Vulnerabilities > Google > Chrome > 14.0.835.105
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-03-05 | CVE-2013-6667 | Multiple Security vulnerability in Google Chrome Prior to 33.0.1750.146 Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.146 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 7.5 |
2014-03-05 | CVE-2013-6666 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome The PepperFlashRendererHost::OnNavigate function in renderer/pepper/pepper_flash_renderer_host.cc in Google Chrome before 33.0.1750.146 does not verify that all headers are Cross-Origin Resource Sharing (CORS) simple headers before proceeding with a PPB_Flash.Navigate operation, which might allow remote attackers to bypass intended CORS restrictions via an inappropriate header. | 5.8 |
2014-03-05 | CVE-2013-6665 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome Heap-based buffer overflow in the ResourceProvider::InitializeSoftware function in cc/resources/resource_provider.cc in Google Chrome before 33.0.1750.146 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large texture size that triggers improper memory allocation in the software renderer. | 7.5 |
2014-03-05 | CVE-2013-6664 | Resource Management Errors vulnerability in Google Chrome Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving FORM elements, as demonstrated by use of the speech-recognition feature. | 7.5 |
2014-03-05 | CVE-2013-6663 | Resource Management Errors vulnerability in Google Chrome Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view. | 7.5 |
2014-02-24 | CVE-2013-6661 | Unspecified vulnerability in Google Chrome Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.117 allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact, via unknown vectors. | 7.5 |
2014-02-24 | CVE-2013-6660 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome The drag-and-drop implementation in Google Chrome before 33.0.1750.117 does not properly restrict the information in WebDropData data structures, which allows remote attackers to discover full pathnames via a crafted web site. | 5.0 |
2014-02-24 | CVE-2013-6659 | Cryptographic Issues vulnerability in Google Chrome The SSLClientSocketNSS::Core::OwnAuthCertHandler function in net/socket/ssl_client_socket_nss.cc in Google Chrome before 33.0.1750.117 does not prevent changes to server X.509 certificates during renegotiations, which allows remote SSL servers to trigger use of a new certificate chain, inconsistent with the user's expectations, by initiating a TLS renegotiation. | 6.4 |
2014-02-24 | CVE-2013-6658 | Resource Management Errors vulnerability in Google Chrome Multiple use-after-free vulnerabilities in the layout implementation in Blink, as used in Google Chrome before 33.0.1750.117, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving (1) running JavaScript code during execution of the updateWidgetPositions function or (2) making a call into a plugin during execution of the updateWidgetPositions function. | 7.5 |
2014-02-24 | CVE-2013-6657 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, inserts the about:blank URL during certain blocking of FORM elements within HTTP requests, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors. | 6.4 |