9.3
CVSSv2

CVE-2012-5108

Published: 09/10/2012 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 830
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Race condition in Google Chrome prior to 22.0.1229.92 allows remote malicious users to execute arbitrary code via vectors related to audio devices.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

google chrome 22.0.1229.60

google chrome 22.0.1229.59

google chrome 22.0.1229.52

google chrome 22.0.1229.51

google chrome 22.0.1229.33

google chrome 22.0.1229.32

google chrome 22.0.1229.24

google chrome 22.0.1229.23

google chrome 22.0.1229.14

google chrome 22.0.1229.12

google chrome 22.0.1229.6

google chrome 22.0.1229.7

google chrome 22.0.1229.65

google chrome 22.0.1229.64

google chrome 22.0.1229.56

google chrome 22.0.1229.55

google chrome 22.0.1229.48

google chrome 22.0.1229.39

google chrome 22.0.1229.28

google chrome 22.0.1229.27

google chrome 22.0.1229.20

google chrome 22.0.1229.18

google chrome 22.0.1229.0

google chrome 22.0.1229.1

google chrome 22.0.1229.2

google chrome 22.0.1229.78

google chrome 22.0.1229.79

google chrome 22.0.1229.76

google chrome 22.0.1229.67

google chrome 22.0.1229.58

google chrome 22.0.1229.57

google chrome 22.0.1229.50

google chrome 22.0.1229.49

google chrome 22.0.1229.31

google chrome 22.0.1229.29

google chrome 22.0.1229.22

google chrome 22.0.1229.21

google chrome 22.0.1229.11

google chrome 22.0.1229.10

google chrome 22.0.1229.8

google chrome 22.0.1229.9

google chrome 22.0.1229.63

google chrome 22.0.1229.62

google chrome 22.0.1229.54

google chrome 22.0.1229.53

google chrome 22.0.1229.37

google chrome 22.0.1229.36

google chrome 22.0.1229.35

google chrome 22.0.1229.26

google chrome 22.0.1229.25

google chrome 22.0.1229.17

google chrome 22.0.1229.16

google chrome 22.0.1229.3

google chrome 22.0.1229.4

google chrome 22.0.1229.89

google chrome

Github Repositories

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, aka a fuzzer It is typically used to test how well a program can withstand malformed and potentially malicious inputs It works by reading sample files of valid data and generating interestringly different outputs from them The main selling points of radamsa are that it has already found a s