Vulnerabilities > Google > Chrome > 6.0.458.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-12-07 | CVE-2010-4491 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension. | 4.3 |
2010-12-07 | CVE-2010-4490 | Unspecified vulnerability in Google Chrome Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via malformed video content that triggers an indexing error. | 9.3 |
2010-12-07 | CVE-2010-4489 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome libvpx, as used in Google Chrome before 8.0.552.215 and possibly other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebM video. | 4.3 |
2010-12-07 | CVE-2010-4488 | Improper Authentication vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly handle HTTP proxy authentication, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | 5.0 |
2010-12-07 | CVE-2010-4487 | Unspecified vulnerability in Google Chrome Incomplete blacklist vulnerability in Google Chrome before 8.0.552.215 on Linux and Mac OS X allows remote attackers to have an unspecified impact via a "dangerous file." | 7.5 |
2010-12-07 | CVE-2010-4486 | Resource Management Errors vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to history handling. | 9.3 |
2010-12-07 | CVE-2010-4485 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly restrict the generation of file dialogs, which allows remote attackers to cause a denial of service (reduced usability and possible application crash) via a crafted web site. | 4.3 |
2010-12-07 | CVE-2010-4484 | Unspecified vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly handle HTML5 databases, which allows attackers to cause a denial of service (application crash) via unspecified vectors. | 5.0 |
2010-12-07 | CVE-2010-4483 | Permissions, Privileges, and Access Controls vulnerability in Google Chrome Google Chrome before 8.0.552.215 does not properly restrict read access to videos derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via a crafted web site. | 4.3 |
2010-12-07 | CVE-2010-4482 | Security Bypass vulnerability in Chrome Unspecified vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to bypass the pop-up blocker via unknown vectors. | 5.0 |