SECURITY ADVISORIES
Vulnerabilities found by Krash Consulting
We independently deliver analysis and root cause reports for vulnerabilities identified within software owned by global conglomerates.
We independently deliver analysis and root cause reports for vulnerabilities identified within software owned by global conglomerates.
We independently deliver analysis and root cause reports for vulnerabilities identified within software owned by global conglomerates.
CVE-2022-0976: Heap buffer overflow in GPU
CVE-2022-0103: Use after free in Swiftshader
CVE-2022-0104: Heap buffer overflow in ANGLE
CVE-2021-4101: Heap buffer overflow in switchshader
CVE-2021-4058: Heap buffer overflow in ANGLE
CVE-2021-23994: Out of bound write due to lazy initialization
CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
CVE-2021-21233: Heap buffer overflow in ANGLE
CVE-2020-16048: Buffer overflow in depth pitch calculations for compressed textures
CVE-2020-26971: Heap buffer overflow in WebGL
CVE-2018-17466: Texture11 Memory Corruption in ANGLE
CVE-2018-16082: Stack buffer overflow in SwiftShader
CVE-2018-6162: Heap buffer overflow in WebGL TexImage3D
CVE-2018-6154: Heap buffer overflow in WebGL FreeIds
CVE-2018-8387: Memory Corruption Vulnerability
CVE-2018-8262: Memory Corruption Vulnerability
CVE-2020-26971: Heap buffer overflow in WebGL
CVE-2018-8163: Information Disclosure – Formula Record
CVE-2018-8162: Remote Code Execution – Formula Record
CVE-2018-4130: Memory Corruption in WebKit webGL
CVE-2018-0796: Remote Code Execution Vulnerability
CVE-2018-6060: Use after free in Blink
CVE-2018-6073: Heap buffer overflow in WebGL
CVE-2017-7845: Buffer overflow when drawing and validating elements with ANGLE library using Direct 3D
CVE-2017-11844: Information Disclosure Vulnerability
CVE-2017-11845: Memory Corruption Vulnerability
CVE-2017-5129: Use after free in WebAudio
CVE-2017-5128: Heap overflow in WebGL
CVE-2017-7845: Buffer overflow when drawing and validating elements with ANGLE
CVE-2015-1240: Out of bounds read in webGL
CVE-2015-1668: CSVGMarkerElement Use-After-Free
CVE-2015-0043: SVG Marker Use-After-Free
CVE-2015-0042: SVG Marker Use-After-Free
CVE-2014-4128: Cell Resizing
CVE-2014-6354: CSVGSVGElement Use-After Free
CVE-2014-4145: CElement
CVE-2014-4050: first-letter Use-After-Free
CVE-2014-0313: Microsoft IE CSS Property / Unicode Character Handling Heap Buffer Overflow
CVE-2014-0263: Direct2D Crafted 2D Geometric
Figure Handling Memory Corruption
CVE-2013-3150: CElement Use-After-Free
CVE-2013-3125: CTreePos Use-After-Free
CVE-2013-3124: SmartDispClient Type Confusion
CVE-2013-3118: CSVGMaskElement Double-Free
CVE-2013-0022: LsGetTrailInfo
CVE-2013-0018: SetCapture
CVE-2012-1538: CFormElement
CVE-2012-1524: Attribute Remove
CVE-2012-0165: Record Type Vulnerability
CVE-2012-0184: Record Memory Corruption Vulnerability
CVE-2012-0142: File Format Memory Corruption in OBJECTLINK Record Vulnerability
CVE-2012-0141: File Format Memory Corruption Vulnerability
CVE-2011-3065: Memory corruption in Skia
CVE-2011-1990: Out of Bounds Array Indexing Vulnerability
CVE-2011-2945:SIPR Heap Buffer Overflow Vulnerability
CVE-2011-1274: Out of Bounds Array Access Vulnerability
CVE-2011-1277: Memory Corruption Vulnerability
CVE-2010-3232: File Format Parsing Vulnerability
CVE-2010-4386: RealMedia Memory Heap Corruption Vulnerability
CVE-2010-4387: RealAudio Codec Memory Corruption Vulnerability
Publication Date | CVE ID | Vendor | Product | Details |
---|---|---|---|---|
21.07.2022 | CVE-2022-0976 | Chrome | See Details | |
12.02.2022 | CVE-2022-0103 | Chrome | See Details | |
12.02.2022 | CVE-2022-0104 | Chrome | See Details | |
11.02.2022 | CVE-2021-4101 | Chrome | See Details | |
23.12.2021 | CVE-2021-4058 | Chrome | See Details | |
24.06.2021 | CVE-2021-23994 | Mozilla | Firefox | See Details |
31.03.2021 | CVE-2021-23981 | Mozilla | Firefox | See Details |
30.04.2021 | CVE-2021-21233 | Chrome | See Details | |
02.11.2021 | CVE-2020-16048 | Angle | See Details | |
07.01.2021 | CVE-2020-26971 | Mozilla | Firefox | See Details |
14.11.2018 | CVE-2018-17466 | Chrome | See Details | |
09.01.2019 | CVE-2018-16082 | Chrome | See Details | |
09.01.2019 | CVE-2018-6162 | Chrome | See Details | |
27.06.2019 | CVE-2018-6154 | Chrome | See Details | |
15.08.2018 | CVE-2018-8387 | Microsoft | Edge | See Details |
11.07.2018 | CVE-2018-8262 | Microsoft | Edge | See Details |
09.05.2018 | CVE-2018-8163 | Microsoft | Excel | See Details |
09.05.2018 | CVE-2018-8162 | Microsoft | Excel | See Details |
03.04.2018 | CVE-2018-4130 | Apple | Safari | See Details |
10.01.2018 | CVE-2018-0796 | Microsoft | Excel | See Details |
14.11.2018 | CVE-2018-6060 | Chrome | See Details | |
14.11.2018 | CVE-2018-6073 | Chrome | See Details | |
11.06.2018 | CVE-2017-7845 | Mozilla | Firefox | See Details |
15.11.2017 | CVE-2017-11844 | Microsoft | Edge | See Details |
15.11.2017 | CVE-2017-11845 | Microsoft | Edge | See Details |
07.02.2018 | CVE-2017-5129 | Chrome | See Details | |
07.02.2018 | CVE-2017-5128 | Chrome | See Details | |
19.04.2015 | CVE-2015-1240 | Debian | Debian_linux | See Details |
14.04.2015 | CVE-2015-1668 | Microsoft | Internet_explorer | See Details |
11.02.2015 | CVE-2015-0043 | Microsoft | Internet_explorer | See Details |
11.02.2015 | CVE-2015-0042 | Microsoft | Internet_explorer | See Details |
15.10.2014 | CVE-2014-4128 | Microsoft | Internet_explorer | See Details |
27.06.2017 | CVE-2014-6354 | Microsoft | Internet_explorer | See Details |
08.02.2018 | CVE-2014-4145 | Microsoft | Internet_explorer | See Details |
12.08.2014 | CVE-2014-4050 | Microsoft | Internet_explorer | See Details |
12.03.2014 | CVE-2014-0313 | Microsoft | Internet_explorer | See Details |
12.02.2014 | CVE-2014-0263 | Microsoft | Windows_7 | See Details |
10.07.2013 | CVE-2013-3150 | Microsoft | Internet_explorer | See Details |
12.06.2013 | CVE-2013-3125 | Microsoft | Internet_explorer | See Details |
12.06.2013 | CVE-2013-3124 | Microsoft | Internet_explorer | See Details |
12.06.2013 | CVE-2013-3118 | Microsoft | Internet_explorer | See Details |
13.02.2013 | CVE-2013-0022 | Microsoft | Internet_explorer | See Details |
13.02.2013 | CVE-2013-0018 | Microsoft | Internet_explorer | See Details |
14.11.2012 | CVE-2012-1538 | Microsoft | Internet_explorer | See Details |
10.07.2012 | CVE-2012-1524 | Microsoft | Internet_explorer | See Details |
09.05.2012 | CVE-2012-0165 | Microsoft | Office | See Details |
09.05.2012 | CVE-2012-0184 | Microsoft | Excel | See Details |
09.05.2012 | CVE-2012-0142 | Microsoft | Excel | See Details |
09.05.2012 | CVE-2012-0141 | Microsoft | Excel | See Details |
30.03.2012 | CVE-2011-3065 | Chrome | See Details | |
15.09.2011 | CVE-2011-1990 | Microsoft | Excel | See Details |
18.08.2011 | CVE-2011-2945 | Realnetworks | Realplayer | See Details |
16.06.2011 | CVE-2011-1274 | Microsoft | Excel | See Details |
16.06.2011 | CVE-2011-1277 | Microsoft | Excel | See Details |
13.10.2010 | CVE-2010-3232 | Microsoft | Excel | See Details |
14.12.2010 | CVE-2010-4386 | Realnetworks | Realplayer | See Details |
14.12.2010 | CVE-2010-4387 | Realnetworks | Realplayer | See Details |
30.12.2011 | CVE-2011-5046 | Microsoft | Windows_7 | See Details |
03.04.2019 | CVE-2018-4261 | Apple | Safari | See Details |
1-8-309, Ronald Ross Road, Begumpet, Hyderabad Telangana, India – 500003
Let’s engage in a strategic discussion on adding value to your organizations security. For prompt action, bypass the wait—connect with us directly. Your objectives, our priority.
©2024 Krash Consulting, All rights reserved