U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 2,535 matching records.
Displaying matches 2,521 through 2,535.
Vuln ID Summary CVSS Severity
CVE-2013-0926

Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2013-0925

Google Chrome before 26.0.1410.43 does not ensure that an extension has the tabs (aka APIPermission::kTab) permission before providing a URL to this extension, which has unspecified impact and remote attack vectors.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2013-0924

The extension functionality in Google Chrome before 26.0.1410.43 does not verify that use of the permissions API is consistent with file permissions, which has unspecified impact and attack vectors.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2013-0923

The USB Apps API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2013-0922

Google Chrome before 26.0.1410.43 does not properly restrict brute-force access attempts against web sites that require HTTP Basic Authentication, which has unspecified impact and attack vectors.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2013-0921

The Isolated Sites feature in Google Chrome before 26.0.1410.43 does not properly enforce the use of separate processes, which makes it easier for remote attackers to bypass intended access restrictions via a crafted web site.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2013-0920

Use-after-free vulnerability in the extension bookmarks API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2013-0919

Use-after-free vulnerability in Google Chrome before 26.0.1410.43 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the presence of an extension that creates a pop-up window.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2013-0918

Google Chrome before 26.0.1410.43 does not prevent navigation to developer tools in response to a drag-and-drop operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2013-0917

The URL loader in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

Published: March 28, 2013; 8:18:52 AM -0400
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2013-0916

Use-after-free vulnerability in the Web Audio implementation in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published: March 28, 2013; 8:18:44 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2013-2632

Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.

Published: March 21, 2013; 5:55:00 PM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM
CVE-2012-4930

The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Published: September 15, 2012; 2:55:03 PM -0400
V3.x:(not available)
V2.0: 2.6 LOW
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

Published: September 15, 2012; 2:55:03 PM -0400
V3.x:(not available)
V2.0: 2.6 LOW
CVE-2012-2647

Yahoo! Toolbar 1.0.0.5 and earlier for Chrome and Safari allows remote attackers to modify the configured search URL, and intercept search terms, via a crafted web page.

Published: July 31, 2012; 6:45:42 AM -0400
V3.x:(not available)
V2.0: 5.8 MEDIUM