Vulnerabilities > Google > Chrome > 4.0.249.19
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-04-01 | CVE-2010-1228 | Race Condition vulnerability in Google Chrome Multiple race conditions in the sandbox infrastructure in Google Chrome before 4.1.249.1036 have unspecified impact and attack vectors. | 10.0 |
2010-02-18 | CVE-2010-0659 | Resource Management Errors vulnerability in multiple products The image decoder in WebKit before r52833, as used in Google Chrome before 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large size. | 9.3 |
2010-02-18 | CVE-2010-0651 | Information Exposure vulnerability in multiple products WebKit before r52784, as used in Google Chrome before 4.0.249.78 and Apple Safari before 4.0.5, permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document. | 4.3 |
2010-02-18 | CVE-2010-0650 | Permissions, Privileges, and Access Controls vulnerability in multiple products WebKit, as used in Google Chrome before 4.0.249.78 and Apple Safari, allows remote attackers to bypass intended restrictions on popup windows via crafted use of a mouse click event. | 2.6 |
2010-02-18 | CVE-2010-0649 | Numeric Errors vulnerability in Google Chrome Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages. | 9.3 |
2010-02-18 | CVE-2010-0647 | Code Injection vulnerability in multiple products WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence. | 9.3 |
2010-02-18 | CVE-2010-0646 | Numeric Errors vulnerability in Google Chrome Multiple integer signedness errors in factory.cc in Google V8 before r3560, as used in Google Chrome before 4.0.249.89, allow remote attackers to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays. | 10.0 |
2010-02-18 | CVE-2010-0645 | Numeric Errors vulnerability in Google Chrome Multiple integer overflows in factory.cc in Google V8 before r3560, as used in Google Chrome before 4.0.249.89, allow remote attackers to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays. | 9.3 |
2010-02-18 | CVE-2010-0644 | Information Exposure vulnerability in Google Chrome Google Chrome before 4.0.249.89, when a SOCKS 5 proxy server is configured, sends DNS queries directly, which allows remote DNS servers to obtain potentially sensitive information about the identity of a client user via request logging, as demonstrated by a proxy server that was configured for the purpose of anonymity. | 4.3 |
2010-02-18 | CVE-2010-0643 | Information Exposure vulnerability in Google Chrome Google Chrome before 4.0.249.89 attempts to make direct connections to web sites when all configured proxy servers are unavailable, which allows remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging, as demonstrated by a proxy server that was configured for the purpose of anonymity. | 4.3 |