| Vuln ID | Summary | CVSS Severity |
|---|---|---|
| CVE-2015-6777 |
Use-after-free vulnerability in the ContainerNode::notifyNodeInsertedInternal function in WebKit/Source/core/dom/ContainerNode.cpp in the DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOMCharacterDataModified events for certain detached-subtree insertions. Published: December 05, 2015; 8:59:14 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6776 |
The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform. Published: December 05, 2015; 8:59:13 PM -0500 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
| CVE-2015-6775 |
fpdfsdk/src/jsapi/fxjs_v8.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, does not use signatures, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion." Published: December 05, 2015; 8:59:12 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6774 |
Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data. Published: December 05, 2015; 8:59:11 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6773 |
The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data. Published: December 05, 2015; 8:59:10 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6772 |
The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin. Published: December 05, 2015; 8:59:09 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6771 |
js/array.js in Google V8, as used in Google Chrome before 47.0.2526.73, improperly implements certain map and filter operations for arrays, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code. Published: December 05, 2015; 8:59:08 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6770 |
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768. Published: December 05, 2015; 8:59:07 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6769 |
The provisional-load commit implementation in WebKit/Source/bindings/core/v8/WindowProxy.cpp in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy by leveraging a delay in window proxy clearing. Published: December 05, 2015; 8:59:06 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6768 |
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770. Published: December 05, 2015; 8:59:05 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6767 |
Use-after-free vulnerability in content/browser/appcache/appcache_dispatcher_host.cc in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect pointer maintenance associated with certain callbacks. Published: December 05, 2015; 8:59:04 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6766 |
Use-after-free vulnerability in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers with renderer access to cause a denial of service or possibly have unspecified other impact by leveraging incorrect AppCacheUpdateJob behavior associated with duplicate cache selection. Published: December 05, 2015; 8:59:03 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-6765 |
Use-after-free vulnerability in content/browser/appcache/appcache_update_job.cc in Google Chrome before 47.0.2526.73 allows remote attackers to execute arbitrary code or cause a denial of service by leveraging the mishandling of AppCache update jobs. Published: December 05, 2015; 8:59:01 PM -0500 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-6764 |
The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code. Published: December 05, 2015; 8:59:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-1302 |
The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc. Published: November 11, 2015; 6:59:00 AM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2012-4930 |
The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack. Published: September 15, 2012; 2:55:03 PM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2012-4929 |
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack. Published: September 15, 2012; 2:55:03 PM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2012-2647 |
Yahoo! Toolbar 1.0.0.5 and earlier for Chrome and Safari allows remote attackers to modify the configured search URL, and intercept search terms, via a crafted web page. Published: July 31, 2012; 6:45:42 AM -0400 |
V3.x:(not available) V2.0: 5.8 MEDIUM |
| CVE-2011-3389 |
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. Published: September 06, 2011; 3:55:03 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2010-2179 |
Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing. Published: June 15, 2010; 2:00:01 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |