Filtered by vendor Google
Subscribe
Total
10294 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-1233 | 1 Google | 1 Chrome | 2017-09-18 | 10.0 HIGH | N/A |
Multiple integer overflows in Google Chrome before 4.1.249.1036 allow remote attackers to have an unspecified impact via vectors involving WebKit JavaScript objects. | |||||
CVE-2010-1234 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Unspecified vulnerability in Google Chrome before 4.1.249.1036 allows remote attackers to truncate the URL shown in the HTTP Basic Authentication dialog via unknown vectors. | |||||
CVE-2010-1235 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Unspecified vulnerability in Google Chrome before 4.1.249.1036 allows remote attackers to trigger the omission of a download warning dialog via unknown vectors. | |||||
CVE-2010-1236 | 2 Flock, Google | 2 Flock, Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
The protocolIs function in platform/KURLGoogle.cpp in WebCore in WebKit before r55822, as used in Google Chrome before 4.1.249.1036 and Flock Browser 3.x before 3.0.0.4112, does not properly handle whitespace at the beginning of a URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted javascript: URL, as demonstrated by a \x00javascript:alert sequence. | |||||
CVE-2010-1237 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome 4.1 BETA before 4.1.249.1036 allows remote attackers to cause a denial of service (memory error) or possibly have unspecified other impact via an empty SVG element. | |||||
CVE-2010-1500 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 4.1.249.1059 does not properly support forms, which has unknown impact and attack vectors, related to a "type confusion error." | |||||
CVE-2010-1502 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Unspecified vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to access local files via vectors related to "developer tools." | |||||
CVE-2010-1503 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to inject arbitrary web script or HTML via vectors related to a chrome://net-internals URI. | |||||
CVE-2010-1504 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to inject arbitrary web script or HTML via vectors related to a chrome://downloads URI. | |||||
CVE-2010-1505 | 1 Google | 1 Chrome | 2017-09-18 | 10.0 HIGH | N/A |
Google Chrome before 4.1.249.1059 does not prevent pages from loading with the New Tab page's privileges, which has unknown impact and attack vectors. | |||||
CVE-2010-1506 | 1 Google | 1 Chrome | 2017-09-18 | 7.8 HIGH | N/A |
The Google V8 bindings in Google Chrome before 4.1.249.1059 allow attackers to cause a denial of service (memory corruption) via unknown vectors. | |||||
CVE-2010-1663 | 1 Google | 1 Chrome | 2017-09-18 | 10.0 HIGH | N/A |
The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors. | |||||
CVE-2010-1664 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
Google Chrome before 4.1.249.1064 does not properly handle HTML5 media, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors. | |||||
CVE-2010-1665 | 1 Google | 1 Chrome | 2017-09-18 | 7.5 HIGH | N/A |
Google Chrome before 4.1.249.1064 does not properly handle fonts, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors. | |||||
CVE-2010-1767 | 1 Google | 1 Chrome | 2017-09-18 | 6.8 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in loader/DocumentThreadableLoader.cpp in WebCore in WebKit before r57041, as used in Google Chrome before 4.1.249.1059, allows remote attackers to hijack the authentication of unspecified victims via a crafted synchronous preflight XMLHttpRequest operation. | |||||
CVE-2010-1807 | 3 Apple, Google, Webkitgtk | 3 Safari, Android, Webkitgtk | 2017-09-18 | 9.3 HIGH | N/A |
WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2; Android before 2.2; and webkitgtk before 1.2.6; does not properly validate floating-point data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to non-standard NaN representation. | |||||
CVE-2010-1851 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome, when the Invisible Hand extension is enabled, uses cookies during background HTTP requests in a possibly unexpected manner, which might allow remote web servers to identify specific persons and their product searches via HTTP request logging, related to a "cross-site data leakage" issue. | |||||
CVE-2010-0655 | 1 Google | 1 Chrome | 2017-09-18 | 9.3 HIGH | N/A |
Use-after-free vulnerability in Google Chrome before 4.0.249.78 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving the display of a blocked popup window during navigation to a different web site. | |||||
CVE-2010-0315 | 1 Google | 1 Chrome | 2017-09-18 | 5.0 MEDIUM | N/A |
WebKit before r53607, as used in Google Chrome before 4.0.249.89, allows remote attackers to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and then reading the document.styleSheets[0].href property value, related to an IFRAME element. | |||||
CVE-2010-0643 | 1 Google | 1 Chrome | 2017-09-18 | 4.3 MEDIUM | N/A |
Google Chrome before 4.0.249.89 attempts to make direct connections to web sites when all configured proxy servers are unavailable, which allows remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging, as demonstrated by a proxy server that was configured for the purpose of anonymity. |