Vulnerabilities > Google > Chrome > 6.0.456.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-09-16 | CVE-2010-3413 | Denial-Of-Service vulnerability in Chrome Unspecified vulnerability in the pop-up blocking functionality in Google Chrome before 6.0.472.59 allows remote attackers to cause a denial of service (application crash) via unknown vectors. | 5.0 |
2010-09-16 | CVE-2010-3412 | Race Condition vulnerability in Google Chrome Race condition in the console implementation in Google Chrome before 6.0.472.59 has unspecified impact and attack vectors. | 9.3 |
2010-09-16 | CVE-2010-3411 | Reachable Assertion vulnerability in Google Chrome Google Chrome before 6.0.472.59 on Linux does not properly handle cursors, which might allow attackers to cause a denial of service (assertion failure) via unspecified vectors. | 5.0 |
2010-09-07 | CVE-2010-3259 | Information Exposure vulnerability in multiple products WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, does not properly restrict read access to images derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive image data via a crafted web site. | 4.3 |
2010-09-07 | CVE-2010-3258 | Deserialization of Untrusted Data vulnerability in Google Chrome The sandbox implementation in Google Chrome before 6.0.472.53 does not properly deserialize parameters, which has unspecified impact and remote attack vectors. | 9.3 |
2010-09-07 | CVE-2010-3257 | USE After Free vulnerability in multiple products Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element focus. | 9.3 |
2010-09-07 | CVE-2010-3256 | Remote Security vulnerability in Chrome Google Chrome before 6.0.472.53 does not properly limit the number of stored autocomplete entries, which has unspecified impact and attack vectors. network google | 4.3 |
2010-09-07 | CVE-2010-3255 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products Google Chrome before 6.0.472.53 and webkitgtk before 1.2.6 do not properly handle counter nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | 9.3 |
2010-09-07 | CVE-2010-3254 | Integer Overflow OR Wraparound vulnerability in Google Chrome The WebSockets implementation in Google Chrome before 6.0.472.53 does not properly handle integer values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | 10.0 |
2010-09-07 | CVE-2010-3253 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | 10.0 |