Vulnerabilities > Google > Chrome > 4.1.249.1047
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-12-07 | CVE-2010-4493 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service via vectors related to the handling of mouse dragging events. | 4.3 |
2010-12-07 | CVE-2010-4492 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG animations. | 7.5 |
2010-12-07 | CVE-2010-4491 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension. | 4.3 |
2010-12-07 | CVE-2010-4490 | Unspecified vulnerability in Google Chrome Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via malformed video content that triggers an indexing error. | 9.3 |
2010-12-07 | CVE-2010-4489 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome libvpx, as used in Google Chrome before 8.0.552.215 and possibly other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebM video. | 4.3 |
2010-12-07 | CVE-2010-4488 | Improper Authentication vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly handle HTTP proxy authentication, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | 5.0 |
2010-12-07 | CVE-2010-4487 | Unspecified vulnerability in Google Chrome Incomplete blacklist vulnerability in Google Chrome before 8.0.552.215 on Linux and Mac OS X allows remote attackers to have an unspecified impact via a "dangerous file." | 7.5 |
2010-12-07 | CVE-2010-4486 | Resource Management Errors vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to history handling. | 9.3 |
2010-12-07 | CVE-2010-4485 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly restrict the generation of file dialogs, which allows remote attackers to cause a denial of service (reduced usability and possible application crash) via a crafted web site. | 4.3 |
2010-12-07 | CVE-2010-4484 | Unspecified vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly handle HTML5 databases, which allows attackers to cause a denial of service (application crash) via unspecified vectors. | 5.0 |