CVE-2013-0921
28.03.2013, 12:18
The Isolated Sites feature in Google Chrome before 26.0.1410.43 does not properly enforce the use of separate processes, which makes it easier for remote attackers to bypass intended access restrictions via a crafted web site.Enginsight
Vendor | Product | Version |
---|---|---|
chrome | 𝑥 ≤ 26.0.1410.42 | |
chrome | 26.0.1410.0 | |
chrome | 26.0.1410.1 | |
chrome | 26.0.1410.2 | |
chrome | 26.0.1410.3 | |
chrome | 26.0.1410.4 | |
chrome | 26.0.1410.5 | |
chrome | 26.0.1410.6 | |
chrome | 26.0.1410.7 | |
chrome | 26.0.1410.8 | |
chrome | 26.0.1410.9 | |
chrome | 26.0.1410.10 | |
chrome | 26.0.1410.11 | |
chrome | 26.0.1410.12 | |
chrome | 26.0.1410.14 | |
chrome | 26.0.1410.15 | |
chrome | 26.0.1410.16 | |
chrome | 26.0.1410.17 | |
chrome | 26.0.1410.18 | |
chrome | 26.0.1410.19 | |
chrome | 26.0.1410.20 | |
chrome | 26.0.1410.21 | |
chrome | 26.0.1410.22 | |
chrome | 26.0.1410.23 | |
chrome | 26.0.1410.24 | |
chrome | 26.0.1410.25 | |
chrome | 26.0.1410.26 | |
chrome | 26.0.1410.27 | |
chrome | 26.0.1410.28 | |
chrome | 26.0.1410.29 | |
chrome | 26.0.1410.30 | |
chrome | 26.0.1410.31 | |
chrome | 26.0.1410.32 | |
chrome | 26.0.1410.33 | |
chrome | 26.0.1410.34 | |
chrome | 26.0.1410.35 | |
chrome | 26.0.1410.36 | |
chrome | 26.0.1410.37 | |
chrome | 26.0.1410.38 | |
chrome | 26.0.1410.39 | |
chrome | 26.0.1410.40 | |
chrome | 26.0.1410.41 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References