CVE-2013-0921
28.03.2013, 12:18
The Isolated Sites feature in Google Chrome before 26.0.1410.43 does not properly enforce the use of separate processes, which makes it easier for remote attackers to bypass intended access restrictions via a crafted web site.Enginsight
| Vendor | Product | Version |
|---|---|---|
| chrome | 𝑥 ≤ 26.0.1410.42 | |
| chrome | 26.0.1410.0 | |
| chrome | 26.0.1410.1 | |
| chrome | 26.0.1410.2 | |
| chrome | 26.0.1410.3 | |
| chrome | 26.0.1410.4 | |
| chrome | 26.0.1410.5 | |
| chrome | 26.0.1410.6 | |
| chrome | 26.0.1410.7 | |
| chrome | 26.0.1410.8 | |
| chrome | 26.0.1410.9 | |
| chrome | 26.0.1410.10 | |
| chrome | 26.0.1410.11 | |
| chrome | 26.0.1410.12 | |
| chrome | 26.0.1410.14 | |
| chrome | 26.0.1410.15 | |
| chrome | 26.0.1410.16 | |
| chrome | 26.0.1410.17 | |
| chrome | 26.0.1410.18 | |
| chrome | 26.0.1410.19 | |
| chrome | 26.0.1410.20 | |
| chrome | 26.0.1410.21 | |
| chrome | 26.0.1410.22 | |
| chrome | 26.0.1410.23 | |
| chrome | 26.0.1410.24 | |
| chrome | 26.0.1410.25 | |
| chrome | 26.0.1410.26 | |
| chrome | 26.0.1410.27 | |
| chrome | 26.0.1410.28 | |
| chrome | 26.0.1410.29 | |
| chrome | 26.0.1410.30 | |
| chrome | 26.0.1410.31 | |
| chrome | 26.0.1410.32 | |
| chrome | 26.0.1410.33 | |
| chrome | 26.0.1410.34 | |
| chrome | 26.0.1410.35 | |
| chrome | 26.0.1410.36 | |
| chrome | 26.0.1410.37 | |
| chrome | 26.0.1410.38 | |
| chrome | 26.0.1410.39 | |
| chrome | 26.0.1410.40 | |
| chrome | 26.0.1410.41 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References