Vulnerabilities > Google > Chrome > 11.0.696.56
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-25 | CVE-2019-5864 | Incorrect Authorization vulnerability in Google Chrome Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension. | 4.3 |
2019-11-25 | CVE-2019-5862 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in AppCache in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | 6.5 |
2019-11-25 | CVE-2019-5861 | Improper Restriction of Rendered UI Layers or Frames vulnerability in Google Chrome Insufficient data validation in Blink in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to bypass anti-clickjacking policy via a crafted HTML page. | 4.3 |
2019-11-25 | CVE-2019-5860 | Use After Free vulnerability in Google Chrome Use after free in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 5.5 |
2019-11-25 | CVE-2019-5859 | Unspecified vulnerability in Google Chrome Insufficient filtering in URI schemes in Google Chrome on Windows prior to 76.0.3809.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5858 | Improper Input Validation vulnerability in Google Chrome Incorrect security UI in MacOS services integration in Google Chrome on OS X prior to 76.0.3809.87 allowed a local attacker to execute arbitrary code via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5857 | Out-of-bounds Write vulnerability in Google Chrome Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | 6.5 |
2019-11-25 | CVE-2019-5856 | Improper Input Validation vulnerability in Google Chrome Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5855 | Integer Overflow or Wraparound vulnerability in Google Chrome Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 6.5 |
2019-11-25 | CVE-2019-5854 | Integer Overflow or Wraparound vulnerability in Google Chrome Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 8.8 |