Vulnerabilities > Google > Chrome > 4.0.265.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-06-11 | CVE-2010-1770 | Code Injection vulnerability in multiple products WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue." | 9.3 |
2010-05-28 | CVE-2010-2110 | Unspecified vulnerability in Google Chrome Google Chrome before 5.0.375.55 does not properly execute JavaScript code in the extension context, which has unspecified impact and remote attack vectors. | 7.5 |
2010-05-28 | CVE-2010-2109 | Unspecified vulnerability in Google Chrome Unspecified vulnerability in Google Chrome before 5.0.375.55 allows user-assisted remote attackers to cause a denial of service (memory error) or possibly have unspecified other impact via vectors related to the "drag + drop" functionality. | 7.5 |
2010-05-28 | CVE-2010-2108 | Unspecified vulnerability in Google Chrome Unspecified vulnerability in Google Chrome before 5.0.375.55 allows remote attackers to bypass the whitelist-mode plugin blocker via unknown vectors. | 7.5 |
2010-05-28 | CVE-2010-2107 | Unspecified vulnerability in Google Chrome Unspecified vulnerability in Google Chrome before 5.0.375.55 allows attackers to cause a denial of service (memory error) or possibly have unspecified other impact via vectors related to the Safe Browsing functionality. | 10.0 |
2010-05-28 | CVE-2010-2106 | Unspecified vulnerability in Google Chrome Unspecified vulnerability in Google Chrome before 5.0.375.55 might allow remote attackers to spoof the URL bar via vectors involving unload event handlers. network google | 4.3 |
2010-05-28 | CVE-2010-2105 | Unspecified vulnerability in Google Chrome Google Chrome before 5.0.375.55 does not properly follow the Safe Browsing specification's requirements for canonicalization of URLs, which has unspecified impact and remote attack vectors. | 10.0 |
2010-05-07 | CVE-2010-1851 | Information Exposure vulnerability in Google Chrome Google Chrome, when the Invisible Hand extension is enabled, uses cookies during background HTTP requests in a possibly unexpected manner, which might allow remote web servers to identify specific persons and their product searches via HTTP request logging, related to a "cross-site data leakage" issue. | 4.3 |
2010-05-03 | CVE-2010-1665 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome Google Chrome before 4.1.249.1064 does not properly handle fonts, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors. | 7.5 |
2010-05-03 | CVE-2010-1664 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome Google Chrome before 4.1.249.1064 does not properly handle HTML5 media, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors. | 5.0 |