National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Search Results (Refine Search)

Search Parameters:
  • Contains Software Flaws (CVE)
  • CPE Product Version: cpe:/a:google:chrome:3.0.195.21
There are 1,821 matching records.
Displaying matches 1721 through 1740.
Vuln ID Summary CVSS Severity
CVE-2010-3413

Unspecified vulnerability in the pop-up blocking functionality in Google Chrome before 6.0.472.59 allows remote attackers to cause a denial of service (application crash) via unknown vectors.

Published: September 16, 2010; 05:00:02 PM -04:00
V2: 5.0 MEDIUM
CVE-2010-3412

Race condition in the console implementation in Google Chrome before 6.0.472.59 has unspecified impact and attack vectors.

Published: September 16, 2010; 05:00:02 PM -04:00
V2: 9.3 HIGH
CVE-2010-3411

Google Chrome before 6.0.472.59 on Linux does not properly handle cursors, which might allow attackers to cause a denial of service (assertion failure) via unspecified vectors.

Published: September 16, 2010; 05:00:02 PM -04:00
V2: 5.0 MEDIUM
CVE-2010-3259

WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, does not properly restrict read access to images derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive image data via a crafted web site.

Published: September 07, 2010; 02:00:03 PM -04:00
V2: 4.3 MEDIUM
CVE-2010-3258

The sandbox implementation in Google Chrome before 6.0.472.53 does not properly deserialize parameters, which has unspecified impact and remote attack vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 9.3 HIGH
CVE-2010-3257

Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element focus.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 9.3 HIGH
CVE-2010-3256

Google Chrome before 6.0.472.53 does not properly limit the number of stored autocomplete entries, which has unspecified impact and attack vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 2.6 LOW
CVE-2010-3255

Google Chrome before 6.0.472.53 and webkitgtk before 1.2.6 do not properly handle counter nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 9.3 HIGH
CVE-2010-3254

The WebSockets implementation in Google Chrome before 6.0.472.53 does not properly handle integer values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 10.0 HIGH
CVE-2010-3253

The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 10.0 HIGH
CVE-2010-3252

Use-after-free vulnerability in the Notifications presenter in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 10.0 HIGH
CVE-2010-3251

The WebSockets implementation in Google Chrome before 6.0.472.53 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 4.3 MEDIUM
CVE-2010-3250

Unspecified vulnerability in Google Chrome before 6.0.472.53 allows remote attackers to enumerate the set of installed extensions via unknown vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 5.0 MEDIUM
CVE-2010-3249

Google Chrome before 6.0.472.53 does not properly implement SVG filters, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "stale pointer" issue.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 9.3 HIGH
CVE-2010-3248

Google Chrome before 6.0.472.53 does not properly restrict copying to the clipboard, which has unspecified impact and attack vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 5.0 MEDIUM
CVE-2010-3247

Google Chrome before 6.0.472.53 does not properly restrict the characters in URLs, which allows remote attackers to spoof the appearance of the URL bar via homographic sequences.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 4.3 MEDIUM
CVE-2010-3246

Google Chrome before 6.0.472.53 does not properly handle the _blank value for the target attribute of unspecified elements, which allows remote attackers to bypass the pop-up blocker via unknown vectors.

Published: September 07, 2010; 02:00:02 PM -04:00
V2: 4.3 MEDIUM
CVE-2010-3120

Google Chrome before 5.0.375.127 does not properly implement the Geolocation feature, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Published: August 24, 2010; 04:00:02 PM -04:00
V2: 10.0 HIGH
CVE-2010-3119

Google Chrome before 5.0.375.127 and webkitgtk before 1.2.6 do not properly support the Ruby language, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

Published: August 24, 2010; 04:00:02 PM -04:00
V2: 10.0 HIGH
CVE-2010-3118

The autosuggest feature in the Omnibox implementation in Google Chrome before 5.0.375.127 does not anticipate entry of passwords, which might allow remote attackers to obtain sensitive information by reading the network traffic generated by this feature.

Published: August 24, 2010; 04:00:02 PM -04:00
V2: 5.0 MEDIUM