Total vulnerabilities in the database
crosh in Google Chrome OS before 33.0.1750.152 allows attackers to inject commands via unspecified vectors.
Software | From | Fixed in |
---|---|---|
google / chrome_os | 33.0.1750.51 | 33.0.1750.51.x |
google / chrome_os | 33.0.1750.5 | 33.0.1750.5.x |
google / chrome_os | - | 33.0.1750.149.x |
google / chrome_os | 33.0.1750.70 | 33.0.1750.70.x |
google / chrome_os | 33.0.1750.29 | 33.0.1750.29.x |
google / chrome_os | 33.0.1750.2 | 33.0.1750.2.x |
google / chrome_os | 33.0.1750.124 | 33.0.1750.124.x |
google / chrome_os | 33.0.1750.16 | 33.0.1750.16.x |
google / chrome_os | 33.0.1750.58 | 33.0.1750.58.x |
google / chrome_os | 33.0.1750.93 | 33.0.1750.93.x |
google / chrome_os | 33.0.1750.112 | 33.0.1750.112.x |