trigger unwanted extension changes via unspecified vectors. | |||||
CVE-2013-2869 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted JPEG2000 image. | |||||
CVE-2013-2870 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request. | |||||
CVE-2013-2873 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a 404 HTTP status code during the loading of resources. | |||||
CVE-2013-2876 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
browser/extensions/api/tabs/tabs_api.cc in Google Chrome before 28.0.1500.71 does not properly enforce restrictions on the capture of screenshots by extensions, which allows remote attackers to obtain sensitive information about the content of a previous page via vectors involving an interstitial page. | |||||
CVE-2013-2879 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 5.8 MEDIUM | N/A |
Google Chrome before 28.0.1500.71 does not properly determine the circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site. | |||||
CVE-2013-2881 | 2 Debian, Google | 2 Debian Linux, Chrome | 2017-09-18 | 5.8 MEDIUM | N/A |
Google Chrome before 28.0.1500.95 does not properly handle frames, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. |