Total
3085 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-1808 | 1 Google | 1 Chrome | 2020-05-21 | 6.8 MEDIUM | N/A |
Use-after-free vulnerability in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to incorrect integer calculations during float handling. | |||||
CVE-2011-2818 | 3 Apple, Debian, Google | 5 Iphone Os, Itunes, Safari and 2 more | 2020-05-21 | 6.8 MEDIUM | N/A |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to display box rendering. | |||||
CVE-2011-2793 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media selectors. | |||||
CVE-2011-2791 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
The International Components for Unicode (ICU) functionality in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write. | |||||
CVE-2011-2796 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Use-after-free vulnerability in Skia, as used in Google Chrome before 13.0.782.107, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2011-2803 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly handle Skia paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | |||||
CVE-2011-2797 | 2 Apple, Google | 4 Iphone Os, Itunes, Safari and 1 more | 2020-05-20 | 6.8 MEDIUM | N/A |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to resource caching. | |||||
CVE-2011-2801 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the frame loader. | |||||
CVE-2011-2785 | 1 Google | 1 Chrome | 2020-05-20 | 4.3 MEDIUM | N/A |
The extensions implementation in Google Chrome before 13.0.782.107 does not properly validate the URL for the home page, which allows remote attackers to have an unspecified impact via a crafted extension. | |||||
CVE-2011-2360 | 1 Google | 1 Chrome | 2020-05-20 | 4.3 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not ensure that the user is prompted before download of a dangerous file, which makes it easier for remote attackers to bypass intended content restrictions via a crafted web site. | |||||
CVE-2011-2359 | 3 Apple, Debian, Google | 5 Iphone Os, Itunes, Safari and 2 more | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly track line boxes during rendering, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | |||||
CVE-2011-2783 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not ensure that developer-mode NPAPI extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. | |||||
CVE-2011-2782 | 2 Google, Linux | 2 Chrome, Linux Kernel | 2020-05-20 | 4.3 MEDIUM | N/A |
The drag-and-drop implementation in Google Chrome before 13.0.782.107 on Linux does not properly enforce permissions for files, which allows user-assisted remote attackers to bypass intended access restrictions via unspecified vectors. | |||||
CVE-2011-2358 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. | |||||
CVE-2011-2804 | 1 Google | 1 Chrome | 2020-05-20 | 4.3 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly handle nested functions in PDF documents, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted document. | |||||
CVE-2011-2805 | 2 Apple, Google | 3 Iphone Os, Safari, Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy and conduct script injection attacks via unspecified vectors. | |||||
CVE-2011-2802 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google V8, as used in Google Chrome before 13.0.782.107, does not properly perform const lookups, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted web site. | |||||
CVE-2011-2798 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site. | |||||
CVE-2011-2794 | 1 Google | 1 Chrome | 2020-05-20 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly perform text iteration, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | |||||
CVE-2011-2786 | 1 Google | 1 Chrome | 2020-05-20 | 4.3 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not ensure that the speech-input bubble is shown on the product's screen, which might make it easier for remote attackers to make audio recordings via a crafted web page containing an INPUT element. |