National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Search Results (Refine Search)

Search Parameters:
  • Contains Software Flaws (CVE)
  • CPE Product Version: cpe:/a:google:chrome:13.0.782.83
There are 1,527 matching records.
Displaying matches 1441 through 1460.
Vuln ID Summary CVSS Severity
CVE-2011-3881

WebKit, as used in Google Chrome before 15.0.874.102 and Android before 4.4, allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors related to (1) the DOMWindow::clear function and use of a selection object, (2) the Object::GetRealNamedPropertyInPrototypeChain function and use of an __proto__ property, (3) the HTMLPlugInImageElement::allowedToLoadFrameURL function and use of a javascript: URL, (4) incorrect origins for XSLT-generated documents in the XSLTProcessor::createDocumentFromSource function, and (5) improper handling of synchronous frame loads in the ScriptController::executeIfJavaScriptURL function.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-3880

Google Chrome before 15.0.874.102 does not prevent use of an unspecified special character as a delimiter in HTTP headers, which has unknown impact and remote attack vectors.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 7.5 HIGH
CVE-2011-3879

Google Chrome before 15.0.874.102 does not prevent redirects to chrome: URLs, which has unspecified impact and remote attack vectors.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 7.5 HIGH
CVE-2011-3878

Race condition in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker process initialization.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 5.1 MEDIUM
CVE-2011-3877

Cross-site scripting (XSS) vulnerability in the appcache internals page in Google Chrome before 15.0.874.102 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 4.3 MEDIUM
CVE-2011-3876

Google Chrome before 15.0.874.102 does not properly handle downloading files that have whitespace characters at the end of a filename, which has unspecified impact and user-assisted remote attack vectors.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-3875

Google Chrome before 15.0.874.102 does not properly handle drag and drop operations on URL strings, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors.

Published: October 25, 2011; 03:55:01 PM -04:00
V2: 4.3 MEDIUM
CVE-2011-2845

Google Chrome before 15.0.874.102 does not properly handle history data, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors.

Published: October 25, 2011; 03:55:00 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-3873

Google Chrome before 14.0.835.202 does not properly implement shader translation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 9.3 HIGH
CVE-2011-2881

Google Chrome before 14.0.835.202 does not properly handle Google V8 hidden objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-2880

Use-after-free vulnerability in Google Chrome before 14.0.835.202 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Google V8 bindings.

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-2879

Google Chrome before 14.0.835.202 does not properly consider object lifetimes and thread safety during the handling of audio nodes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-2878

Google Chrome before 14.0.835.202 does not properly restrict access to the window prototype, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 7.5 HIGH
CVE-2011-2877

Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font."

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-2876

Use-after-free vulnerability in Google Chrome before 14.0.835.202 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a text line box.

Published: October 04, 2011; 04:55:01 PM -04:00
V2: 6.8 MEDIUM
CVE-2011-3234

Google Chrome before 14.0.835.163 does not properly handle boxes, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
V2: 5.0 MEDIUM
CVE-2011-2875

Google V8, as used in Google Chrome before 14.0.835.163, does not properly perform object sealing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."

Published: September 19, 2011; 08:02:56 AM -04:00
V2: 7.5 HIGH
CVE-2011-2874

Google Chrome before 14.0.835.163 does not perform an expected pin operation for a self-signed certificate during a session, which has unspecified impact and remote attack vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
V2: 6.8 MEDIUM
CVE-2011-2864

Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
V2: 5.0 MEDIUM
CVE-2011-2862

Google V8, as used in Google Chrome before 14.0.835.163, does not properly restrict access to built-in objects, which has unspecified impact and remote attack vectors.

Published: September 19, 2011; 08:02:56 AM -04:00
V2: 7.5 HIGH