National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Search Results (Refine Search)

Search Parameters:
  • Contains Software Flaws (CVE)
  • CPE Product Version: cpe:/a:google:chrome:11.0.696.34
There are 1,596 matching records.
Displaying matches 1461 through 1480.
Vuln ID Summary CVSS Severity
CVE-2011-2881

Google Chrome before 14.0.835.202 does not properly handle Google V8 hidden objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.

Published: October 04, 2011; 04:55:01 PM -04:00
    V2: 6.8 MEDIUM
CVE-2011-2880

Use-after-free vulnerability in Google Chrome before 14.0.835.202 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Google V8 bindings.

Published: October 04, 2011; 04:55:01 PM -04:00
    V2: 6.8 MEDIUM
CVE-2011-2879

Google Chrome before 14.0.835.202 does not properly consider object lifetimes and thread safety during the handling of audio nodes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: October 04, 2011; 04:55:01 PM -04:00
    V2: 6.8 MEDIUM
CVE-2011-2878

Google Chrome before 14.0.835.202 does not properly restrict access to the window prototype, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

Published: October 04, 2011; 04:55:01 PM -04:00
    V2: 7.5 HIGH
CVE-2011-2877

Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font."

Published: October 04, 2011; 04:55:01 PM -04:00
    V2: 6.8 MEDIUM
CVE-2011-2876

Use-after-free vulnerability in Google Chrome before 14.0.835.202 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a text line box.

Published: October 04, 2011; 04:55:01 PM -04:00
    V2: 6.8 MEDIUM
CVE-2011-3234

Google Chrome before 14.0.835.163 does not properly handle boxes, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 5.0 MEDIUM
CVE-2011-2875

Google V8, as used in Google Chrome before 14.0.835.163, does not properly perform object sealing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2874

Google Chrome before 14.0.835.163 does not perform an expected pin operation for a self-signed certificate during a session, which has unspecified impact and remote attack vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 6.8 MEDIUM
CVE-2011-2864

Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 5.0 MEDIUM
CVE-2011-2862

Google V8, as used in Google Chrome before 14.0.835.163, does not properly restrict access to built-in objects, which has unspecified impact and remote attack vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2861

Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 6.8 MEDIUM
CVE-2011-2860

Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2859

Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2858

Google Chrome before 14.0.835.163 does not properly handle triangle arrays, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 5.0 MEDIUM
CVE-2011-2857

Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the focus controller.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2856

Google V8, as used in Google Chrome before 14.0.835.163, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2855

Google Chrome before 14.0.835.163 does not properly handle Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2854

Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing."

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH
CVE-2011-2853

Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.

Published: September 19, 2011; 08:02:56 AM -04:00
    V2: 7.5 HIGH