Total vulnerabilities in the database
The boot implementation in Google Chrome OS before 33.0.1750.152 does not properly consider file persistence, which allows remote attackers to execute arbitrary code via unspecified vectors.
Software | From | Fixed in |
---|---|---|
google / chrome_os | 33.0.1750.51 | 33.0.1750.51.x |
google / chrome_os | 33.0.1750.5 | 33.0.1750.5.x |
google / chrome_os | - | 33.0.1750.149.x |
google / chrome_os | 33.0.1750.70 | 33.0.1750.70.x |
google / chrome_os | 33.0.1750.29 | 33.0.1750.29.x |
google / chrome_os | 33.0.1750.2 | 33.0.1750.2.x |
google / chrome_os | 33.0.1750.124 | 33.0.1750.124.x |
google / chrome_os | 33.0.1750.16 | 33.0.1750.16.x |
google / chrome_os | 33.0.1750.58 | 33.0.1750.58.x |
google / chrome_os | 33.0.1750.93 | 33.0.1750.93.x |
google / chrome_os | 33.0.1750.112 | 33.0.1750.112.x |