Vulnerabilities > Google > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-05-24 | CVE-2011-3115 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome Google V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption." | 7.5 |
2012-05-24 | CVE-2011-3114 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome Multiple buffer overflows in the PDF functionality in Google Chrome before 19.0.1084.52 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unknown function calls. | 7.5 |
2012-05-24 | CVE-2011-3113 | Multiple Security vulnerability in Google Chrome Prior to 19.0.1084.52 The PDF functionality in Google Chrome before 19.0.1084.52 does not properly perform a cast of an unspecified variable during handling of color spaces, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document. | 7.5 |
2012-05-24 | CVE-2011-3110 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Chrome The PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. | 7.5 |
2012-05-24 | CVE-2011-3109 | Multiple Security vulnerability in Google Chrome Prior to 19.0.1084.52 Google Chrome before 19.0.1084.52 on Linux does not properly perform a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact by leveraging an error in the GTK implementation of the UI. | 7.5 |
2012-05-24 | CVE-2011-3107 | Multiple Security vulnerability in Google Chrome Prior to 19.0.1084.52 Google Chrome before 19.0.1084.52 does not properly implement JavaScript bindings for plug-ins, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. | 7.5 |
2012-05-24 | CVE-2011-3105 | Resource Management Errors vulnerability in Google Chrome Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element. | 7.5 |
2012-05-24 | CVE-2011-3103 | Resource Management Errors vulnerability in Google Chrome Google V8, as used in Google Chrome before 19.0.1084.52, does not properly perform garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code. | 7.5 |
2012-05-22 | CVE-2012-2562 | Improper Input Validation vulnerability in Xelex Mobiletrack 2.3.7 The Xelex MobileTrack application 2.3.7 and earlier for Android does not verify the origin of SMS commands, which allows remote attackers to execute a (1) LOCATE, (2) TRACK, (3) UPDATECFG, (4) UPDATEACCT, (5) STAT, (6) TERM, or (7) WIPE command via an SMS message. | 7.6 |
2012-05-16 | CVE-2011-3098 | Permissions, Privileges, and Access Controls vulnerability in multiple products Google Chrome before 19.0.1084.46 on Windows uses an incorrect search path for the Windows Media Player plug-in, which might allow local users to gain privileges via a Trojan horse plug-in in an unspecified directory. | 7.2 |