Total
10666 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-3875 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 15.0.874.102 does not properly handle drag and drop operations on URL strings, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors. | |||||
CVE-2011-3639 | 1 Apache | 10 Http Server, Http Server2.0a1, Http Server2.0a2 and 7 more | 2023-11-07 | 4.3 MEDIUM | N/A |
The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368. | |||||
CVE-2011-3368 | 1 Apache | 1 Http Server | 2023-11-07 | 5.0 MEDIUM | N/A |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. | |||||
CVE-2011-3195 | 1 Gplhost | 1 Domain Technologie Control | 2023-11-07 | 6.5 MEDIUM | N/A |
shared/inc/sql/lists.php in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in mailing list tunable options. | |||||
CVE-2011-2861 | 1 Google | 1 Chrome | 2023-11-07 | 6.8 MEDIUM | N/A |
Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation. | |||||
CVE-2011-2848 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 14.0.835.163 allows user-assisted remote attackers to spoof the URL bar via vectors related to the forward button. | |||||
CVE-2011-2845 | 2 Apple, Google | 3 Iphone Os, Safari, Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 15.0.874.102 does not properly handle history data, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors. | |||||
CVE-2011-2842 | 2 Apple, Google | 2 Mac Os X, Chrome | 2023-11-07 | 7.5 HIGH | N/A |
The installer in Google Chrome before 14.0.835.163 on Mac OS X does not properly handle lock files, which has unspecified impact and attack vectors. | |||||
CVE-2011-2841 | 1 Google | 1 Chrome | 2023-11-07 | 6.8 MEDIUM | N/A |
Google Chrome before 14.0.835.163 does not properly perform garbage collection during the processing of PDF documents, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document. | |||||
CVE-2011-2840 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 14.0.835.163 allows user-assisted remote attackers to spoof the URL bar via vectors related to "unusual user interaction." | |||||
CVE-2011-2839 | 2 Google, Linux | 2 Chrome, Linux Kernel | 2023-11-07 | 7.5 HIGH | N/A |
The PDF implementation in Google Chrome before 13.0.782.215 on Linux does not properly use the memset library function, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | |||||
CVE-2011-2838 | 1 Google | 1 Chrome | 2023-11-07 | 7.5 HIGH | N/A |
Google Chrome before 14.0.835.163 does not properly consider the MIME type during the loading of a plug-in, which has unspecified impact and remote attack vectors. | |||||
CVE-2011-2822 | 2 Google, Microsoft | 2 Chrome, Windows | 2023-11-07 | 10.0 HIGH | N/A |
Google Chrome before 13.0.782.215 on Windows does not properly parse URLs located on the command line, which has unspecified impact and attack vectors. | |||||
CVE-2011-2808 | 1 Google | 1 Blink | 2023-11-07 | 4.3 MEDIUM | 6.5 MEDIUM |
A stale layout root is set as an input element in WebKit in Google Chrome before Blink M13 when a child of a keygen with autofocus is accessed. | |||||
CVE-2011-2804 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly handle nested functions in PDF documents, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted document. | |||||
CVE-2011-2802 | 1 Google | 1 Chrome | 2023-11-07 | 6.8 MEDIUM | N/A |
Google V8, as used in Google Chrome before 13.0.782.107, does not properly perform const lookups, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted web site. | |||||
CVE-2011-2787 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not properly address re-entrancy issues associated with the GPU lock, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | |||||
CVE-2011-2786 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not ensure that the speech-input bubble is shown on the product's screen, which might make it easier for remote attackers to make audio recordings via a crafted web page containing an INPUT element. | |||||
CVE-2011-2785 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | N/A |
The extensions implementation in Google Chrome before 13.0.782.107 does not properly validate the URL for the home page, which allows remote attackers to have an unspecified impact via a crafted extension. | |||||
CVE-2011-2783 | 1 Google | 1 Chrome | 2023-11-07 | 6.8 MEDIUM | N/A |
Google Chrome before 13.0.782.107 does not ensure that developer-mode NPAPI extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. |