CVE-2013-2874
10.07.2013, 10:55
Google Chrome before 28.0.1500.71 on Windows, when an Nvidia GPU is used, allows remote attackers to bypass intended restrictions on access to screen data via vectors involving IPC transmission of GL textures.Enginsight
Vendor | Product | Version |
---|---|---|
chrome | 𝑥 ≤ 28.0.1500.70 | |
chrome | 28.0.1500.0 | |
chrome | 28.0.1500.2 | |
chrome | 28.0.1500.3 | |
chrome | 28.0.1500.4 | |
chrome | 28.0.1500.5 | |
chrome | 28.0.1500.6 | |
chrome | 28.0.1500.8 | |
chrome | 28.0.1500.9 | |
chrome | 28.0.1500.10 | |
chrome | 28.0.1500.11 | |
chrome | 28.0.1500.12 | |
chrome | 28.0.1500.13 | |
chrome | 28.0.1500.14 | |
chrome | 28.0.1500.15 | |
chrome | 28.0.1500.16 | |
chrome | 28.0.1500.17 | |
chrome | 28.0.1500.18 | |
chrome | 28.0.1500.19 | |
chrome | 28.0.1500.20 | |
chrome | 28.0.1500.21 | |
chrome | 28.0.1500.22 | |
chrome | 28.0.1500.23 | |
chrome | 28.0.1500.24 | |
chrome | 28.0.1500.25 | |
chrome | 28.0.1500.26 | |
chrome | 28.0.1500.27 | |
chrome | 28.0.1500.28 | |
chrome | 28.0.1500.29 | |
chrome | 28.0.1500.31 | |
chrome | 28.0.1500.32 | |
chrome | 28.0.1500.33 | |
chrome | 28.0.1500.34 | |
chrome | 28.0.1500.35 | |
chrome | 28.0.1500.36 | |
chrome | 28.0.1500.37 | |
chrome | 28.0.1500.38 | |
chrome | 28.0.1500.39 | |
chrome | 28.0.1500.40 | |
chrome | 28.0.1500.41 | |
chrome | 28.0.1500.42 | |
chrome | 28.0.1500.43 | |
chrome | 28.0.1500.44 | |
chrome | 28.0.1500.45 | |
chrome | 28.0.1500.46 | |
chrome | 28.0.1500.47 | |
chrome | 28.0.1500.48 | |
chrome | 28.0.1500.49 | |
chrome | 28.0.1500.50 | |
chrome | 28.0.1500.51 | |
chrome | 28.0.1500.52 | |
chrome | 28.0.1500.53 | |
chrome | 28.0.1500.54 | |
chrome | 28.0.1500.56 | |
chrome | 28.0.1500.58 | |
chrome | 28.0.1500.59 | |
chrome | 28.0.1500.60 | |
chrome | 28.0.1500.61 | |
chrome | 28.0.1500.62 | |
chrome | 28.0.1500.63 | |
chrome | 28.0.1500.64 | |
chrome | 28.0.1500.66 | |
chrome | 28.0.1500.68 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References