Filtered by vendor Google
Subscribe
Total
10294 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-3110 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
The PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. | |||||
CVE-2011-3111 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Google V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service (invalid read operation) via unspecified vectors. | |||||
CVE-2011-3112 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Use-after-free vulnerability in the PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via an invalid encrypted document. | |||||
CVE-2011-3113 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
The PDF functionality in Google Chrome before 19.0.1084.52 does not properly perform a cast of an unspecified variable during handling of color spaces, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document. | |||||
CVE-2011-3114 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Multiple buffer overflows in the PDF functionality in Google Chrome before 19.0.1084.52 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unknown function calls. | |||||
CVE-2011-3115 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption." | |||||
CVE-2011-3420 | 3 Acer, Google, Samsung | 4 Ac700 Chromebook, Chrome Os, Cr-48 Chromebook and 1 more | 2017-09-18 | 10.0 HIGH | N/A |
Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors. | |||||
CVE-2011-3421 | 3 Acer, Google, Samsung | 4 Ac700 Chromebook, Chrome Os, Cr-48 Chromebook and 1 more | 2017-09-18 | 10.0 HIGH | N/A |
Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors. | |||||
CVE-2011-2599 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome 11 does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader. | |||||
CVE-2011-0778 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 9.0.597.84 does not properly restrict drag and drop operations, which might allow remote attackers to bypass the Same Origin Policy via unspecified vectors. | |||||
CVE-2011-2075 | 2 Google, Microsoft | 2 Chrome, Windows 7 | 2017-09-18 | 9.3 HIGH | N/A |
Unspecified vulnerability in Google Chrome 11.0.696.65 on Windows 7 SP1 allows remote attackers to execute arbitrary code via unknown vectors. NOTE: as of 20110510, the only disclosure is a vague advisory that possibly relates to multiple vulnerabilities or multiple products. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | |||||
CVE-2010-4482 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to bypass the pop-up blocker via unknown vectors. | |||||
CVE-2010-4483 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome before 8.0.552.215 does not properly restrict read access to videos derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via a crafted web site. | |||||
CVE-2010-4484 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Google Chrome before 8.0.552.215 does not properly handle HTML5 databases, which allows attackers to cause a denial of service (application crash) via unspecified vectors. | |||||
CVE-2010-4485 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome before 8.0.552.215 does not properly restrict the generation of file dialogs, which allows remote attackers to cause a denial of service (reduced usability and possible application crash) via a crafted web site. | |||||
CVE-2010-4486 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to history handling. | |||||
CVE-2010-4488 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Google Chrome before 8.0.552.215 does not properly handle HTTP proxy authentication, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | |||||
CVE-2010-4489 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
libvpx, as used in Google Chrome before 8.0.552.215 and possibly other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebM video. NOTE: this vulnerability exists because of a regression. | |||||
CVE-2010-4490 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via malformed video content that triggers an indexing error. | |||||
CVE-2010-4491 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension. |