Vulnerabilities > Google > Chrome

DATE CVE VULNERABILITY TITLE RISK
2009-06-15 CVE-2009-2071 Improper Authentication vulnerability in Google Chrome
Google Chrome before 1.0.154.53 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request.
network
google CWE-287
6.8
2009-06-15 CVE-2009-2060 Improper Authentication vulnerability in Google Chrome
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
network
google CWE-287
5.8
2009-06-10 CVE-2009-1690 Resource Management Errors vulnerability in multiple products
Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to "recursion in certain DOM event handlers."
network
apple google CWE-399
critical
9.3
2009-05-11 CVE-2009-1598 Unspecified vulnerability in Google Chrome
Google Chrome executes DOM calls in response to a javascript: URI in the target attribute of a submit element within a form contained in an inline PDF file, which might allow remote attackers to bypass intended Adobe Acrobat JavaScript restrictions on accessing the document object, as demonstrated by a web site that permits PDF uploads by untrusted users, and therefore has a shared document.domain between the web site and this javascript: URI.
network
google
critical
9.3
2009-05-07 CVE-2009-1442 Numeric Errors vulnerability in Google Chrome
Multiple integer overflows in Skia, as used in Google Chrome 1.x before 1.0.154.64 and 2.x, and possibly Android, might allow remote attackers to execute arbitrary code in the renderer process via a crafted (1) image or (2) canvas.
network
google CWE-189
6.8
2009-05-07 CVE-2009-1441 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome
Heap-based buffer overflow in the ParamTraits<SkBitmap>::Read function in Google Chrome before 1.0.154.64 allows attackers to leverage renderer access to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to a large bitmap that arrives over the IPC channel.
network
google CWE-119
critical
9.3
2009-05-04 CVE-2009-1514 Resource Management Errors vulnerability in Google Chrome 1.0.154.53
Google Chrome 1.0.154.53 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a throw statement with a long exception value.
network
low complexity
google CWE-399
5.0
2009-04-24 CVE-2009-1414 Permissions, Privileges, and Access Controls vulnerability in Google Chrome
Google Chrome 2.0.x lets modifications to the global object persist across a page transition, which makes it easier for attackers to conduct Universal XSS attacks via unspecified vectors.
network
google CWE-264
4.3
2009-04-24 CVE-2009-1413 Permissions, Privileges, and Access Controls vulnerability in Google Chrome
Google Chrome 1.0.x does not cancel timeouts upon a page transition, which makes it easier for attackers to conduct Universal XSS attacks by calling setTimeout to trigger future execution of JavaScript code, and then modifying document.location to arrange for JavaScript execution in the context of an arbitrary web site.
network
google CWE-264
4.3
2009-04-24 CVE-2009-1412 Information Exposure vulnerability in Google Chrome
Argument injection vulnerability in the chromehtml: protocol handler in Google Chrome before 1.0.154.59, when invoked by Internet Explorer, allows remote attackers to determine the existence of files, and open tabs for URLs that do not satisfy the IsWebSafeScheme restriction, via a web page that sets document.location to a chromehtml: value, as demonstrated by use of a (1) javascript: or (2) data: URL.
network
low complexity
google CWE-200
7.8