Total
3085 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-3105 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element. | |||||
CVE-2011-3114 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Multiple buffer overflows in the PDF functionality in Google Chrome before 19.0.1084.52 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unknown function calls. | |||||
CVE-2011-3113 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
The PDF functionality in Google Chrome before 19.0.1084.52 does not properly perform a cast of an unspecified variable during handling of color spaces, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document. | |||||
CVE-2011-3110 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
The PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. | |||||
CVE-2011-3106 | 1 Google | 1 Chrome | 2017-09-18 | 10.0 HIGH | N/A |
The WebSockets implementation in Google Chrome before 19.0.1084.52 does not properly handle use of SSL, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | |||||
CVE-2011-3107 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 19.0.1084.52 does not properly implement JavaScript bindings for plug-ins, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2011-3103 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google V8, as used in Google Chrome before 19.0.1084.52, does not properly perform garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | |||||
CVE-2011-0778 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 9.0.597.84 does not properly restrict drag and drop operations, which might allow remote attackers to bypass the Same Origin Policy via unspecified vectors. | |||||
CVE-2011-2075 | 2 Google, Microsoft | 2 Chrome, Windows 7 | 2017-09-18 | 9.3 HIGH | N/A |
Unspecified vulnerability in Google Chrome 11.0.696.65 on Windows 7 SP1 allows remote attackers to execute arbitrary code via unknown vectors. NOTE: as of 20110510, the only disclosure is a vague advisory that possibly relates to multiple vulnerabilities or multiple products. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | |||||
CVE-2010-4482 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to bypass the pop-up blocker via unknown vectors. | |||||
CVE-2010-5073 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
The JavaScript implementation in Google Chrome 4 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method. NOTE: this may overlap CVE-2010-5070. | |||||
CVE-2010-4033 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Google Chrome before 7.0.517.41 does not properly implement the autofill and autocomplete functionality, which allows remote attackers to conduct "profile spamming" attacks via unspecified vectors. | |||||
CVE-2010-4034 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Google Chrome before 7.0.517.41 does not properly handle forms, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document. | |||||
CVE-2010-4035 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Google Chrome before 7.0.517.41 does not properly perform autofill operations for forms, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document. | |||||
CVE-2010-4036 | 1 Google | 1 Chrome | 2017-09-18 | 6.8 MEDIUM | N/A |
Google Chrome before 7.0.517.41 does not properly handle the unloading of a page, which allows remote attackers to spoof URLs via unspecified vectors. | |||||
CVE-2010-4037 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Unspecified vulnerability in Google Chrome before 7.0.517.41 allows remote attackers to bypass the pop-up blocker via unknown vectors. | |||||
CVE-2010-5069 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
The Cascading Style Sheets (CSS) implementation in Google Chrome 4 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document. NOTE: this may overlap CVE-2010-2264. | |||||
CVE-2010-4491 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension. | |||||
CVE-2010-4490 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via malformed video content that triggers an indexing error. | |||||
CVE-2010-4489 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
libvpx, as used in Google Chrome before 8.0.552.215 and possibly other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebM video. NOTE: this vulnerability exists because of a regression. |