Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Filtered by product Chrome
Total 3392 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2011-3067 2 Apple, Google 3 Iphone Os, Safari, Chrome 2020-04-14 6.8 MEDIUM N/A
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.
CVE-2011-3068 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to run-in boxes.
CVE-2011-3069 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to line boxes.
CVE-2011-3070 1 Google 1 Chrome 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Google V8 bindings.
CVE-2011-3071 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in the HTMLMediaElement implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2011-3072 1 Google 1 Chrome 2020-04-14 6.8 MEDIUM N/A
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to pop-up windows.
CVE-2011-3073 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG resources.
CVE-2011-3074 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media.
CVE-2011-3075 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to style-application commands.
CVE-2011-3076 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to focus handling.
CVE-2011-3077 1 Google 1 Chrome 2020-04-14 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the script bindings, related to a "read-after-free" issue.
CVE-2011-3080 1 Google 1 Chrome 2020-04-14 7.6 HIGH N/A
Race condition in the Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 allows attackers to bypass intended sandbox restrictions via unspecified vectors.
CVE-2012-1521 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-13 6.8 MEDIUM N/A
Use-after-free vulnerability in the XML parser in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2011-3078 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-13 6.8 MEDIUM N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3081.
CVE-2011-3081 2 Apple, Google 4 Iphone Os, Itunes, Safari and 1 more 2020-04-13 9.3 HIGH N/A
Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078.
CVE-2010-3917 1 Google 1 Chrome 2020-02-10 4.3 MEDIUM 6.5 MEDIUM
Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.
CVE-2018-10229 3 Google, Lg, Mozilla 3 Chrome, Nexus 5, Firefox 2019-10-03 5.8 MEDIUM 4.8 MEDIUM
A hardware vulnerability in GPU memory modules allows attackers to accelerate micro-architectural attacks through the use of the JavaScript WebGL API.
CVE-2012-5376 1 Google 1 Chrome 2019-09-27 9.3 HIGH 9.6 CRITICAL
The Inter-process Communication (IPC) implementation in Google Chrome before 22.0.1229.94 allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process, a different vulnerability than CVE-2012-5112.
CVE-2011-1300 3 Google, Microsoft, Mozilla 3 Chrome, Windows, Firefox 2019-07-18 10.0 HIGH N/A
The Program::getActiveUniformMaxLength function in libGLESv2/Program.cpp in libGLESv2.dll in the WebGLES library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox 4.x before 4.0.1 on Windows and in the GPU process in Google Chrome before 10.0.648.205 on Windows, allows remote attackers to execute arbitrary code via unspecified vectors, related to an "off-by-three" error.
CVE-2014-9654 2 Google, Icu-project 2 Chrome, International Components For Unicode 2019-04-23 7.5 HIGH 9.8 CRITICAL
The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.