Google Chrome
Update Google Chrome to version 129.0.6668.59

What patches are you missing?



CVE Vulnerabilities for Google Chrome

CVEPublishedSeverityDetailsExploitability Impact Vector
CVE‑2024‑80352024‑08‑21 21:15:10MEDIUM (4)Inappropriate implementation in Extensions in Google Chrome on Windows prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑80342024‑08‑21 21:15:10MEDIUM (4)Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑80332024‑08‑21 21:15:10MEDIUM (4)Inappropriate implementation in WebApp Installs in Google Chrome on Windows prior to 128.0.6613.84 allowed an attacker who convinced a user to install a malicious application to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑79812024‑08‑21 21:15:10MEDIUM (4)Inappropriate implementation in Views in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑79802024‑08‑21 21:15:10HIGH (8)Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)26LOCAL
CVE‑2024‑79792024‑08‑21 21:15:10HIGH (8)Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity: Medium)26LOCAL
CVE‑2024‑79782024‑08‑21 21:15:10MEDIUM (4)Insufficient policy enforcement in Data Transfer in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑79772024‑08‑21 21:15:10HIGH (8)Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)26LOCAL
CVE‑2024‑79762024‑08‑21 21:15:10MEDIUM (4)Inappropriate implementation in FedCM in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑79752024‑08‑21 21:15:10MEDIUM (4)Inappropriate implementation in Permissions in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑79742024‑08‑21 21:15:09HIGH (9)Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑79732024‑08‑21 21:15:09HIGH (9)Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑79722024‑08‑21 21:15:09HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑79712024‑08‑21 21:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑79692024‑08‑21 21:15:09HIGH (9)Type Confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑79682024‑08‑21 21:15:09HIGH (9)Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑79672024‑08‑21 21:15:09HIGH (9)Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑79662024‑08‑21 21:15:09HIGH (9)Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑79652024‑08‑21 21:15:09HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑79642024‑08‑21 21:15:09HIGH (9)Use after free in Passwords in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑75502024‑08‑06 21:16:04HIGH (9)Type Confusion in V8 in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑75362024‑08‑06 21:16:04HIGH (9)Use after free in WebAudio in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑75352024‑08‑06 21:16:04HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑75342024‑08‑06 21:16:04HIGH (9)Heap buffer overflow in Layout in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑75332024‑08‑06 21:16:04HIGH (9)Use after free in Sharing in Google Chrome on iOS prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑75322024‑08‑06 21:16:04HIGH (9)Out of bounds memory access in ANGLE in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2024‑72552024‑08‑01 18:15:27HIGH (9)Out of bounds read in WebTransport in Google Chrome prior to 127.0.6533.88 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑70052024‑08‑06 16:15:51MEDIUM (4)Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a malicious file. (Chromium security severity: Low)31NETWORK
CVE‑2024‑70042024‑08‑06 16:15:51MEDIUM (4)Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a malicious file. (Chromium security severity: Low)31NETWORK
CVE‑2024‑70032024‑08‑06 16:15:51MEDIUM (4)Inappropriate implementation in FedCM in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑70012024‑08‑06 16:15:51MEDIUM (4)Inappropriate implementation in HTML in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑70002024‑08‑06 16:15:51HIGH (9)Use after free in CSS in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑69992024‑08‑06 16:15:51MEDIUM (4)Inappropriate implementation in FedCM in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑69982024‑08‑06 16:15:50HIGH (9)Use after free in User Education in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑69972024‑08‑06 16:15:50HIGH (9)Use after free in Tabs in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑69962024‑08‑06 16:15:50LOW (3)Race in Frames in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)21NETWORK
CVE‑2024‑69952024‑08‑06 16:15:50MEDIUM (5)Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑69942024‑08‑06 16:15:50HIGH (9)Heap buffer overflow in Layout in Google Chrome prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑69912024‑08‑06 16:15:50HIGH (9)Use after free in Dawn in Google Chrome prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑69902024‑08‑01 18:15:27HIGH (9)Uninitialized Use in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2024‑69892024‑08‑06 16:15:50HIGH (9)Use after free in Loader in Google Chrome prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑69882024‑08‑06 16:15:50HIGH (9)Use after free in Downloads in Google Chrome on iOS prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑61032024‑06‑20 00:15:10HIGH (9)Use after free in Dawn in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑61022024‑06‑20 00:15:10HIGH (9)Out of bounds memory access in Dawn in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑61012024‑06‑20 00:15:10HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑61002024‑06‑20 00:15:10HIGH (9)Type Confusion in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58472024‑06‑11 21:15:56HIGH (9)Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑58462024‑06‑11 21:15:55HIGH (9)Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑58452024‑06‑11 21:15:55HIGH (9)Use after free in Audio in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑58442024‑06‑11 21:15:55HIGH (9)Heap buffer overflow in Tab Strip in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑58432024‑06‑11 21:15:55MEDIUM (7)Inappropriate implementation in Downloads in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to obfuscate security UI via a malicious file. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑58422024‑06‑11 21:15:55HIGH (9)Use after free in Browser UI in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑58412024‑06‑11 21:15:55HIGH (9)Use after free in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑58402024‑06‑11 21:15:55MEDIUM (7)Policy bypass in CORS in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑58392024‑06‑11 21:15:55MEDIUM (7)Inappropriate Implementation in Memory Allocator in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑58382024‑06‑11 21:15:55HIGH (9)Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58372024‑06‑11 21:15:55HIGH (9)Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58362024‑06‑11 21:15:55HIGH (9)Inappropriate Implementation in DevTools in Google Chrome prior to 126.0.6478.54 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: High)36NETWORK
CVE‑2024‑58352024‑06‑11 21:15:55HIGH (9)Heap buffer overflow in Tab Groups in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58342024‑06‑11 21:15:55HIGH (9)Inappropriate implementation in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58332024‑06‑11 21:15:54HIGH (9)Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58322024‑06‑11 21:15:54HIGH (9)Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58312024‑06‑11 21:15:54HIGH (9)Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑58302024‑06‑11 21:15:54HIGH (9)Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑55002024‑07‑16 23:15:24MEDIUM (7)Inappropriate implementation in Sign-In in Google Chrome prior to 1.3.36.351 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑52742024‑05‑28 15:15:10HIGH (9)Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑49472024‑05‑15 21:15:09HIGH (9)Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑47612024‑05‑14 16:17:36HIGH (9)Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑46712024‑05‑14 15:44:16CRITICAL (10)Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑40582024‑05‑01 13:15:52HIGH (9)Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2024‑38392024‑04‑17 08:15:10MEDIUM (7)Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑38382024‑04‑17 08:15:10MEDIUM (6)Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)24LOCAL
CVE‑2024‑38372024‑04‑17 08:15:10HIGH (9)Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑38342024‑04‑17 08:15:10HIGH (9)Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31762024‑07‑16 23:15:24HIGH (9)Out of bounds write in SwiftShader in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31752024‑07‑16 23:15:24MEDIUM (6)Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform privilege escalation via a crafted Chrome Extension. (Chromium security severity: Low)33NETWORK
CVE‑2024‑31742024‑07‑16 23:15:24HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31732024‑07‑16 23:15:24HIGH (9)Insufficient data validation in Updater in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)36NETWORK
CVE‑2024‑31722024‑07‑16 23:15:24HIGH (9)Insufficient data validation in DevTools in Google Chrome prior to 121.0.6167.85 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31712024‑07‑16 23:15:24HIGH (9)Use after free in Accessibility in Google Chrome prior to 122.0.6261.57 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑31702024‑07‑16 23:15:24HIGH (9)Use after free in WebRTC in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31692024‑07‑16 23:15:24HIGH (9)Use after free in V8 in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31682024‑07‑16 23:15:24HIGH (9)Use after free in DevTools in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑31592024‑04‑06 15:15:27HIGH (9)Out of bounds memory access in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31582024‑04‑06 15:15:27HIGH (9)Use after free in Bookmarks in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑31562024‑04‑06 15:15:27HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑28842024‑07‑16 23:15:24MEDIUM (7)Out of bounds read in V8 in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑26312024‑03‑20 17:15:08MEDIUM (4)Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑26302024‑03‑20 17:15:08MEDIUM (7)Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑26292024‑03‑20 17:15:08MEDIUM (4)Incorrect security UI in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑26282024‑03‑20 17:15:08MEDIUM (4)Inappropriate implementation in Downloads in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑26272024‑03‑20 17:15:08HIGH (9)Use after free in Canvas in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑26262024‑03‑20 17:15:07MEDIUM (7)Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑26252024‑03‑20 17:15:07HIGH (9)Object lifecycle issue in V8 in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑12842024‑02‑07 00:15:56CRITICAL (10)Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)46NETWORK
CVE‑2024‑12832024‑02‑07 00:15:56CRITICAL (10)Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)46NETWORK
CVE‑2024‑10772024‑01‑30 22:15:53HIGH (9)Use after free in Network in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)36NETWORK
CVE‑2024‑10602024‑01‑30 22:15:53HIGH (9)Use after free in Canvas in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑10592024‑01‑30 22:15:53HIGH (9)Use after free in Peer Connection in Google Chrome prior to 121.0.6167.139 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑08142024‑01‑24 00:15:08MEDIUM (7)Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2024‑08132024‑01‑24 00:15:08HIGH (9)Use after free in Reading Mode in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑08122024‑01‑24 00:15:08HIGH (9)Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑08112024‑01‑24 00:15:08MEDIUM (4)Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)31NETWORK
CVE‑2024‑08102024‑01‑24 00:15:08MEDIUM (4)Insufficient policy enforcement in DevTools in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑08092024‑01‑24 00:15:08MEDIUM (4)Inappropriate implementation in Autofill in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2024‑08082024‑01‑24 00:15:08CRITICAL (10)Integer underflow in WebUI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a malicious file. (Chromium security severity: High)46NETWORK
CVE‑2024‑08072024‑01‑24 00:15:08HIGH (9)Use after free in Web Audio in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑08062024‑01‑24 00:15:08HIGH (9)Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2024‑08052024‑01‑24 00:15:08MEDIUM (4)Inappropriate implementation in Downloads in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)31NETWORK
CVE‑2024‑08042024‑01‑24 00:15:08HIGH (8)Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)44NETWORK
CVE‑2024‑05192024‑01‑16 22:15:38HIGH (9)Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑05182024‑01‑16 22:15:38HIGH (9)Type confusion in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑05172024‑01‑16 22:15:38HIGH (9)Out of bounds write in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑03332024‑01‑10 22:15:51MEDIUM (5)Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.216 allowed an attacker in a privileged network position to install a malicious extension via a crafted HTML page. (Chromium security severity: High)24NETWORK
CVE‑2024‑02252024‑01‑04 02:15:29HIGH (9)Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑02242024‑01‑04 02:15:29HIGH (9)Use after free in WebAudio in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑02232024‑01‑04 02:15:29HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2024‑02222024‑01‑04 02:15:29HIGH (9)Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑70242023‑12‑21 23:15:11HIGH (9)Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑67072023‑12‑14 22:15:45HIGH (9)Use after free in CSS in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑67062023‑12‑14 22:15:45HIGH (9)Use after free in FedCM in Google Chrome prior to 120.0.6099.109 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑67052023‑12‑14 22:15:45HIGH (9)Use after free in WebRTC in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑67042023‑12‑14 22:15:44HIGH (9)Use after free in libavif in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted image file. (Chromium security severity: High)36NETWORK
CVE‑2023‑67032023‑12‑14 22:15:44HIGH (9)Use after free in Blink in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑67022023‑12‑14 22:15:44HIGH (9)Type confusion in V8 in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑65122023‑12‑06 02:15:08MEDIUM (7)Inappropriate implementation in Web Browser UI in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑65112023‑12‑06 02:15:07MEDIUM (4)Inappropriate implementation in Autofill in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑65102023‑12‑06 02:15:07HIGH (9)Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑65092023‑12‑06 02:15:07HIGH (9)Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High)36NETWORK
CVE‑2023‑65082023‑12‑06 02:15:07HIGH (9)Use after free in Media Stream in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑63512023‑11‑29 12:15:07HIGH (9)Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)36NETWORK
CVE‑2023‑63502023‑11‑29 12:15:07HIGH (9)Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)36NETWORK
CVE‑2023‑63482023‑11‑29 12:15:07HIGH (9)Type Confusion in Spellcheck in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑63472023‑11‑29 12:15:07HIGH (9)Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑63462023‑11‑29 12:15:07HIGH (9)Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑63452023‑11‑29 12:15:07CRITICAL (10)Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)36NETWORK
CVE‑2023‑61122023‑11‑15 18:15:07HIGH (9)Use after free in Navigation in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑59972023‑11‑15 18:15:07HIGH (9)Use after free in Garbage Collection in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑59962023‑11‑08 20:15:08HIGH (9)Use after free in WebAudio in Google Chrome prior to 119.0.6045.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑58592023‑11‑01 18:15:11MEDIUM (4)Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑58582023‑11‑01 18:15:11MEDIUM (4)Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑58572023‑11‑01 18:15:10HIGH (9)Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑58562023‑11‑01 18:15:10HIGH (9)Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑58552023‑11‑01 18:15:10HIGH (9)Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑58542023‑11‑01 18:15:10HIGH (9)Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑58532023‑11‑01 18:15:10MEDIUM (4)Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑58522023‑11‑01 18:15:10HIGH (9)Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑58512023‑11‑01 18:15:10MEDIUM (4)Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑58502023‑11‑01 18:15:10MEDIUM (4)Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑58492023‑11‑01 18:15:10HIGH (9)Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑54872023‑10‑11 23:15:11MEDIUM (7)Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑54862023‑10‑11 23:15:11MEDIUM (4)Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑54852023‑10‑11 23:15:11MEDIUM (4)Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑54842023‑10‑11 23:15:11MEDIUM (7)Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑54832023‑10‑11 23:15:11MEDIUM (7)Inappropriate implementation in Intents in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑54822023‑11‑01 18:15:10HIGH (9)Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑54812023‑10‑11 23:15:11MEDIUM (7)Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑54802023‑11‑01 18:15:10MEDIUM (6)Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High)33NETWORK
CVE‑2023‑54792023‑10‑11 23:15:11MEDIUM (7)Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑54782023‑10‑11 23:15:11MEDIUM (4)Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑54772023‑10‑11 23:15:11MEDIUM (4)Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)31NETWORK
CVE‑2023‑54762023‑10‑11 23:15:11HIGH (9)Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑54752023‑10‑11 23:15:11MEDIUM (7)Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑54742023‑10‑11 23:15:11HIGH (9)Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑54732023‑10‑11 23:15:11MEDIUM (6)Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)33NETWORK
CVE‑2023‑54722023‑10‑25 18:17:44HIGH (9)Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑53462023‑10‑05 18:15:13HIGH (9)Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑52182023‑10‑11 23:15:10HIGH (9)Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2023‑52172023‑09‑28 16:15:11HIGH (9)Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑51872023‑09‑28 16:15:11HIGH (9)Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑51862023‑09‑28 16:15:11HIGH (9)Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)36NETWORK
CVE‑2023‑49092023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Interstitials in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑49082023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Picture in Picture in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑49072023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑49062023‑09‑12 21:15:09MEDIUM (4)Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑49052023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑49042023‑09‑12 21:15:09MEDIUM (4)Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑49032023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑49022023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑49012023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑49002023‑09‑12 21:15:09MEDIUM (4)Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑48632023‑09‑12 15:15:24HIGH (9)Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2023‑47642023‑09‑05 22:15:10MEDIUM (7)Incorrect security UI in BFCache in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)34NETWORK
CVE‑2023‑47632023‑09‑05 22:15:10HIGH (9)Use after free in Networks in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑47622023‑09‑05 22:15:10HIGH (9)Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑47612023‑09‑05 22:15:10HIGH (8)Out of bounds memory access in FedCM in Google Chrome prior to 116.0.5845.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)35NETWORK
CVE‑2023‑45722023‑08‑29 20:15:10HIGH (9)Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑44312023‑08‑23 00:15:09HIGH (8)Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)35NETWORK
CVE‑2023‑44302023‑08‑23 00:15:09HIGH (9)Use after free in Vulkan in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑44292023‑08‑23 00:15:09HIGH (9)Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑44282023‑08‑23 00:15:09HIGH (8)Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)35NETWORK
CVE‑2023‑44272023‑08‑23 00:15:09HIGH (8)Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)35NETWORK
CVE‑2023‑43692023‑08‑15 18:15:14HIGH (9)Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43682023‑08‑15 18:15:14HIGH (9)Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43672023‑08‑15 18:15:14MEDIUM (7)Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑43662023‑08‑15 18:15:13HIGH (9)Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43652023‑08‑15 18:15:13MEDIUM (4)Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑43642023‑08‑15 18:15:13MEDIUM (4)Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑43632023‑08‑15 18:15:13MEDIUM (4)Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑43622023‑08‑15 18:15:13HIGH (9)Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43612023‑08‑15 18:15:13MEDIUM (5)Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)41NETWORK
CVE‑2023‑43602023‑08‑15 18:15:13MEDIUM (4)Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑43592023‑08‑15 18:15:13MEDIUM (5)Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)41NETWORK
CVE‑2023‑43582023‑08‑15 18:15:12HIGH (9)Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43572023‑08‑15 18:15:12HIGH (9)Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43562023‑08‑15 18:15:12HIGH (9)Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑43552023‑08‑15 18:15:12HIGH (9)Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑43542023‑08‑15 18:15:12HIGH (9)Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑43532023‑08‑15 18:15:12HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑43522023‑08‑15 18:15:11HIGH (9)Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑43512023‑08‑15 18:15:11HIGH (9)Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑43502023‑08‑15 18:15:11MEDIUM (7)Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)34NETWORK
CVE‑2023‑43492023‑08‑15 18:15:11HIGH (9)Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40782023‑08‑03 01:15:12HIGH (9)Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑40772023‑08‑03 01:15:12HIGH (9)Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑40762023‑08‑03 01:15:12HIGH (9)Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)36NETWORK
CVE‑2023‑40752023‑08‑03 01:15:12HIGH (9)Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40742023‑08‑03 01:15:12HIGH (9)Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40732023‑08‑03 01:15:12HIGH (9)Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40722023‑08‑03 01:15:12HIGH (9)Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40712023‑08‑03 01:15:12HIGH (9)Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40702023‑08‑03 01:15:12HIGH (8)Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)35NETWORK
CVE‑2023‑40692023‑08‑03 01:15:12HIGH (9)Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑40682023‑08‑03 01:15:12HIGH (8)Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)35NETWORK
CVE‑2023‑37422023‑12‑20 16:15:09MEDIUM (7)Insufficient policy enforcement in ADB in Google Chrome on ChromeOS prior to 114.0.5735.90 allowed a local attacker to bypass device policy restrictions via physical access to the device. (Chromium security severity: High)16PHYSICAL
CVE‑2023‑37402023‑08‑01 23:15:34MEDIUM (4)Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)31NETWORK
CVE‑2023‑37392023‑08‑01 23:15:34MEDIUM (6)Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)33NETWORK
CVE‑2023‑37382023‑08‑01 23:15:33MEDIUM (4)Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑37372023‑08‑01 23:15:33MEDIUM (4)Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑37362023‑08‑01 23:15:33MEDIUM (4)Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑37352023‑08‑01 23:15:33MEDIUM (4)Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑37342023‑08‑01 23:15:33MEDIUM (4)Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑37332023‑08‑01 23:15:32MEDIUM (4)Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑37322023‑08‑01 23:15:32HIGH (9)Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑37312023‑08‑01 23:15:32HIGH (9)Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)36NETWORK
CVE‑2023‑37302023‑08‑01 23:15:32HIGH (9)Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑37292023‑08‑01 23:15:32HIGH (9)Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)36NETWORK
CVE‑2023‑37282023‑08‑01 23:15:31HIGH (9)Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑37272023‑08‑01 23:15:31HIGH (9)Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑35982023‑07‑28 21:15:14HIGH (9)Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑34972023‑07‑03 17:15:10MEDIUM (5)Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)14PHYSICAL
CVE‑2023‑34222023‑06‑26 21:15:10HIGH (9)Use after free in Guest View in Google Chrome prior to 114.0.5735.198 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑34212023‑06‑26 21:15:10HIGH (9)Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑34202023‑06‑26 21:15:10HIGH (9)Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑32172023‑06‑13 18:15:22HIGH (9)Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑32162023‑06‑13 18:15:22HIGH (9)Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑32152023‑06‑13 18:15:22HIGH (9)Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑32142023‑06‑13 18:15:22HIGH (9)Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2023‑30792023‑06‑05 22:15:12HIGH (9)Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑29412023‑05‑30 22:15:11MEDIUM (4)Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)31NETWORK
CVE‑2023‑29402023‑05‑30 22:15:11MEDIUM (7)Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑29392023‑05‑30 22:15:10HIGH (8)Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)26LOCAL
CVE‑2023‑29382023‑05‑30 22:15:10MEDIUM (4)Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑29372023‑05‑30 22:15:10MEDIUM (4)Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑29362023‑05‑30 22:15:10HIGH (9)Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑29352023‑05‑30 22:15:10HIGH (9)Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑29342023‑05‑30 22:15:10HIGH (9)Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑29332023‑05‑30 22:15:10HIGH (9)Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)36NETWORK
CVE‑2023‑29322023‑05‑30 22:15:10HIGH (9)Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)36NETWORK
CVE‑2023‑29312023‑05‑30 22:15:10HIGH (9)Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)36NETWORK
CVE‑2023‑29302023‑05‑30 22:15:10HIGH (9)Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑29292023‑05‑30 22:15:10HIGH (9)Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑27262023‑05‑16 19:15:09HIGH (9)Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑27252023‑05‑16 19:15:09HIGH (9)Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑27242023‑05‑16 19:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑27232023‑05‑16 19:15:09HIGH (9)Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑27222023‑05‑16 19:15:09HIGH (9)Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑27212023‑05‑16 19:15:09HIGH (9)Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2023‑24682023‑05‑03 00:15:10MEDIUM (4)Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed a remote attacker who had compromised the renderer process to obfuscate the security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑24672023‑05‑03 00:15:10MEDIUM (4)Inappropriate implementation in Prompts in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to bypass permissions restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑24662023‑05‑03 00:15:10MEDIUM (4)Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑24652023‑05‑03 00:15:10MEDIUM (4)Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑24642023‑05‑03 00:15:10MEDIUM (4)Inappropriate implementation in PictureInPicture in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to perform an origin spoof in the security UI via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑24632023‑05‑03 00:15:09MEDIUM (4)Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑24622023‑05‑03 00:15:09MEDIUM (4)Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to obfuscate main origin data via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑24612023‑05‑03 00:15:09HIGH (9)Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑24602023‑05‑03 00:15:09HIGH (7)Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑24592023‑05‑03 00:15:09MEDIUM (7)Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to bypass permission restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑24582023‑05‑12 18:15:10HIGH (9)Use after free in ChromeOS Camera in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: High)36NETWORK
CVE‑2023‑24572023‑05‑12 18:15:10HIGH (9)Out of bounds write in ChromeOS Audio Server in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker to potentially exploit heap corruption via crafted audio file. (Chromium security severity: High)36NETWORK
CVE‑2023‑23142023‑07‑29 00:15:12MEDIUM (7)Insufficient data validation in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑23132023‑07‑29 00:15:12HIGH (9)Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)36NETWORK
CVE‑2023‑23122023‑08‑15 18:15:10HIGH (9)Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑23112023‑07‑29 00:15:12MEDIUM (7)Insufficient policy enforcement in File System API in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑21372023‑04‑19 04:15:32HIGH (9)Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑21362023‑04‑19 04:15:32CRITICAL (10)Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑21352023‑04‑19 04:15:32HIGH (8)Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)26NETWORK
CVE‑2023‑21342023‑04‑19 04:15:31HIGH (9)Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑21332023‑04‑19 04:15:31HIGH (9)Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑20332023‑04‑14 19:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑18232023‑04‑04 22:15:08MEDIUM (7)Inappropriate implementation in FedCM in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑18222023‑04‑04 22:15:08MEDIUM (7)Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑18212023‑04‑04 22:15:08MEDIUM (7)Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑18202023‑04‑04 22:15:08HIGH (9)Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑18192023‑04‑04 22:15:08MEDIUM (7)Out of bounds read in Accessibility in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑18182023‑04‑04 22:15:08HIGH (9)Use after free in Vulkan in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑18172023‑04‑04 22:15:08MEDIUM (7)Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑18162023‑04‑04 22:15:08MEDIUM (7)Incorrect security UI in Picture In Picture in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially perform navigation spoofing via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑18152023‑04‑04 22:15:08HIGH (9)Use after free in Networking APIs in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑18142023‑04‑04 22:15:07MEDIUM (7)Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑18132023‑04‑04 22:15:07MEDIUM (7)Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑18122023‑04‑04 22:15:07HIGH (9)Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑18112023‑04‑04 22:15:07HIGH (9)Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑18102023‑04‑04 22:15:07HIGH (9)Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑15342023‑03‑21 21:15:13HIGH (9)Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑15332023‑03‑21 21:15:13HIGH (9)Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑15322023‑03‑21 21:15:13HIGH (9)Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑15312023‑03‑21 21:15:13HIGH (9)Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑15302023‑03‑21 21:15:12HIGH (9)Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑15292023‑03‑21 21:15:12CRITICAL (10)Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)46NETWORK
CVE‑2023‑15282023‑03‑21 21:15:12HIGH (9)Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12362023‑03‑07 22:15:11MEDIUM (4)Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑12352023‑03‑07 22:15:11MEDIUM (6)Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction. (Chromium security severity: Low)33NETWORK
CVE‑2023‑12342023‑03‑07 22:15:10MEDIUM (4)Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑12332023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low)31NETWORK
CVE‑2023‑12322023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑12312023‑03‑07 22:15:10MEDIUM (4)Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12302023‑03‑07 22:15:10MEDIUM (4)Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12292023‑03‑07 22:15:10MEDIUM (4)Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12282023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12272023‑03‑07 22:15:10HIGH (9)Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑12262023‑03‑07 22:15:10MEDIUM (7)Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑12252023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12242023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12232023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12222023‑03‑07 22:15:10HIGH (9)Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑12212023‑03‑07 22:15:10MEDIUM (4)Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)31NETWORK
CVE‑2023‑12202023‑03‑07 22:15:10HIGH (9)Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12192023‑03‑07 22:15:10HIGH (9)Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12182023‑03‑07 22:15:10HIGH (9)Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12172023‑03‑07 22:15:10MEDIUM (7)Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)34NETWORK
CVE‑2023‑12162023‑03‑07 22:15:09HIGH (9)Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12152023‑03‑07 22:15:09HIGH (9)Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12142023‑03‑07 22:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑12132023‑03‑07 22:15:09HIGH (9)Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑09412023‑02‑22 20:15:12HIGH (9)Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)36NETWORK
CVE‑2023‑09332023‑02‑22 20:15:12HIGH (9)Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑09322023‑02‑22 20:15:12HIGH (9)Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑09312023‑02‑22 20:15:12HIGH (9)Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑09302023‑02‑22 20:15:12HIGH (9)Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑09292023‑02‑22 20:15:12HIGH (9)Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑09282023‑02‑22 20:15:12HIGH (9)Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑09272023‑02‑22 20:15:12HIGH (9)Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑07052023‑02‑07 21:15:10HIGH (8)Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)26NETWORK
CVE‑2023‑07042023‑02‑07 21:15:10MEDIUM (7)Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑07032023‑02‑07 21:15:10HIGH (9)Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑07022023‑02‑07 21:15:10HIGH (9)Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑07012023‑02‑07 21:15:10HIGH (9)Heap buffer overflow in WebUI in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interaction . (Chromium security severity: Medium)36NETWORK
CVE‑2023‑07002023‑02‑07 21:15:10MEDIUM (7)Inappropriate implementation in Download in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑06992023‑02‑07 21:15:09HIGH (9)Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑06982023‑02‑07 21:15:09HIGH (9)Out of bounds read in WebRTC in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑06972023‑02‑07 21:15:09MEDIUM (7)Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High)34NETWORK
CVE‑2023‑06962023‑02‑07 21:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑04742023‑01‑30 09:15:09HIGH (9)Use after free in GuestView in Google Chrome prior to 109.0.5414.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a Chrome web app. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑04732023‑01‑30 09:15:09HIGH (9)Type Confusion in ServiceWorker API in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑04722023‑01‑30 09:15:09HIGH (9)Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑04712023‑01‑30 09:15:09HIGH (9)Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2023‑01412023‑01‑10 20:15:11MEDIUM (4)Insufficient policy enforcement in CORS in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2023‑01402023‑01‑10 20:15:11MEDIUM (7)Inappropriate implementation in in File System API in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑01392023‑01‑10 20:15:11MEDIUM (7)Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2023‑01382023‑01‑10 20:15:11HIGH (9)Heap buffer overflow in libphonenumber in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)36NETWORK
CVE‑2023‑01372023‑01‑10 20:15:11HIGH (9)Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑01362023‑01‑10 20:15:11HIGH (9)Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑01352023‑01‑10 20:15:11HIGH (9)Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑01342023‑01‑10 20:15:11HIGH (9)Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2023‑01332023‑01‑10 20:15:11MEDIUM (7)Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑01322023‑01‑10 20:15:11MEDIUM (7)Inappropriate implementation in in Permission prompts in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to force acceptance of a permission prompt via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑01312023‑01‑10 20:15:11MEDIUM (7)Inappropriate implementation in in iframe Sandbox in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to bypass file download restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑01302023‑01‑10 20:15:11MEDIUM (7)Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2023‑01292023‑01‑10 20:15:11HIGH (9)Heap buffer overflow in Network Service in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. (Chromium security severity: High)36NETWORK
CVE‑2023‑01282023‑01‑10 20:15:11HIGH (9)Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑49552023‑08‑04 20:15:10MEDIUM (7)Inappropriate implementation in DevTools in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑49262023‑07‑29 00:15:12MEDIUM (7)Insufficient policy enforcement in Intents in Google Chrome on Android prior to 109.0.5414.119 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑49252023‑07‑29 00:15:12MEDIUM (7)Insufficient validation of untrusted input in QUIC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform header splitting via malicious network traffic. (Chromium security severity: Low)34NETWORK
CVE‑2022‑49242023‑07‑29 00:15:12CRITICAL (10)Use after free in WebRTC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑49232023‑07‑29 00:15:12LOW (3)Inappropriate implementation in Omnibox in Google Chrome prior to 99.0.4844.51 allowed an attacker in a privileged network position to perform a man-in-the-middle attack via malicious network traffic. (Chromium security severity: Low)13NETWORK
CVE‑2022‑49222023‑07‑29 00:15:12MEDIUM (7)Inappropriate implementation in Blink in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑49212023‑07‑29 00:15:12HIGH (9)Use after free in Accessibility in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Low)36NETWORK
CVE‑2022‑49202023‑07‑29 00:15:12CRITICAL (10)Heap buffer overflow in Blink in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑49192023‑07‑29 00:15:12HIGH (9)Use after free in Base Internals in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑49182023‑07‑29 00:15:11HIGH (9)Use after free in UI in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑49172023‑07‑29 00:15:11MEDIUM (4)Incorrect security UI in Notifications in Google Chrome on Android prior to 103.0.5060.53 allowed a remote attacker to obscure the full screen notification via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2022‑49162023‑07‑29 00:15:11HIGH (9)Use after free in Media in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑49152023‑07‑29 00:15:11MEDIUM (7)Inappropriate implementation in URL Formatting in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑49142023‑07‑29 00:15:11HIGH (9)Heap buffer overflow in PrintPreview in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑49132023‑07‑29 00:15:11MEDIUM (7)Inappropriate implementation in Extensions in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to spoof extension storage via a crafted HTML page. (Chromium security severity: High)34NETWORK
CVE‑2022‑49122023‑07‑29 00:15:11HIGH (9)Type Confusion in MathML in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑49112023‑07‑29 00:15:11MEDIUM (7)Insufficient data validation in DevTools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)34NETWORK
CVE‑2022‑49102023‑07‑29 00:15:11MEDIUM (5)Inappropriate implementation in Autofill in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)33NETWORK
CVE‑2022‑49092023‑07‑29 00:15:11MEDIUM (6)Inappropriate implementation in XML in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially perform an ASLR bypass via a crafted HTML page. (Chromium security severity: Low)33NETWORK
CVE‑2022‑49082023‑07‑29 00:15:11MEDIUM (4)Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑49072023‑07‑29 00:15:11HIGH (9)Uninitialized Use in FFmpeg in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑49062023‑07‑29 00:15:11HIGH (9)Inappropriate implementation in Blink in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑44522023‑08‑25 15:15:08HIGH (9)Insufficient data validation in crosvm in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑44402022‑12‑14 06:15:10HIGH (9)Use after free in Profiles in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑44392022‑12‑14 06:15:10HIGH (9)Use after free in Aura in Google Chrome on Windows prior to 108.0.5359.124 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: High)36NETWORK
CVE‑2022‑44382022‑12‑14 06:15:10HIGH (9)Use after free in Blink Frames in Google Chrome prior to 108.0.5359.124 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑44372022‑12‑14 06:15:10HIGH (9)Use after free in Mojo IPC in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑44362022‑12‑14 06:15:10HIGH (9)Use after free in Blink Media in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑42622022‑12‑02 21:15:12HIGH (9)Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑41952022‑11‑30 00:15:11MEDIUM (4)Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass Safe Browsing warnings via a malicious file. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41942022‑11‑30 00:15:11HIGH (9)Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑41932022‑11‑30 00:15:11HIGH (9)Insufficient policy enforcement in File System API in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑41922022‑11‑30 00:15:11HIGH (9)Use after free in Live Caption in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑41912022‑11‑30 00:15:11HIGH (9)Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑41902022‑11‑30 00:15:11HIGH (9)Insufficient data validation in Directory in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑41892022‑11‑30 00:15:11MEDIUM (4)Insufficient policy enforcement in DevTools in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41882022‑11‑30 00:15:11MEDIUM (4)Insufficient validation of untrusted input in CORS in Google Chrome on Android prior to 108.0.5359.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41872022‑11‑30 00:15:11MEDIUM (7)Insufficient policy enforcement in DevTools in Google Chrome on Windows prior to 108.0.5359.71 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑41862022‑11‑30 00:15:11MEDIUM (4)Insufficient validation of untrusted input in Downloads in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass Downloads restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41852022‑11‑30 00:15:11MEDIUM (4)Inappropriate implementation in Navigation in Google Chrome on iOS prior to 108.0.5359.71 allowed a remote attacker to spoof the contents of the modal dialogue via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41842022‑11‑30 00:15:11MEDIUM (4)Insufficient policy enforcement in Autofill in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41832022‑11‑30 00:15:10MEDIUM (4)Insufficient policy enforcement in Popup Blocker in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41822022‑11‑30 00:15:10MEDIUM (4)Inappropriate implementation in Fenced Frames in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass fenced frame restrictions via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑41812022‑11‑30 00:15:10HIGH (9)Use after free in Forms in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑41802022‑11‑30 00:15:10HIGH (9)Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)36NETWORK
CVE‑2022‑41792022‑11‑30 00:15:10HIGH (9)Use after free in Audio in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)36NETWORK
CVE‑2022‑41782022‑11‑30 00:15:10HIGH (9)Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑41772022‑11‑30 00:15:10HIGH (9)Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)36NETWORK
CVE‑2022‑41762022‑11‑30 00:15:10HIGH (9)Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)36NETWORK
CVE‑2022‑41752022‑11‑30 00:15:10HIGH (9)Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑41742022‑11‑30 00:15:10HIGH (9)Type confusion in V8 in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑41352022‑11‑25 01:15:10CRITICAL (10)Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑40252023‑01‑02 23:15:11MEDIUM (4)Inappropriate implementation in Paint in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data outside an iframe via a crafted HTML page. (Chrome security severity: Low)31NETWORK
CVE‑2022‑38902022‑11‑09 04:15:10CRITICAL (10)Heap buffer overflow in Crashpad in Google Chrome on Android prior to 107.0.5304.106 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑38892022‑11‑09 04:15:10HIGH (9)Type confusion in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑38882022‑11‑09 04:15:10HIGH (9)Use after free in WebCodecs in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑38872022‑11‑09 04:15:10HIGH (9)Use after free in Web Workers in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑38862022‑11‑09 04:15:10HIGH (9)Use after free in Speech Recognition in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑38852022‑11‑09 04:15:09HIGH (9)Use after free in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑38632023‑01‑02 23:15:11MEDIUM (6)Use after free in Browser History in Google Chrome prior to 100.0.4896.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)24NETWORK
CVE‑2022‑38422023‑01‑02 23:15:11HIGH (8)Use after free in Passwords in Google Chrome prior to 105.0.5195.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)26NETWORK
CVE‑2022‑37232022‑11‑01 23:15:20HIGH (9)Type confusion in V8 in Google Chrome prior to 107.0.5304.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑36612022‑11‑01 23:15:20MEDIUM (4)Insufficient data validation in Extensions in Google Chrome prior to 107.0.5304.62 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted Chrome extension. (Chromium security severity: Low)31NETWORK
CVE‑2022‑36602022‑11‑01 23:15:19MEDIUM (4)Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 107.0.5304.62 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)31NETWORK
CVE‑2022‑36592022‑11‑01 23:15:19HIGH (9)Use after free in Accessibility in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑36582022‑11‑01 23:15:19HIGH (9)Use after free in Feedback service on Chrome OS in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑36572022‑11‑01 23:15:19HIGH (9)Use after free in Extensions in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑36562022‑11‑01 23:15:19HIGH (9)Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑36552022‑11‑01 23:15:19HIGH (9)Heap buffer overflow in Media Galleries in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)36NETWORK
CVE‑2022‑36542022‑11‑01 23:15:19HIGH (9)Use after free in Layout in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑36532022‑11‑01 23:15:19HIGH (9)Heap buffer overflow in Vulkan in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑36522022‑11‑01 23:15:19HIGH (9)Type confusion in V8 in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑34502022‑11‑09 19:15:11HIGH (9)Use after free in Peer Connection in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑34492022‑11‑09 19:15:11HIGH (9)Use after free in Safe Browsing in Google Chrome prior to 106.0.5249.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)36NETWORK
CVE‑2022‑34482022‑11‑09 19:15:11HIGH (9)Use after free in Permissions API in Google Chrome prior to 106.0.5249.119 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑34472022‑11‑09 19:15:11MEDIUM (4)Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 106.0.5249.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)31NETWORK
CVE‑2022‑34462022‑11‑09 19:15:11HIGH (9)Heap buffer overflow in WebSQL in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑34452022‑11‑09 19:15:10HIGH (9)Use after free in Skia in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑34442022‑11‑01 20:15:22MEDIUM (4)Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page and malicious file. (Chromium security severity: Low)31NETWORK
CVE‑2022‑34432022‑11‑01 20:15:22MEDIUM (4)Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2022‑33732022‑11‑01 03:15:11HIGH (9)Out of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑33702022‑11‑01 03:15:11HIGH (9)Use after free in Custom Elements in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑33182022‑11‑01 20:15:22MEDIUM (4)Use after free in ChromeOS Notifications in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to reboot Chrome OS to potentially exploit heap corruption via UI interaction. (Chromium security severity: Low)31NETWORK
CVE‑2022‑33172022‑11‑01 20:15:22MEDIUM (4)Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2022‑33162022‑11‑01 20:15:22MEDIUM (4)Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass security feature via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2022‑33152022‑11‑01 20:15:22HIGH (9)Type confusion in Blink in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)36NETWORK
CVE‑2022‑33142022‑11‑01 20:15:22MEDIUM (7)Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑33132022‑11‑01 20:15:22MEDIUM (7)Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑33122022‑11‑01 20:15:21MEDIUM (5)Insufficient validation of untrusted input in VPN in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a local attacker to bypass managed device restrictions via physical access to the device. (Chromium security severity: Medium)14PHYSICAL
CVE‑2022‑33112022‑11‑01 20:15:21MEDIUM (7)Use after free in import in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑33102022‑11‑01 20:15:21MEDIUM (7)Insufficient policy enforcement in custom tabs in Google Chrome on Android prior to 106.0.5249.62 allowed an attacker who convinced the user to install an application to bypass same origin policy via a crafted application. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑33092022‑11‑01 20:15:21MEDIUM (7)Use after free in assistant in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑33082022‑11‑01 20:15:21HIGH (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)34NETWORK
CVE‑2022‑33072022‑11‑01 20:15:21HIGH (9)Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑33062022‑11‑01 20:15:21HIGH (9)Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑33052022‑11‑01 20:15:21HIGH (9)Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑33042022‑11‑01 19:15:11HIGH (9)Use after free in CSS in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑32012022‑09‑26 16:15:14MEDIUM (5)Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High)33NETWORK
CVE‑2022‑32002022‑09‑26 16:15:14HIGH (9)Heap buffer overflow in Internals in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑31992022‑09‑26 16:15:14HIGH (9)Use after free in Frames in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑31982022‑09‑26 16:15:14HIGH (9)Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)36NETWORK
CVE‑2022‑31972022‑09‑26 16:15:14HIGH (9)Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)36NETWORK
CVE‑2022‑31962022‑09‑26 16:15:14HIGH (9)Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)36NETWORK
CVE‑2022‑31952022‑09‑26 16:15:14HIGH (9)Out of bounds write in Storage in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2022‑30752022‑09‑26 16:15:13CRITICAL (10)Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑30712022‑09‑26 16:15:13HIGH (9)Use after free in Tab Strip in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.36NETWORK
CVE‑2022‑30582022‑09‑26 16:15:13HIGH (9)Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.36NETWORK
CVE‑2022‑30572022‑09‑26 16:15:13MEDIUM (7)Inappropriate implementation in iframe Sandbox in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑30562022‑09‑26 16:15:13MEDIUM (7)Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2022‑30552022‑09‑26 16:15:13HIGH (9)Use after free in Passwords in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30542022‑09‑26 16:15:13MEDIUM (7)Insufficient policy enforcement in DevTools in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2022‑30532022‑09‑26 16:15:13MEDIUM (4)Inappropriate implementation in Pointer Lock in Google Chrome on Mac prior to 105.0.5195.52 allowed a remote attacker to restrict user navigation via a crafted HTML page.31NETWORK
CVE‑2022‑30522022‑09‑26 16:15:13HIGH (9)Heap buffer overflow in Window Manager in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.36NETWORK
CVE‑2022‑30512022‑09‑26 16:15:13HIGH (9)Heap buffer overflow in Exosphere in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.36NETWORK
CVE‑2022‑30502022‑09‑26 16:15:13HIGH (9)Heap buffer overflow in WebUI in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.36NETWORK
CVE‑2022‑30492022‑09‑26 16:15:13HIGH (9)Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30482022‑09‑26 16:15:12MEDIUM (7)Inappropriate implementation in Chrome OS lockscreen in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a local attacker to bypass lockscreen navigation restrictions via physical access to the device.16PHYSICAL
CVE‑2022‑30472022‑09‑26 16:15:12MEDIUM (7)Insufficient policy enforcement in Extensions API in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.34NETWORK
CVE‑2022‑30462022‑09‑26 16:15:12HIGH (9)Use after free in Browser Tag in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30452022‑09‑26 16:15:12HIGH (9)Insufficient validation of untrusted input in V8 in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30442022‑09‑26 16:15:12MEDIUM (7)Inappropriate implementation in Site Isolation in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2022‑30432022‑09‑26 16:15:12HIGH (9)Heap buffer overflow in Screen Capture in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30422022‑09‑26 16:15:12HIGH (9)Use after free in PhoneHub in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30412022‑09‑26 16:15:12HIGH (9)Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30402022‑09‑26 16:15:12HIGH (9)Use after free in Layout in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30392022‑09‑26 16:15:12HIGH (9)Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑30382022‑09‑26 16:15:12HIGH (9)Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑29982022‑09‑26 16:15:12HIGH (9)Use after free in Browser Creation in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who had convinced a user to engage in a specific UI interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑28612022‑09‑26 16:15:12MEDIUM (7)Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.101 allowed an attacker who convinced a user to install a malicious extension to inject arbitrary scripts into WebUI via a crafted HTML page.34NETWORK
CVE‑2022‑28602022‑09‑26 16:15:12MEDIUM (7)Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to bypass cookie prefix restrictions via a crafted HTML page.34NETWORK
CVE‑2022‑28592022‑09‑26 16:15:11HIGH (9)Use after free in Chrome OS Shell in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑28582022‑09‑26 16:15:11HIGH (9)Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction.36NETWORK
CVE‑2022‑28572022‑09‑26 16:15:11HIGH (9)Use after free in Blink in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑28562022‑09‑26 16:15:11MEDIUM (7)Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page.34NETWORK
CVE‑2022‑28552022‑09‑26 16:15:11HIGH (9)Use after free in ANGLE in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑28542022‑09‑26 16:15:11HIGH (9)Use after free in SwiftShader in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑28532022‑09‑26 16:15:11HIGH (9)Heap buffer overflow in Downloads in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑28522022‑09‑26 16:15:11HIGH (9)Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑27432023‑01‑02 23:15:11HIGH (9)Integer overflow in Window Manager in Google Chrome on Chrome OS and Lacros prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific UI interactions to perform an out of bounds memory write via crafted UI interactions. (Chrome security severity: High)36NETWORK
CVE‑2022‑27422023‑01‑02 23:15:11HIGH (9)Use after free in Exosphere in Google Chrome on Chrome OS and Lacros prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chrome security severity: High)36NETWORK
CVE‑2022‑26242022‑08‑12 20:15:09HIGH (9)Heap buffer overflow in PDF in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2022‑26232022‑08‑12 20:15:09HIGH (9)Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26222022‑08‑12 20:15:09MEDIUM (7)Insufficient validation of untrusted input in Safe Browsing in Google Chrome on Windows prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a crafted file.34NETWORK
CVE‑2022‑26212022‑08‑12 20:15:09HIGH (9)Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26202022‑08‑12 20:15:09HIGH (9)Use after free in WebUI in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26192022‑08‑12 20:15:09MEDIUM (4)Insufficient validation of untrusted input in Settings in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted HTML page.31NETWORK
CVE‑2022‑26182022‑08‑12 20:15:09MEDIUM (7)Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file .34NETWORK
CVE‑2022‑26172022‑08‑12 20:15:09HIGH (9)Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26162022‑08‑12 20:15:09MEDIUM (7)Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.34NETWORK
CVE‑2022‑26152022‑08‑12 20:15:09MEDIUM (7)Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑26142022‑08‑12 20:15:09HIGH (9)Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑26132022‑08‑12 20:15:09HIGH (9)Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26122022‑08‑12 20:15:09MEDIUM (7)Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2022‑26112022‑08‑12 20:15:09MEDIUM (4)Inappropriate implementation in Fullscreen API in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2022‑26102022‑08‑12 20:15:09MEDIUM (7)Insufficient policy enforcement in Background Fetch in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑26092022‑08‑12 20:15:09HIGH (9)Use after free in Nearby Share in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26082022‑08‑12 20:15:09HIGH (9)Use after free in Overview Mode in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26072022‑08‑12 20:15:09HIGH (9)Use after free in Tab Strip in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑26062022‑08‑12 20:15:09HIGH (9)Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑26052022‑08‑12 20:15:09MEDIUM (7)Out of bounds read in Dawn in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2022‑26042022‑08‑12 20:15:09HIGH (9)Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑26032022‑08‑12 20:15:09HIGH (9)Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑25872022‑08‑12 20:15:09CRITICAL (10)Out of bounds write in Chrome OS Audio Server in Google Chrome on Chrome OS prior to 102.0.5005.125 allowed a remote attacker to potentially exploit heap corruption via crafted audio metadata.46NETWORK
CVE‑2022‑24812022‑07‑28 02:15:08HIGH (9)Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.36NETWORK
CVE‑2022‑24802022‑07‑28 02:15:08HIGH (9)Use after free in Service Worker API in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑24792022‑07‑28 02:15:08MEDIUM (4)Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page.31NETWORK
CVE‑2022‑24782022‑07‑28 02:15:08HIGH (9)Use after free in PDF in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑24772022‑07‑28 02:15:08HIGH (9)Use after free in Guest View in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑24152022‑07‑28 01:15:17HIGH (9)Heap buffer overflow in WebGL in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑23992022‑07‑28 22:15:08HIGH (9)Use after free in WebGPU in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑22962022‑07‑28 02:15:08HIGH (9)Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 103.0.5060.114 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via direct UI interactions.36NETWORK
CVE‑2022‑22952022‑07‑28 02:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑22942022‑07‑28 02:15:08HIGH (9)Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑21652022‑07‑28 01:15:17MEDIUM (4)Insufficient data validation in URL formatting in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2022‑21642022‑07‑28 01:15:17MEDIUM (6)Inappropriate implementation in Extensions API in Google Chrome prior to 103.0.5060.53 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted HTML page.33NETWORK
CVE‑2022‑21632022‑07‑28 02:15:07HIGH (9)Use after free in Cast UI and Toolbar in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via UI interaction.36NETWORK
CVE‑2022‑21622022‑07‑28 01:15:17HIGH (9)Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 103.0.5060.53 allowed a remote attacker to bypass file system access via a crafted HTML page.36NETWORK
CVE‑2022‑21612022‑07‑28 01:15:17HIGH (9)Use after free in WebApp Provider in Google Chrome prior to 103.0.5060.53 allowed a remote attacker who convinced the user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.36NETWORK
CVE‑2022‑21602022‑07‑28 01:15:17MEDIUM (7)Insufficient policy enforcement in DevTools in Google Chrome on Windows prior to 103.0.5060.53 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from a user's local files via a crafted HTML page.34NETWORK
CVE‑2022‑21582022‑07‑28 01:15:17HIGH (9)Type confusion in V8 in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑21572022‑07‑28 01:15:17HIGH (9)Use after free in Interest groups in Google Chrome prior to 103.0.5060.53 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑21562022‑07‑28 01:15:17HIGH (9)Use after free in Core in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑20112022‑07‑28 01:15:17HIGH (9)Use after free in ANGLE in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑20102022‑07‑28 01:15:17CRITICAL (9)Out of bounds read in compositing in Google Chrome prior to 102.0.5005.115 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑20082022‑07‑28 01:15:17HIGH (9)Double free in WebGL in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑20072022‑07‑28 01:15:17HIGH (9)Use after free in WebGPU in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑19192022‑07‑28 01:15:16HIGH (9)Use after free in Codecs in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑18762022‑07‑27 22:15:10HIGH (9)Heap buffer overflow in DevTools in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑18752022‑07‑27 22:15:10MEDIUM (4)Inappropriate implementation in PDF in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2022‑18742022‑07‑27 22:15:09HIGH (9)Insufficient policy enforcement in Safe Browsing in Google Chrome on Mac prior to 102.0.5005.61 allowed a remote attacker to bypass downloads protection policy via a crafted HTML page.36NETWORK
CVE‑2022‑18732022‑07‑27 22:15:09MEDIUM (7)Insufficient policy enforcement in COOP in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑18722022‑07‑27 22:15:09MEDIUM (4)Insufficient policy enforcement in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.31NETWORK
CVE‑2022‑18712022‑07‑27 22:15:09MEDIUM (4)Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass file system policy via a crafted HTML page.31NETWORK
CVE‑2022‑18702022‑07‑27 22:15:09HIGH (9)Use after free in App Service in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2022‑18692022‑07‑27 22:15:09MEDIUM (7)Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2022‑18682022‑07‑27 22:15:09MEDIUM (7)Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2022‑18672022‑07‑27 22:15:09MEDIUM (7)Insufficient validation of untrusted input in Data Transfer in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass same origin policy via a crafted clipboard content.34NETWORK
CVE‑2022‑18662022‑07‑27 22:15:09HIGH (9)Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑18652022‑07‑27 22:15:09HIGH (9)Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.36NETWORK
CVE‑2022‑18642022‑07‑27 22:15:09HIGH (9)Use after free in WebApp Installs in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.36NETWORK
CVE‑2022‑18632022‑07‑27 22:15:09HIGH (9)Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.36NETWORK
CVE‑2022‑18622022‑07‑27 22:15:09MEDIUM (7)Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page.34NETWORK
CVE‑2022‑18612022‑07‑27 22:15:09HIGH (9)Use after free in Sharing in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction.36NETWORK
CVE‑2022‑18602022‑07‑27 22:15:09HIGH (9)Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑18592022‑07‑27 22:15:09HIGH (9)Use after free in Performance Manager in Google Chrome prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑18582022‑07‑27 22:15:09MEDIUM (7)Out of bounds read in DevTools in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform an out of bounds memory read via specific user interaction.34NETWORK
CVE‑2022‑18572022‑07‑27 22:15:09HIGH (9)Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass file system restrictions via a crafted HTML page.36NETWORK
CVE‑2022‑18562022‑07‑27 22:15:09HIGH (9)Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.36NETWORK
CVE‑2022‑18552022‑07‑27 22:15:09HIGH (9)Use after free in Messaging in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑18542022‑07‑27 22:15:09HIGH (9)Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑18532022‑07‑27 22:15:09CRITICAL (10)Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑16412022‑07‑26 22:15:11HIGH (9)Use after free in Web UI Diagnostics in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interaction.36NETWORK
CVE‑2022‑16402022‑07‑26 22:15:11HIGH (9)Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑16392022‑07‑26 22:15:11HIGH (9)Use after free in ANGLE in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑16382022‑07‑26 22:15:11HIGH (9)Heap buffer overflow in V8 Internationalization in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑16372022‑07‑26 22:15:11MEDIUM (4)Inappropriate implementation in Web Contents in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2022‑16362022‑07‑26 22:15:11HIGH (9)Use after free in Performance APIs in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑16352022‑07‑26 22:15:10HIGH (9)Use after free in Permission Prompts in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑16342022‑07‑26 22:15:10HIGH (9)Use after free in Browser UI in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who had convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑16332022‑07‑26 22:15:10HIGH (9)Use after free in Sharesheet in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑15012022‑07‑26 22:15:10MEDIUM (7)Inappropriate implementation in iframe in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑15002022‑07‑26 22:15:10MEDIUM (7)Insufficient data validation in Dev Tools in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2022‑14992022‑07‑26 22:15:10MEDIUM (6)Inappropriate implementation in WebAuthentication in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass same origin policy via a crafted HTML page.33NETWORK
CVE‑2022‑14982022‑07‑26 22:15:10MEDIUM (4)Inappropriate implementation in HTML Parser in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2022‑14972022‑07‑26 22:15:10MEDIUM (7)Inappropriate implementation in Input in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to spoof the contents of cross-origin websites via a crafted HTML page.34NETWORK
CVE‑2022‑14962022‑07‑26 22:15:10HIGH (9)Use after free in File Manager in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.36NETWORK
CVE‑2022‑14952022‑07‑26 22:15:10MEDIUM (4)Incorrect security UI in Downloads in Google Chrome on Android prior to 101.0.4951.41 allowed a remote attacker to spoof the APK downloads dialog via a crafted HTML page.31NETWORK
CVE‑2022‑14942022‑07‑26 22:15:10MEDIUM (6)Insufficient data validation in Trusted Types in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass trusted types policy via a crafted HTML page.33NETWORK
CVE‑2022‑14932022‑07‑26 22:15:10HIGH (9)Use after free in Dev Tools in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.36NETWORK
CVE‑2022‑14922022‑07‑26 22:15:10MEDIUM (6)Insufficient data validation in Blink Editing in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to inject arbitrary scripts or HTML via a crafted HTML page.33NETWORK
CVE‑2022‑14912022‑07‑26 22:15:10HIGH (9)Use after free in Bookmarks in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.36NETWORK
CVE‑2022‑14902022‑07‑26 22:15:10HIGH (9)Use after free in Browser Switcher in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑14892022‑07‑26 22:15:10HIGH (9)Out of bounds memory access in UI Shelf in Google Chrome on Chrome OS, Lacros prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑14882022‑07‑26 22:15:10MEDIUM (4)Inappropriate implementation in Extensions API in Google Chrome prior to 101.0.4951.41 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.31NETWORK
CVE‑2022‑14872022‑07‑26 22:15:10HIGH (8)Use after free in Ozone in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via running a Wayland test.44NETWORK
CVE‑2022‑14862022‑07‑26 22:15:10HIGH (9)Type confusion in V8 in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.36NETWORK
CVE‑2022‑14852022‑07‑26 22:15:10HIGH (8)Use after free in File System API in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.26NETWORK
CVE‑2022‑14842022‑07‑26 22:15:10HIGH (9)Heap buffer overflow in Web UI Settings in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑14832022‑07‑26 22:15:10HIGH (9)Heap buffer overflow in WebGPU in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑14822022‑07‑26 22:15:10MEDIUM (7)Inappropriate implementation in WebGL in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2022‑14812022‑07‑26 22:15:09HIGH (9)Use after free in Sharing in Google Chrome on Mac prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑14792022‑07‑26 22:15:09HIGH (9)Use after free in ANGLE in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑14782022‑07‑26 22:15:09HIGH (9)Use after free in SwiftShader in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑14772022‑07‑26 22:15:09HIGH (9)Use after free in Vulkan in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13642022‑07‑26 22:15:09HIGH (9)Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13142022‑07‑25 14:15:11HIGH (9)Type confusion in V8 in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13132022‑07‑25 14:15:11HIGH (9)Use after free in tab groups in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13122022‑07‑25 14:15:11CRITICAL (10)Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2022‑13112022‑07‑25 14:15:11HIGH (9)Use after free in shell in Google Chrome on ChromeOS prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13102022‑07‑25 14:15:11HIGH (9)Use after free in regular expressions in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13092022‑07‑25 14:15:11CRITICAL (10)Insufficient policy enforcement in developer tools in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑13082022‑07‑25 14:15:11HIGH (9)Use after free in BFCache in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑13072022‑07‑25 14:15:11MEDIUM (4)Inappropriate implementation in full screen in Google Chrome on Android prior to 100.0.4896.88 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2022‑13062022‑07‑25 14:15:10MEDIUM (4)Inappropriate implementation in compositing in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2022‑13052022‑07‑25 14:15:10HIGH (9)Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑12322022‑07‑25 14:15:10HIGH (9)Type confusion in V8 in Google Chrome prior to 100.0.4896.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑11462022‑07‑23 00:15:09MEDIUM (7)Inappropriate implementation in Resource Timing in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑11452022‑07‑23 00:15:09HIGH (8)Use after free in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interaction and profile destruction.26NETWORK
CVE‑2022‑11442022‑07‑23 00:15:09HIGH (9)Use after free in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.36NETWORK
CVE‑2022‑11432022‑07‑23 00:15:09HIGH (9)Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.36NETWORK
CVE‑2022‑11422022‑07‑23 00:15:09HIGH (9)Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.36NETWORK
CVE‑2022‑11412022‑07‑23 00:15:09HIGH (9)Use after free in File Manager in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user gesture.36NETWORK
CVE‑2022‑11392022‑07‑23 00:15:09MEDIUM (7)Inappropriate implementation in Background Fetch API in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑11382022‑07‑23 00:15:09MEDIUM (7)Inappropriate implementation in Web Cursor in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who had compromised the renderer process to obscure the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2022‑11372022‑07‑23 00:15:09MEDIUM (7)Inappropriate implementation in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to leak potentially sensitive information via a crafted HTML page.34NETWORK
CVE‑2022‑11362022‑07‑23 00:15:09HIGH (9)Use after free in Tab Strip in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific set of user gestures.36NETWORK
CVE‑2022‑11352022‑07‑23 00:15:09HIGH (9)Use after free in Shopping Cart in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via standard feature user interaction.36NETWORK
CVE‑2022‑11342022‑07‑23 00:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑11332022‑07‑23 00:15:09HIGH (9)Use after free in WebRTC Perf in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑11322022‑07‑23 00:15:09MEDIUM (6)Inappropriate implementation in Virtual Keyboard in Google Chrome on Chrome OS prior to 100.0.4896.60 allowed a local attacker to bypass navigation restrictions via physical access to the device.15PHYSICAL
CVE‑2022‑11312022‑07‑23 00:15:09HIGH (9)Use after free in Cast UI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑11302022‑07‑23 00:15:09HIGH (8)Insufficient validation of trust input in WebOTP in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to send arbitrary intents from any app via a malicious app.35NETWORK
CVE‑2022‑11292022‑07‑23 00:15:09MEDIUM (7)Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2022‑11282022‑07‑23 00:15:09MEDIUM (7)Inappropriate implementation in Web Share API in Google Chrome on Windows prior to 100.0.4896.60 allowed an attacker on the local network segment to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑11272022‑07‑23 00:15:08HIGH (9)Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.36NETWORK
CVE‑2022‑11252022‑07‑23 00:15:08HIGH (9)Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.36NETWORK
CVE‑2022‑10962022‑07‑23 00:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09802022‑07‑22 17:15:09HIGH (9)Use after free in New Tab Page in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑09792022‑07‑22 17:15:09HIGH (9)Use after free in Safe Browsing in Google Chrome on Android prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09782022‑07‑22 17:15:08HIGH (9)Use after free in ANGLE in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09772022‑07‑21 23:15:09CRITICAL (10)Use after free in Browser UI in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09762022‑07‑21 23:15:09HIGH (9)Heap buffer overflow in GPU in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09752022‑07‑21 23:15:09HIGH (9)Use after free in ANGLE in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09742022‑07‑21 23:15:09HIGH (9)Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09732022‑07‑21 23:15:09CRITICAL (10)Use after free in Safe Browsing in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09722022‑07‑21 23:15:09HIGH (9)Use after free in Extensions in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑09712022‑07‑21 23:15:09HIGH (9)Use after free in Blink Layout in Google Chrome on Android prior to 99.0.4844.74 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑08092022‑04‑05 01:15:09HIGH (9)Out of bounds memory access in WebXR in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑08082022‑04‑05 01:15:09HIGH (9)Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in a series of user interaction to potentially exploit heap corruption via user interactions.36NETWORK
CVE‑2022‑08072022‑04‑05 01:15:09MEDIUM (7)Inappropriate implementation in Autofill in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2022‑08062022‑04‑05 01:15:09MEDIUM (7)Data leak in Canvas in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in screen sharing to potentially leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑08052022‑04‑05 01:15:09HIGH (9)Use after free in Browser Switcher in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.36NETWORK
CVE‑2022‑08042022‑04‑05 01:15:09MEDIUM (7)Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2022‑08032022‑04‑05 01:15:09MEDIUM (7)Inappropriate implementation in Permissions in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to tamper with the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2022‑08022022‑04‑05 01:15:09MEDIUM (7)Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2022‑08012023‑01‑02 23:15:11MEDIUM (6)Inappropriate implementation in HTML parser in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass XSS preventions via a crafted HTML page. (Chrome security severity: Medium)33NETWORK
CVE‑2022‑08002022‑04‑05 01:15:09HIGH (9)Heap buffer overflow in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑07992022‑04‑05 01:15:09HIGH (9)Insufficient policy enforcement in Installer in Google Chrome on Windows prior to 99.0.4844.51 allowed a remote attacker to perform local privilege escalation via a crafted offline installer file.36NETWORK
CVE‑2022‑07982022‑04‑05 01:15:09HIGH (9)Use after free in MediaStream in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2022‑07972022‑04‑05 01:15:09HIGH (9)Out of bounds memory access in Mojo in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.36NETWORK
CVE‑2022‑07962022‑04‑05 01:15:09HIGH (9)Use after free in Media in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑07952022‑04‑05 01:15:09HIGH (9)Type confusion in Blink Layout in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑07942022‑04‑05 01:15:09HIGH (9)Use after free in WebShare in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑07932022‑04‑05 01:15:09HIGH (9)Use after free in Cast in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2022‑07922022‑04‑05 01:15:09MEDIUM (7)Out of bounds read in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2022‑07912022‑04‑05 01:15:09HIGH (9)Use after free in Omnibox in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via user interactions.36NETWORK
CVE‑2022‑07902022‑04‑05 01:15:09CRITICAL (10)Use after free in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑07892022‑04‑05 01:15:09HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06102022‑04‑05 00:15:18HIGH (9)Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06092022‑04‑05 00:15:18HIGH (9)Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06082022‑04‑05 00:15:18HIGH (9)Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06072022‑04‑05 00:15:18HIGH (9)Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06062022‑04‑05 00:15:18HIGH (9)Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06052022‑04‑05 00:15:18HIGH (9)Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06042022‑04‑05 00:15:17HIGH (9)Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑06032022‑04‑05 00:15:17HIGH (9)Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04702022‑04‑05 01:15:09HIGH (9)Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04692022‑04‑05 01:15:09HIGH (9)Use after free in Cast in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04682022‑04‑05 01:15:08HIGH (9)Use after free in Payments in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04672022‑04‑05 01:15:08HIGH (9)Inappropriate implementation in Pointer Lock in Google Chrome on Windows prior to 98.0.4758.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2022‑04662022‑04‑05 01:15:08CRITICAL (10)Inappropriate implementation in Extensions Platform in Google Chrome prior to 98.0.4758.80 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑04652022‑04‑05 01:15:08HIGH (9)Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.36NETWORK
CVE‑2022‑04642022‑04‑05 01:15:08HIGH (9)Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.36NETWORK
CVE‑2022‑04632022‑04‑05 01:15:08HIGH (9)Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.36NETWORK
CVE‑2022‑04622022‑04‑05 01:15:08MEDIUM (7)Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑04612022‑04‑05 01:15:08MEDIUM (7)Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.43NETWORK
CVE‑2022‑04602022‑04‑05 01:15:08HIGH (9)Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04592022‑04‑05 01:15:08HIGH (9)Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04582022‑04‑05 01:15:08HIGH (9)Use after free in Thumbnail Tab Strip in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04572022‑04‑05 01:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04562022‑04‑05 01:15:08HIGH (9)Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.36NETWORK
CVE‑2022‑04552022‑04‑05 01:15:08MEDIUM (7)Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 98.0.4758.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2022‑04542022‑04‑05 01:15:08HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04532022‑04‑05 01:15:08HIGH (9)Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑04522022‑04‑05 01:15:08CRITICAL (10)Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑03372023‑01‑02 23:15:10MEDIUM (7)Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High)34NETWORK
CVE‑2022‑03112022‑02‑12 02:15:11HIGH (9)Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑03102022‑02‑12 02:15:11HIGH (9)Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.36NETWORK
CVE‑2022‑03092022‑02‑12 02:15:11MEDIUM (7)Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2022‑03082022‑02‑12 02:15:11HIGH (9)Use after free in Data Transfer in Google Chrome on Chrome OS prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑03072022‑02‑12 02:15:11HIGH (9)Use after free in Optimization Guide in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑03062022‑02‑12 02:15:11HIGH (9)Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑03052022‑02‑12 02:15:11MEDIUM (7)Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2022‑03042022‑02‑12 02:15:10HIGH (9)Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑03022022‑02‑12 02:15:10HIGH (9)Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑03012022‑02‑12 02:15:10HIGH (8)Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.26LOCAL
CVE‑2022‑03002022‑02‑12 02:15:10HIGH (9)Use after free in Text Input Method Editor in Google Chrome on Android prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑02982022‑02‑12 02:15:10HIGH (9)Use after free in Scheduling in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑02972022‑02‑12 02:15:10HIGH (9)Use after free in Vulkan in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑02962022‑02‑12 02:15:10HIGH (9)Use after free in Printing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑02952022‑02‑12 02:15:10HIGH (9)Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑02942022‑02‑12 02:15:10MEDIUM (7)Inappropriate implementation in Push messaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2022‑02932022‑02‑12 02:15:10HIGH (9)Use after free in Web packaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑02922022‑02‑12 02:15:10MEDIUM (7)Inappropriate implementation in Fenced Frames in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2022‑02912022‑02‑12 02:15:10MEDIUM (7)Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2022‑02902022‑02‑12 02:15:10CRITICAL (10)Use after free in Site isolation in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2022‑02892022‑02‑12 02:15:10HIGH (9)Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01202022‑02‑12 00:15:08MEDIUM (7)Inappropriate implementation in Passwords in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially leak cross-origin data via a malicious website.34NETWORK
CVE‑2022‑01182022‑02‑12 00:15:08MEDIUM (4)Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2022‑01172022‑02‑12 00:15:08MEDIUM (7)Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑01162022‑02‑12 00:15:08MEDIUM (4)Inappropriate implementation in Compositing in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2022‑01152022‑02‑12 00:15:08HIGH (9)Uninitialized use in File API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2022‑01142022‑02‑12 00:15:08HIGH (8)Out of bounds memory access in Blink Serial API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page and virtual serial port driver.35NETWORK
CVE‑2022‑01132022‑02‑12 00:15:08MEDIUM (7)Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑01122022‑02‑12 00:15:08MEDIUM (4)Incorrect security UI in Browser UI in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to display missing URL or incorrect URL via a crafted URL.31NETWORK
CVE‑2022‑01112022‑02‑12 00:15:08MEDIUM (7)Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to incorrectly set origin via a crafted HTML page.34NETWORK
CVE‑2022‑01102022‑02‑12 00:15:08MEDIUM (4)Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2022‑01092022‑02‑12 00:15:08MEDIUM (7)Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.34NETWORK
CVE‑2022‑01082022‑02‑12 00:15:08MEDIUM (7)Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2022‑01072022‑02‑12 00:15:08HIGH (9)Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01062022‑02‑12 00:15:08HIGH (9)Use after free in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01052022‑02‑12 00:15:08HIGH (9)Use after free in PDF Accessibility in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01042022‑02‑12 00:15:07HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01032022‑02‑12 00:15:07HIGH (9)Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01022022‑02‑12 00:15:07HIGH (9)Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑01012022‑02‑12 00:15:07HIGH (9)Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture.36NETWORK
CVE‑2022‑01002022‑02‑12 00:15:07HIGH (9)Heap buffer overflow in Media streams API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2022‑00992022‑02‑12 00:15:07HIGH (9)Use after free in Sign-in in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gesture.36NETWORK
CVE‑2022‑00982022‑02‑12 00:15:07HIGH (9)Use after free in Screen Capture in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gestures.36NETWORK
CVE‑2022‑00972022‑02‑12 00:15:07CRITICAL (10)Inappropriate implementation in DevTools in Google Chrome prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to to potentially allow extension to escape the sandbox via a crafted HTML page.36NETWORK
CVE‑2022‑00962022‑02‑12 00:15:07HIGH (9)Use after free in Storage in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑43242023‑07‑29 00:15:11MEDIUM (7)Insufficient policy enforcement in Google Update in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to read arbitrary files via a malicious file. (Chromium security severity: Medium)34NETWORK
CVE‑2021‑43232023‑07‑29 00:15:11MEDIUM (7)Insufficient validation of untrusted input in Extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to access local files via a crafted Chrome Extension. (Chromium security severity: Medium)34NETWORK
CVE‑2021‑43222023‑07‑29 00:15:11HIGH (9)Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)36NETWORK
CVE‑2021‑43212023‑07‑29 00:15:11MEDIUM (4)Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2021‑43202023‑07‑29 00:15:10HIGH (9)Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2021‑43192023‑07‑29 00:15:10HIGH (9)Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2021‑43182023‑07‑29 00:15:10HIGH (9)Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2021‑43172023‑07‑29 00:15:10HIGH (9)Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)36NETWORK
CVE‑2021‑43162023‑07‑29 00:15:10MEDIUM (4)Inappropriate implementation in Cast UI in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to spoof browser UI via a crafted HTML page. (Chromium security severity: Low)31NETWORK
CVE‑2021‑41022022‑02‑11 23:15:08HIGH (9)Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑41012022‑02‑11 23:15:08HIGH (9)Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑41002022‑02‑11 23:15:08HIGH (9)Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40992022‑02‑11 23:15:08HIGH (9)Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40982022‑02‑11 23:15:08HIGH (7)Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.34NETWORK
CVE‑2021‑40792021‑12‑23 01:15:09HIGH (9)Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.36NETWORK
CVE‑2021‑40782021‑12‑23 01:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40682021‑12‑23 01:15:09MEDIUM (7)Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑40672021‑12‑23 01:15:09HIGH (9)Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40662021‑12‑23 01:15:09HIGH (9)Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40652021‑12‑23 01:15:09HIGH (9)Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40642021‑12‑23 01:15:09HIGH (9)Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40632021‑12‑23 01:15:09HIGH (9)Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40622021‑12‑23 01:15:09HIGH (9)Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40612021‑12‑23 01:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40592021‑12‑23 01:15:09MEDIUM (7)Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑40582021‑12‑23 01:15:09HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40572021‑12‑23 01:15:09HIGH (9)Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40562021‑12‑23 01:15:09HIGH (9)Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40552021‑12‑23 01:15:09HIGH (9)Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2021‑40542021‑12‑23 01:15:09MEDIUM (7)Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2021‑40532021‑12‑23 01:15:09HIGH (9)Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑40522021‑12‑23 01:15:09HIGH (9)Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2021‑380222021‑12‑23 01:15:09MEDIUM (7)Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑380212021‑12‑23 01:15:09MEDIUM (7)Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑380202021‑12‑23 01:15:08MEDIUM (4)Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2021‑380192021‑12‑23 01:15:08MEDIUM (7)Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑380182021‑12‑23 01:15:08MEDIUM (7)Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2021‑380172021‑12‑23 01:15:08HIGH (9)Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2021‑380162021‑12‑23 01:15:08HIGH (9)Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2021‑380152021‑12‑23 01:15:08HIGH (9)Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.36NETWORK
CVE‑2021‑380142021‑12‑23 01:15:08HIGH (9)Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380132021‑12‑23 01:15:08CRITICAL (10)Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑380122021‑12‑23 01:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380112021‑12‑23 01:15:08HIGH (9)Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380102021‑12‑23 01:15:08MEDIUM (7)Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2021‑380092021‑12‑23 01:15:08MEDIUM (7)Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑380082021‑12‑23 01:15:08HIGH (9)Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380072021‑12‑23 01:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380062021‑12‑23 01:15:08HIGH (9)Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380052021‑12‑23 01:15:08HIGH (9)Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380042021‑11‑23 22:15:08MEDIUM (4)Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑380032021‑11‑23 22:15:08HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380022021‑11‑23 22:15:08CRITICAL (10)Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑380012021‑11‑23 22:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑380002021‑11‑23 22:15:08MEDIUM (6)Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.33NETWORK
CVE‑2021‑379992021‑11‑23 22:15:08MEDIUM (6)Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.33NETWORK
CVE‑2021‑379982021‑11‑23 22:15:08HIGH (9)Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379972021‑11‑23 22:15:08HIGH (9)Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379962021‑11‑02 22:15:09MEDIUM (6)Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.24LOCAL
CVE‑2021‑379952021‑11‑02 22:15:09MEDIUM (7)Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2021‑379942021‑11‑02 22:15:09MEDIUM (7)Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑379932021‑11‑02 22:15:09HIGH (9)Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379922021‑11‑02 22:15:09HIGH (9)Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379912021‑11‑02 22:15:09HIGH (8)Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.26NETWORK
CVE‑2021‑379902021‑11‑02 22:15:09MEDIUM (6)Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.24LOCAL
CVE‑2021‑379892021‑11‑02 22:15:09MEDIUM (7)Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.34NETWORK
CVE‑2021‑379882021‑11‑02 22:15:09HIGH (9)Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379872021‑11‑02 22:15:09HIGH (9)Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379862021‑11‑02 22:15:09HIGH (9)Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379852021‑11‑02 22:15:08HIGH (9)Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379842021‑11‑02 22:15:08HIGH (9)Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379832021‑11‑02 22:15:08HIGH (9)Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379822021‑11‑02 22:15:08HIGH (9)Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379812021‑11‑02 22:15:08CRITICAL (10)Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑379802021‑11‑02 21:15:08HIGH (7)Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.34NETWORK
CVE‑2021‑379792021‑11‑02 21:15:08HIGH (9)heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379782021‑11‑02 21:15:08HIGH (9)Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379772021‑11‑02 21:15:08HIGH (9)Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379762021‑10‑08 22:15:08MEDIUM (7)Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2021‑379752021‑10‑08 22:15:08HIGH (9)Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379742021‑10‑08 22:15:08HIGH (9)Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379732021‑10‑08 22:15:08CRITICAL (10)Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑379722021‑10‑08 22:15:08HIGH (9)Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379712021‑10‑08 22:15:08MEDIUM (4)Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2021‑379702021‑10‑08 22:15:08HIGH (9)Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379692021‑10‑08 22:15:08HIGH (8)Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.26LOCAL
CVE‑2021‑379682021‑10‑08 22:15:08MEDIUM (4)Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑379672021‑10‑08 22:15:08MEDIUM (4)Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑379662021‑10‑08 22:15:08MEDIUM (4)Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2021‑379652021‑10‑08 22:15:08MEDIUM (4)Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑379642021‑10‑08 22:15:08LOW (3)Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.21LOCAL
CVE‑2021‑379632021‑10‑08 22:15:08MEDIUM (4)Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.31NETWORK
CVE‑2021‑379622021‑10‑08 22:15:08HIGH (9)Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379612021‑10‑08 22:15:08HIGH (9)Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379592021‑10‑08 22:15:08HIGH (9)Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379582021‑10‑08 22:15:08MEDIUM (5)Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.33NETWORK
CVE‑2021‑379572021‑10‑08 22:15:08HIGH (9)Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑379562021‑10‑08 22:15:08HIGH (9)Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306332021‑10‑08 21:15:08CRITICAL (10)Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑306322021‑10‑08 21:15:08HIGH (9)Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306302021‑10‑08 21:15:08MEDIUM (4)Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑306292021‑10‑08 21:15:08HIGH (9)Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306282021‑10‑08 21:15:07HIGH (9)Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306272021‑10‑08 21:15:07HIGH (9)Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306262021‑10‑08 21:15:07HIGH (9)Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306252021‑10‑08 21:15:07HIGH (9)Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306042021‑08‑26 18:15:09HIGH (9)Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306032021‑08‑26 18:15:09HIGH (8)Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.26NETWORK
CVE‑2021‑306022021‑08‑26 18:15:08HIGH (9)Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306012021‑08‑26 18:15:08HIGH (9)Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑306002021‑08‑26 18:15:08HIGH (9)Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305992021‑08‑26 18:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2021‑305982021‑08‑26 18:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2021‑305972021‑08‑26 18:15:08MEDIUM (7)Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.16PHYSICAL
CVE‑2021‑305962021‑08‑26 18:15:08MEDIUM (4)Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2021‑305942021‑08‑26 18:15:08MEDIUM (7)Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.16PHYSICAL
CVE‑2021‑305932021‑08‑26 18:15:08HIGH (8)Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.35NETWORK
CVE‑2021‑305922021‑08‑26 18:15:08HIGH (9)Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.36NETWORK
CVE‑2021‑305912021‑08‑26 18:15:08HIGH (9)Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305902021‑08‑26 18:15:08HIGH (9)Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305892021‑08‑03 20:15:09MEDIUM (4)Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link.31NETWORK
CVE‑2021‑305882021‑08‑03 20:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305872021‑08‑03 20:15:09MEDIUM (4)Inappropriate implementation in Compositing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2021‑305862021‑08‑03 20:15:09HIGH (9)Use after free in dialog box handling in Windows in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305852021‑08‑03 20:15:09HIGH (9)Use after free in sensor handling in Google Chrome on Windows prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305842021‑08‑03 20:15:09MEDIUM (7)Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2021‑305832021‑08‑03 20:15:09MEDIUM (7)Insufficient policy enforcement in image handling in iOS in Google Chrome on iOS prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑305822021‑08‑03 20:15:09MEDIUM (7)Inappropriate implementation in Animation in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑305812021‑08‑03 20:15:09HIGH (9)Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305802021‑08‑03 20:15:09MEDIUM (7)Insufficient policy enforcement in Android intents in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious application to obtain potentially sensitive information via a crafted HTML page.34NETWORK
CVE‑2021‑305792021‑08‑03 20:15:09HIGH (9)Use after free in UI framework in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305782021‑08‑03 20:15:09HIGH (9)Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑305772021‑08‑03 20:15:09HIGH (8)Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.26LOCAL
CVE‑2021‑305762021‑08‑03 20:15:09HIGH (9)Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305752021‑08‑03 20:15:09HIGH (9)Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305742021‑08‑03 20:15:09HIGH (9)Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305732021‑08‑03 20:15:09HIGH (9)Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305722021‑08‑03 20:15:09HIGH (9)Use after free in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305712021‑08‑03 20:15:09CRITICAL (10)Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑305692021‑08‑03 20:15:09HIGH (9)Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305682021‑08‑03 20:15:09HIGH (9)Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305672021‑08‑03 20:15:09HIGH (9)Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.36NETWORK
CVE‑2021‑305662021‑08‑03 20:15:09HIGH (9)Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305652021‑08‑03 20:15:09HIGH (9)Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.36NETWORK
CVE‑2021‑305642021‑08‑03 19:15:08HIGH (9)Heap buffer overflow in WebXR in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305632021‑08‑03 19:15:08HIGH (9)Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305622021‑08‑03 19:15:08HIGH (9)Use after free in WebSerial in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305612021‑08‑03 19:15:08HIGH (9)Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305602021‑08‑03 19:15:08HIGH (9)Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305592021‑08‑03 19:15:08HIGH (9)Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305582023‑01‑02 23:15:10HIGH (9)Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chrome security severity: Medium)36NETWORK
CVE‑2021‑305572021‑07‑02 19:15:08HIGH (9)Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305562021‑07‑02 19:15:08HIGH (9)Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305552021‑07‑02 19:15:08HIGH (9)Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and user gesture.36NETWORK
CVE‑2021‑305542021‑07‑02 19:15:08HIGH (9)Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305532021‑06‑15 22:15:09HIGH (9)Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305522021‑06‑15 22:15:09HIGH (9)Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305512021‑06‑15 22:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305502021‑06‑15 22:15:09HIGH (9)Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305492021‑06‑15 22:15:09HIGH (9)Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305482021‑06‑15 22:15:09HIGH (9)Use after free in Loader in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305472021‑06‑15 22:15:09HIGH (9)Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑305462021‑06‑15 22:15:09HIGH (9)Use after free in Autofill in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305452021‑06‑15 22:15:09HIGH (9)Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305442021‑06‑15 22:15:09HIGH (9)Use after free in BFCache in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305432021‑06‑07 20:15:09HIGH (9)Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305422021‑06‑07 20:15:09HIGH (9)Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305412021‑08‑03 19:15:08HIGH (9)Use after free in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305402021‑06‑07 20:15:09MEDIUM (7)Incorrect security UI in payments in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2021‑305392021‑06‑07 20:15:09MEDIUM (5)Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.33NETWORK
CVE‑2021‑305382021‑06‑07 20:15:09MEDIUM (4)Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.31NETWORK
CVE‑2021‑305372021‑06‑07 20:15:09MEDIUM (4)Insufficient policy enforcement in cookies in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass cookie policy via a crafted HTML page.31NETWORK
CVE‑2021‑305362021‑06‑07 20:15:09HIGH (8)Out of bounds read in V8 in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.35NETWORK
CVE‑2021‑305352021‑06‑07 20:15:09HIGH (9)Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305342021‑06‑07 20:15:09MEDIUM (7)Insufficient policy enforcement in iFrameSandbox in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑305332021‑06‑07 20:15:09MEDIUM (7)Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.34NETWORK
CVE‑2021‑305322021‑06‑07 20:15:09MEDIUM (4)Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.31NETWORK
CVE‑2021‑305312021‑06‑07 20:15:09MEDIUM (7)Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2021‑305302021‑06‑07 20:15:09HIGH (9)Out of bounds memory access in WebAudio in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑305292021‑06‑07 20:15:09HIGH (9)Use after free in Bookmarks in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305282021‑06‑07 20:15:09HIGH (9)Use after free in WebAuthentication in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker who had compromised the renderer process of a user who had saved a credit card in their Google account to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305272021‑06‑07 20:15:09HIGH (9)Use after free in WebUI in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305262021‑06‑07 20:15:09HIGH (9)Out of bounds write in TabStrip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.36NETWORK
CVE‑2021‑305252021‑06‑07 20:15:08HIGH (9)Use after free in TabGroups in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305242021‑06‑07 20:15:08HIGH (9)Use after free in TabStrip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305232021‑06‑07 20:15:08HIGH (9)Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.36NETWORK
CVE‑2021‑305222021‑06‑07 20:15:08HIGH (9)Use after free in WebAudio in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305212021‑06‑07 20:15:08HIGH (9)Heap buffer overflow in Autofill in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑305202021‑06‑04 18:15:08HIGH (9)Use after free in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305192021‑06‑04 18:15:08HIGH (9)Use after free in Payments in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious payments app to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305182021‑06‑04 18:15:08HIGH (9)Heap buffer overflow in Reader Mode in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305172021‑06‑04 18:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305162021‑06‑04 18:15:08HIGH (9)Heap buffer overflow in History in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305152021‑06‑04 18:15:08HIGH (9)Use after free in File API in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305142021‑06‑04 18:15:08HIGH (9)Use after free in Autofill in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305132021‑06‑04 18:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305122021‑06‑04 18:15:08HIGH (9)Use after free in Notifications in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305112021‑06‑04 18:15:08HIGH (8)Out of bounds read in Tab Groups in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.35NETWORK
CVE‑2021‑305102021‑06‑04 18:15:08HIGH (9)Use after free in Aura in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305092021‑06‑04 18:15:08HIGH (9)Out of bounds write in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page and a crafted Chrome extension.36NETWORK
CVE‑2021‑305082021‑06‑04 18:15:08HIGH (9)Heap buffer overflow in Media Feeds in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to enable certain features in Chrome to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑305072021‑06‑04 18:15:08HIGH (9)Inappropriate implementation in Offline in Google Chrome on Android prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.36NETWORK
CVE‑2021‑305062021‑06‑04 18:15:08HIGH (9)Incorrect security UI in Web App Installs in Google Chrome on Android prior to 90.0.4430.212 allowed an attacker who convinced a user to install a web application to inject scripts or HTML into a privileged page via a crafted HTML page.36NETWORK
CVE‑2021‑212332021‑04‑30 21:15:09HIGH (9)Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212322021‑04‑30 21:15:09HIGH (9)Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212312021‑04‑30 21:15:09HIGH (9)Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212302021‑04‑30 21:15:08HIGH (9)Type confusion in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212292021‑04‑30 21:15:08MEDIUM (7)Incorrect security UI in downloads in Google Chrome on Android prior to 90.0.4430.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2021‑212282021‑04‑30 21:15:08MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 90.0.4430.93 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.31NETWORK
CVE‑2021‑212272021‑04‑30 21:15:08HIGH (9)Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212262021‑04‑26 17:15:09CRITICAL (10)Use after free in navigation in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑212252021‑04‑26 17:15:09HIGH (9)Out of bounds memory access in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212242021‑04‑26 17:15:09HIGH (9)Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2021‑212232021‑04‑26 17:15:09CRITICAL (10)Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑212222021‑04‑26 17:15:09MEDIUM (7)Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2021‑212212021‑04‑26 17:15:09MEDIUM (7)Insufficient validation of untrusted input in Mojo in Google Chrome prior to 90.0.4430.72 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑212202021‑04‑26 17:15:09HIGH (9)Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212192021‑04‑26 17:15:09MEDIUM (6)Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.24LOCAL
CVE‑2021‑212182021‑04‑26 17:15:09MEDIUM (6)Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.24LOCAL
CVE‑2021‑212172021‑04‑26 17:15:09MEDIUM (6)Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.24LOCAL
CVE‑2021‑212162021‑04‑26 17:15:08MEDIUM (7)Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2021‑212152021‑04‑26 17:15:08MEDIUM (7)Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2021‑212142021‑04‑26 17:15:08HIGH (9)Use after free in Network API in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2021‑212132021‑04‑26 17:15:08HIGH (9)Use after free in WebMIDI in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212122021‑04‑26 17:15:08MEDIUM (7)Incorrect security UI in Network Config UI in Google Chrome on ChromeOS prior to 90.0.4430.72 allowed a remote attacker to potentially compromise WiFi connection security via a malicious WAP.34NETWORK
CVE‑2021‑212112021‑04‑26 17:15:08MEDIUM (7)Inappropriate implementation in Navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑212102021‑04‑26 17:15:08MEDIUM (7)Inappropriate implementation in Network in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially access local UDP ports via a crafted HTML page.34NETWORK
CVE‑2021‑212092021‑04‑26 17:15:08MEDIUM (7)Inappropriate implementation in storage in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑212082021‑04‑26 17:15:08MEDIUM (7)Insufficient data validation in QR scanner in Google Chrome on iOS prior to 90.0.4430.72 allowed an attacker displaying a QR code to perform domain spoofing via a crafted QR code.34NETWORK
CVE‑2021‑212072021‑04‑26 17:15:08HIGH (9)Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.26LOCAL
CVE‑2021‑212062021‑04‑26 17:15:08HIGH (9)Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212052021‑04‑26 17:15:08HIGH (8)Insufficient policy enforcement in navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.35NETWORK
CVE‑2021‑212042021‑04‑26 17:15:08HIGH (9)Use after free in Blink in Google Chrome on OS X prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212032021‑04‑26 17:15:08HIGH (9)Use after free in Blink in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑212022021‑04‑26 17:15:08HIGH (9)Use after free in extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.26LOCAL
CVE‑2021‑212012021‑04‑26 17:15:08CRITICAL (10)Use after free in permissions in Google Chrome prior to 90.0.4430.72 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑212002023‑01‑02 23:15:10MEDIUM (5)Out of bounds read in WebUI Settings in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chrome security severity: Low)33NETWORK
CVE‑2021‑211992021‑04‑09 22:15:18HIGH (9)Use after free in Aura in Google Chrome on Linux prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211982021‑04‑09 22:15:18HIGH (7)Out of bounds read in IPC in Google Chrome prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.34NETWORK
CVE‑2021‑211972021‑04‑09 22:15:18HIGH (9)Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211962021‑04‑09 22:15:17HIGH (9)Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211952021‑04‑09 22:15:17HIGH (9)Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211942021‑04‑09 22:15:17HIGH (9)Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211932021‑03‑16 15:15:13HIGH (9)Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211922021‑03‑16 15:15:13HIGH (9)Heap buffer overflow in tab groups in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211912021‑03‑16 15:15:13HIGH (9)Use after free in WebRTC in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211902021‑03‑09 18:15:18HIGH (9)Uninitialized data in PDFium in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.36NETWORK
CVE‑2021‑211892021‑03‑09 18:15:18MEDIUM (4)Insufficient policy enforcement in payments in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2021‑211882021‑03‑09 18:15:18HIGH (9)Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211872021‑03‑09 18:15:18MEDIUM (4)Insufficient data validation in URL formatting in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2021‑211862021‑03‑09 18:15:18MEDIUM (4)Insufficient policy enforcement in QR scanning in Google Chrome on iOS prior to 89.0.4389.72 allowed an attacker who convinced the user to scan a QR code to bypass navigation restrictions via a crafted QR code.31NETWORK
CVE‑2021‑211852021‑03‑09 18:15:18MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 89.0.4389.72 allowed an attacker who convinced a user to install a malicious extension to obtain sensitive information via a crafted Chrome Extension.31NETWORK
CVE‑2021‑211842021‑03‑09 18:15:18MEDIUM (4)Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑211832021‑03‑09 18:15:17MEDIUM (4)Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2021‑211822021‑03‑09 18:15:17MEDIUM (7)Insufficient policy enforcement in navigations in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211812021‑03‑09 18:15:17MEDIUM (7)Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2021‑211802021‑03‑09 18:15:17HIGH (9)Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211792021‑03‑09 18:15:17HIGH (9)Use after free in Network Internals in Google Chrome on Linux prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211782021‑03‑09 18:15:17MEDIUM (7)Inappropriate implementation in Compositing in Google Chrome on Linux and Windows prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2021‑211772021‑03‑09 18:15:17MEDIUM (7)Insufficient policy enforcement in Autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2021‑211762021‑03‑09 18:15:17MEDIUM (7)Inappropriate implementation in full screen mode in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2021‑211752021‑03‑09 18:15:17MEDIUM (7)Inappropriate implementation in Site isolation in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑211742021‑03‑09 18:15:17HIGH (9)Inappropriate implementation in Referrer in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2021‑211732021‑03‑09 18:15:17MEDIUM (7)Side-channel information leakage in Network Internals in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑211722021‑03‑09 18:15:17HIGH (8)Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 89.0.4389.72 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.35NETWORK
CVE‑2021‑211712021‑03‑09 18:15:17MEDIUM (7)Incorrect security UI in TabStrip and Navigation in Google Chrome on Android prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2021‑211702021‑03‑09 18:15:17MEDIUM (7)Incorrect security UI in Loader in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2021‑211692021‑03‑09 18:15:17HIGH (9)Out of bounds memory access in V8 in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑211682021‑03‑09 18:15:16MEDIUM (7)Insufficient policy enforcement in appcache in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2021‑211672021‑03‑09 18:15:16HIGH (9)Use after free in bookmarks in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211662021‑03‑09 18:15:16HIGH (9)Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211652021‑03‑09 18:15:16HIGH (9)Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211642021‑03‑09 18:15:16MEDIUM (7)Insufficient data validation in Chrome on iOS in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑211632021‑03‑09 18:15:16MEDIUM (7)Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server.34NETWORK
CVE‑2021‑211622021‑03‑09 18:15:16HIGH (9)Use after free in WebRTC in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211612021‑03‑09 18:15:16HIGH (9)Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211602021‑03‑09 18:15:16HIGH (9)Heap buffer overflow in WebAudio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211592021‑03‑09 18:15:16HIGH (9)Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211572021‑02‑22 22:15:13HIGH (9)Use after free in Web Sockets in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211562021‑02‑22 22:15:13HIGH (9)Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted script.36NETWORK
CVE‑2021‑211552021‑02‑22 22:15:13CRITICAL (10)Heap buffer overflow in Tab Strip in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211542021‑02‑22 22:15:13CRITICAL (10)Heap buffer overflow in Tab Strip in Google Chrome prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211532021‑02‑22 22:15:13HIGH (9)Stack buffer overflow in GPU Process in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑211522021‑02‑22 22:15:13HIGH (9)Heap buffer overflow in Media in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211512021‑02‑22 22:15:12CRITICAL (10)Use after free in Payments in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211502021‑02‑22 22:15:12CRITICAL (10)Use after free in Downloads in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211492021‑02‑22 22:15:12HIGH (9)Stack buffer overflow in Data Transfer in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑211482021‑02‑09 16:15:12HIGH (9)Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211472021‑02‑09 15:15:14MEDIUM (4)Inappropriate implementation in Skia in Google Chrome prior to 88.0.4324.146 allowed a local attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2021‑211462021‑02‑09 15:15:14CRITICAL (10)Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211452021‑02‑09 15:15:14HIGH (9)Use after free in Fonts in Google Chrome prior to 88.0.4324.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211442021‑02‑09 15:15:14HIGH (9)Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2021‑211432021‑02‑09 15:15:14HIGH (9)Heap buffer overflow in Extensions in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2021‑211422021‑02‑09 15:15:14CRITICAL (10)Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211412021‑02‑09 14:15:17MEDIUM (7)Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass file extension policy via a crafted HTML page.34NETWORK
CVE‑2021‑211402021‑02‑09 14:15:17MEDIUM (7)Uninitialized use in USB in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform out of bounds memory access via via a USB device.16PHYSICAL
CVE‑2021‑211392021‑02‑09 14:15:17MEDIUM (7)Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211382021‑02‑09 14:15:17HIGH (9)Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file.26LOCAL
CVE‑2021‑211372021‑02‑09 14:15:17MEDIUM (7)Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.34NETWORK
CVE‑2021‑211362021‑02‑09 14:15:17MEDIUM (7)Insufficient policy enforcement in WebView in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑211352021‑02‑09 14:15:17MEDIUM (7)Inappropriate implementation in Performance API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2021‑211342021‑02‑09 14:15:17MEDIUM (7)Incorrect security UI in Page Info in Google Chrome on iOS prior to 88.0.4324.96 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2021‑211332021‑02‑09 14:15:16MEDIUM (7)Insufficient policy enforcement in Downloads in Google Chrome prior to 88.0.4324.96 allowed an attacker who convinced a user to download files to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211322021‑02‑09 14:15:16CRITICAL (10)Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2021‑211312021‑02‑09 14:15:16MEDIUM (7)Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211302021‑02‑09 14:15:16MEDIUM (7)Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211292021‑02‑09 14:15:16MEDIUM (7)Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211282021‑02‑09 14:15:16HIGH (9)Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211272021‑02‑09 14:15:16HIGH (9)Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass content security policy via a crafted Chrome Extension.36NETWORK
CVE‑2021‑211262021‑02‑09 14:15:16MEDIUM (7)Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension.34NETWORK
CVE‑2021‑211252021‑02‑09 14:15:16HIGH (8)Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.35NETWORK
CVE‑2021‑211242021‑02‑09 14:15:16CRITICAL (10)Potential user after free in Speech Recognizer in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211232021‑02‑09 14:15:16MEDIUM (7)Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.34NETWORK
CVE‑2021‑211222021‑02‑09 14:15:16HIGH (9)Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211212021‑02‑09 14:15:16CRITICAL (10)Use after free in Omnibox in Google Chrome on Linux prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211202021‑02‑09 14:15:16HIGH (9)Use after free in WebSQL in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211192021‑02‑09 14:15:16HIGH (9)Use after free in Media in Google Chrome prior to 88.0.4324.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211182021‑02‑09 14:15:16HIGH (9)Insufficient data validation in V8 in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2021‑211172021‑02‑09 14:15:15HIGH (8)Insufficient policy enforcement in Cryptohome in Google Chrome prior to 88.0.4324.96 allowed a local attacker to perform OS-level privilege escalation via a crafted file.26LOCAL
CVE‑2021‑211162021‑01‑08 19:15:15HIGH (9)Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211152021‑01‑08 19:15:15CRITICAL (10)User after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211142021‑01‑08 19:15:15HIGH (9)Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211132021‑01‑08 19:15:15HIGH (9)Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211122021‑01‑08 19:15:15HIGH (9)Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2021‑211112021‑01‑08 19:15:15CRITICAL (10)Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2021‑211102021‑01‑08 19:15:15CRITICAL (10)Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211092021‑01‑08 19:15:15CRITICAL (10)Use after free in payments in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211082021‑01‑08 19:15:15CRITICAL (10)Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211072021‑01‑08 19:15:15CRITICAL (10)Use after free in drag and drop in Google Chrome on Linux prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2021‑211062021‑01‑08 19:15:15CRITICAL (10)Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑65762020‑09‑21 20:15:16HIGH (9)Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65752020‑09‑21 20:15:16HIGH (8)Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.26NETWORK
CVE‑2020‑65742020‑09‑21 20:15:16HIGH (8)Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.26LOCAL
CVE‑2020‑65732020‑09‑21 20:15:16CRITICAL (10)Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑65722021‑01‑14 21:15:14HIGH (9)Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2020‑65712020‑09‑21 20:15:15MEDIUM (4)Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2020‑65702020‑09‑21 20:15:15MEDIUM (4)Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.31NETWORK
CVE‑2020‑65692020‑09‑21 20:15:15MEDIUM (6)Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.33NETWORK
CVE‑2020‑65682020‑09‑21 20:15:15MEDIUM (7)Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑65672020‑09‑21 20:15:15MEDIUM (7)Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑65662020‑09‑21 20:15:15MEDIUM (7)Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑65652020‑09‑21 20:15:15MEDIUM (7)Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2020‑65642020‑09‑21 20:15:15MEDIUM (7)Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.34NETWORK
CVE‑2020‑65632020‑09‑21 20:15:15MEDIUM (7)Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.34NETWORK
CVE‑2020‑65622020‑09‑21 20:15:15MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑65612020‑09‑21 20:15:15MEDIUM (7)Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑65602020‑09‑21 20:15:15MEDIUM (7)Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑65592020‑09‑21 20:15:15HIGH (9)Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65582020‑09‑21 20:15:15MEDIUM (7)Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑65572020‑11‑03 03:15:16MEDIUM (7)Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2020‑65562020‑09‑21 20:15:14HIGH (9)Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65552020‑09‑21 20:15:14HIGH (8)Out of bounds read in WebGL in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.35NETWORK
CVE‑2020‑65542020‑09‑21 20:15:14HIGH (9)Use after free in extensions in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.26LOCAL
CVE‑2020‑65532020‑09‑21 20:15:14HIGH (9)Use after free in offline mode in Google Chrome on iOS prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65522020‑09‑21 20:15:14HIGH (9)Use after free in Blink in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65512020‑09‑21 20:15:14HIGH (9)Use after free in WebXR in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65502020‑09‑21 20:15:14HIGH (9)Use after free in IndexedDB in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65492020‑09‑21 20:15:14HIGH (9)Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65482020‑09‑21 20:15:14HIGH (9)Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65472020‑09‑21 20:15:14MEDIUM (7)Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.34NETWORK
CVE‑2020‑65462020‑09‑21 20:15:14HIGH (8)Inappropriate implementation in installer in Google Chrome prior to 84.0.4147.125 allowed a local attacker to potentially elevate privilege via a crafted filesystem.26LOCAL
CVE‑2020‑65452020‑09‑21 20:15:14HIGH (9)Use after free in audio in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65442020‑09‑21 20:15:14HIGH (9)Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65432020‑09‑21 20:15:14HIGH (9)Use after free in task scheduling in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65422020‑09‑21 20:15:14HIGH (9)Use after free in ANGLE in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65412020‑09‑21 20:15:13HIGH (9)Use after free in WebUSB in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65402020‑09‑21 20:15:13HIGH (9)Buffer overflow in Skia in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65392020‑09‑21 20:15:13HIGH (9)Use after free in CSS in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65382020‑09‑21 20:15:13MEDIUM (7)Inappropriate implementation in WebView in Google Chrome on Android prior to 84.0.4147.105 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑65372020‑09‑21 20:15:13HIGH (9)Type confusion in V8 in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2020‑65362020‑07‑22 17:15:15MEDIUM (4)Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA.31NETWORK
CVE‑2020‑65352020‑07‑22 17:15:15MEDIUM (6)Insufficient data validation in WebUI in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had compromised the renderer process to inject scripts or HTML into a privileged page via a crafted HTML page.33NETWORK
CVE‑2020‑65342020‑07‑22 17:15:15HIGH (9)Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65332020‑07‑22 17:15:15HIGH (9)Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65322020‑09‑21 20:15:13HIGH (9)Use after free in SCTP in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65312020‑07‑22 17:15:15MEDIUM (4)Side-channel information leakage in scroll to text in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2020‑65302020‑07‑22 17:15:14HIGH (9)Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2020‑65292020‑07‑22 17:15:14MEDIUM (4)Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2020‑65282020‑07‑22 17:15:14MEDIUM (4)Incorrect security UI in basic auth in Google Chrome on iOS prior to 84.0.4147.89 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2020‑65272020‑07‑22 17:15:14MEDIUM (4)Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.31NETWORK
CVE‑2020‑65262020‑07‑22 17:15:14MEDIUM (7)Inappropriate implementation in iframe sandbox in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑65252020‑07‑22 17:15:14HIGH (9)Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65242020‑07‑22 17:15:14HIGH (9)Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65232020‑07‑22 17:15:14HIGH (9)Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65222020‑07‑22 17:15:14CRITICAL (10)Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑65212020‑07‑22 17:15:14MEDIUM (7)Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑65202020‑07‑22 17:15:14HIGH (9)Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65192020‑07‑22 17:15:14MEDIUM (7)Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2020‑65182020‑07‑22 17:15:14HIGH (9)Use after free in developer tools in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65172020‑07‑22 17:15:14HIGH (9)Heap buffer overflow in history in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65162020‑07‑22 17:15:14MEDIUM (4)Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2020‑65152020‑07‑22 17:15:13HIGH (9)Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65142020‑07‑22 17:15:13MEDIUM (7)Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.34NETWORK
CVE‑2020‑65132020‑07‑22 17:15:13HIGH (9)Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2020‑65122020‑07‑22 17:15:13HIGH (9)Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65112020‑07‑22 17:15:13MEDIUM (7)Information leak in content security policy in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑65102020‑07‑22 17:15:13HIGH (8)Heap buffer overflow in background fetch in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.26LOCAL
CVE‑2020‑65092020‑07‑22 17:15:13CRITICAL (10)Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2020‑65072020‑07‑22 17:15:13HIGH (9)Out of bounds write in V8 in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑65062020‑07‑22 17:15:13MEDIUM (7)Insufficient policy enforcement in WebView in Google Chrome on Android prior to 83.0.4103.106 allowed a remote attacker to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2020‑65052020‑07‑22 17:15:13CRITICAL (10)Use after free in speech in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑65042020‑06‑03 23:15:13MEDIUM (4)Insufficient policy enforcement in notifications in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass notification restrictions via a crafted HTML page.31NETWORK
CVE‑2020‑65032020‑06‑03 23:15:12MEDIUM (7)Inappropriate implementation in accessibility in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑65022020‑06‑03 23:15:12MEDIUM (7)Incorrect implementation in permissions in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2020‑65012020‑06‑03 23:15:12MEDIUM (7)Insufficient policy enforcement in CSP in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2020‑65002020‑06‑03 23:15:12MEDIUM (7)Inappropriate implementation in interstitials in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2020‑64992020‑06‑03 23:15:12MEDIUM (7)Inappropriate implementation in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass AppCache security restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑64982020‑06‑03 23:15:12MEDIUM (7)Incorrect implementation in user interface in Google Chrome on iOS prior to 83.0.4103.88 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2020‑64972020‑06‑03 23:15:12MEDIUM (7)Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 83.0.4103.88 allowed a remote attacker to perform domain spoofing via a crafted URI.34NETWORK
CVE‑2020‑64962020‑06‑03 23:15:12HIGH (9)Use after free in payments in Google Chrome on MacOS prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64952020‑06‑03 23:15:12MEDIUM (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.34NETWORK
CVE‑2020‑64942020‑06‑03 23:15:12MEDIUM (7)Incorrect security UI in payments in Google Chrome on Android prior to 83.0.4103.97 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2020‑64932020‑06‑03 23:15:12CRITICAL (10)Use after free in WebAuthentication in Google Chrome prior to 83.0.4103.97 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64922021‑11‑02 23:15:07CRITICAL (10)Use after free in ANGLE in Google Chrome prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64912020‑05‑21 04:15:15MEDIUM (7)Insufficient data validation in site information in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted domain name.34NETWORK
CVE‑2020‑64902020‑05‑21 04:15:14MEDIUM (4)Insufficient data validation in loader in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2020‑64892020‑05‑21 04:15:14MEDIUM (4)Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page.31NETWORK
CVE‑2020‑64882020‑05‑21 04:15:14MEDIUM (4)Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2020‑64872020‑05‑21 04:15:14MEDIUM (7)Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑64862020‑05‑21 04:15:14MEDIUM (7)Insufficient policy enforcement in navigations in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑64852020‑05‑21 04:15:14MEDIUM (7)Insufficient data validation in media router in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑64842020‑05‑21 04:15:14MEDIUM (7)Insufficient data validation in ChromeDriver in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted request.34NETWORK
CVE‑2020‑64832020‑05‑21 04:15:14MEDIUM (7)Insufficient policy enforcement in payments in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑64822020‑05‑21 04:15:13MEDIUM (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.34NETWORK
CVE‑2020‑64812020‑05‑21 04:15:13MEDIUM (7)Insufficient policy enforcement in URL formatting in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to perform domain spoofing via a crafted domain name.34NETWORK
CVE‑2020‑64802020‑05‑21 04:15:13MEDIUM (7)Insufficient policy enforcement in enterprise in Google Chrome prior to 83.0.4103.61 allowed a local attacker to bypass navigation restrictions via UI actions.34NETWORK
CVE‑2020‑64792020‑05‑21 04:15:13MEDIUM (7)Inappropriate implementation in sharing in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2020‑64782020‑05‑21 04:15:13MEDIUM (7)Inappropriate implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2020‑64772020‑05‑21 04:15:12HIGH (8)Inappropriate implementation in installer in Google Chrome on OS X prior to 83.0.4103.61 allowed a local attacker to perform privilege escalation via a crafted file.26LOCAL
CVE‑2020‑64762020‑05‑21 04:15:12MEDIUM (7)Insufficient policy enforcement in tab strip in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.34NETWORK
CVE‑2020‑64752020‑05‑21 04:15:12MEDIUM (7)Incorrect implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2020‑64742020‑05‑21 04:15:12HIGH (9)Use after free in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64732020‑05‑21 04:15:12MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑64722020‑05‑21 04:15:12MEDIUM (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory or disk via a crafted Chrome Extension.34NETWORK
CVE‑2020‑64712020‑05‑21 04:15:12CRITICAL (10)Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2020‑64702020‑05‑21 04:15:12MEDIUM (6)Insufficient validation of untrusted input in clipboard in Google Chrome prior to 83.0.4103.61 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via crafted clipboard contents.33NETWORK
CVE‑2020‑64692020‑05‑21 04:15:12CRITICAL (10)Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2020‑64682020‑05‑21 04:15:12HIGH (9)Type confusion in V8 in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64672020‑05‑21 04:15:12HIGH (9)Use after free in WebRTC in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64662020‑05‑21 04:15:12CRITICAL (10)Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64652020‑05‑21 04:15:12CRITICAL (10)Use after free in reader mode in Google Chrome on Android prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64642020‑05‑21 04:15:11HIGH (9)Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64632020‑05‑21 04:15:11HIGH (9)Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64622020‑05‑21 04:15:11CRITICAL (10)Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64612020‑05‑21 04:15:11CRITICAL (10)Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64602020‑05‑21 04:15:11MEDIUM (7)Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.34NETWORK
CVE‑2020‑64592020‑05‑21 04:15:11HIGH (9)Use after free in payments in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64582020‑05‑21 04:15:11HIGH (9)Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2020‑64572020‑05‑21 04:15:11CRITICAL (10)Use after free in speech recognizer in Google Chrome prior to 81.0.4044.113 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑64562020‑04‑13 18:15:13MEDIUM (7)Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.34NETWORK
CVE‑2020‑64552020‑04‑13 18:15:13HIGH (9)Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64542020‑04‑13 18:15:13HIGH (9)Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.36NETWORK
CVE‑2020‑64532020‑06‑03 23:15:12HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64522020‑04‑13 18:15:13HIGH (9)Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64512020‑04‑13 18:15:13HIGH (9)Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64502020‑04‑13 18:15:13HIGH (9)Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64492020‑03‑23 16:15:18HIGH (9)Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64482020‑04‑13 18:15:13HIGH (9)Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64472020‑04‑13 18:15:13HIGH (9)Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64462020‑04‑13 18:15:13MEDIUM (7)Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2020‑64452020‑04‑13 18:15:13MEDIUM (7)Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2020‑64442020‑04‑13 18:15:13MEDIUM (6)Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.33NETWORK
CVE‑2020‑64432020‑04‑13 18:15:12HIGH (9)Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2020‑64422020‑04‑13 18:15:12MEDIUM (4)Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2020‑64412020‑04‑13 18:15:12MEDIUM (4)Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.31NETWORK
CVE‑2020‑64402020‑04‑13 18:15:12MEDIUM (4)Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.31NETWORK
CVE‑2020‑64392020‑04‑13 18:15:12HIGH (9)Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.36NETWORK
CVE‑2020‑64382020‑04‑13 18:15:12MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.31NETWORK
CVE‑2020‑64372020‑04‑13 18:15:12MEDIUM (4)Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.31NETWORK
CVE‑2020‑64362020‑04‑13 18:15:12HIGH (9)Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64352020‑04‑13 18:15:12MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2020‑64342020‑04‑13 18:15:12HIGH (9)Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64332020‑04‑13 18:15:12MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2020‑64322020‑04‑13 18:15:12MEDIUM (4)Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2020‑64312020‑04‑13 18:15:12MEDIUM (4)Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.31NETWORK
CVE‑2020‑64302020‑04‑13 18:15:12HIGH (9)Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64292020‑03‑23 16:15:18HIGH (9)Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64282020‑03‑23 16:15:18HIGH (9)Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64272020‑03‑23 16:15:17HIGH (9)Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64262020‑03‑23 16:15:17MEDIUM (7)Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2020‑64252020‑03‑23 16:15:17MEDIUM (5)Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension.33NETWORK
CVE‑2020‑64242020‑03‑23 16:15:17HIGH (9)Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64232020‑04‑13 18:15:12HIGH (9)Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64222020‑03‑23 16:15:17HIGH (9)Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64202020‑03‑23 16:15:17HIGH (9)Insufficient policy enforcement in media in Google Chrome prior to 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2020‑64192020‑06‑03 23:15:12HIGH (9)Out of bounds write in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64182020‑02‑27 23:15:13HIGH (9)Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64172020‑02‑11 15:15:15HIGH (8)Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.26LOCAL
CVE‑2020‑64162020‑02‑11 15:15:15HIGH (9)Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64152020‑02‑11 15:15:14HIGH (9)Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64142020‑02‑11 15:15:14HIGH (9)Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2020‑64132020‑02‑11 15:15:14HIGH (9)Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.36NETWORK
CVE‑2020‑64122020‑02‑11 15:15:14MEDIUM (5)Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.33NETWORK
CVE‑2020‑64112020‑02‑11 15:15:14MEDIUM (5)Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.33NETWORK
CVE‑2020‑64102020‑02‑11 15:15:14HIGH (9)Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.36NETWORK
CVE‑2020‑64092020‑02‑11 15:15:14HIGH (9)Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.36NETWORK
CVE‑2020‑64082020‑02‑11 15:15:14MEDIUM (7)Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.34NETWORK
CVE‑2020‑64072020‑02‑27 23:15:13HIGH (9)Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64062020‑02‑11 15:15:14HIGH (9)Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64052020‑02‑11 15:15:14MEDIUM (7)Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑64042020‑02‑11 15:15:14HIGH (9)Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑64032020‑02‑11 15:15:14MEDIUM (4)Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2020‑64022020‑02‑11 15:15:13HIGH (9)Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.36NETWORK
CVE‑2020‑64012020‑02‑11 15:15:13MEDIUM (7)Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.34NETWORK
CVE‑2020‑64002020‑02‑11 15:15:13MEDIUM (7)Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑63992020‑02‑11 15:15:13MEDIUM (7)Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑63982020‑02‑11 15:15:13HIGH (9)Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2020‑63972020‑02‑11 15:15:13MEDIUM (7)Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2020‑63962020‑02‑11 15:15:13MEDIUM (4)Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2020‑63952020‑02‑11 15:15:13MEDIUM (7)Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑63942020‑02‑11 15:15:13MEDIUM (5)Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.33NETWORK
CVE‑2020‑63932020‑02‑11 15:15:13MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2020‑63922020‑02‑11 15:15:13MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.31NETWORK
CVE‑2020‑63912020‑02‑11 15:15:13MEDIUM (4)Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.31NETWORK
CVE‑2020‑63902020‑02‑11 15:15:13HIGH (9)Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63892020‑02‑11 15:15:13HIGH (9)Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.36NETWORK
CVE‑2020‑63882020‑02‑11 15:15:12HIGH (9)Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63872020‑02‑11 15:15:12HIGH (9)Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.36NETWORK
CVE‑2020‑63862020‑02‑27 23:15:12HIGH (9)Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63852020‑02‑11 15:15:12HIGH (9)Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.36NETWORK
CVE‑2020‑63842020‑02‑27 23:15:12HIGH (9)Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63832020‑02‑27 23:15:12HIGH (9)Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63822020‑02‑11 15:15:12HIGH (9)Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63812020‑02‑11 15:15:12HIGH (9)Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63802020‑02‑11 15:15:12HIGH (9)Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension.36NETWORK
CVE‑2020‑63792020‑02‑11 15:15:12HIGH (9)Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63782020‑02‑11 15:15:12HIGH (9)Use after free in speech in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑63772020‑01‑10 22:15:12HIGH (9)Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑168732020‑09‑11 17:15:17MEDIUM (5)<p>A spoofing vulnerability manifests in Microsoft Xamarin.Forms due to the default settings on Android WebView version prior to 83.0.4103.106. This vulnerability could allow an attacker to execute arbitrary Javascript code on a target system.</p> <p>For the attack to be successful, the targeted user would need to browse to a malicious website or a website serving the malicious code through Xamarin.Forms.</p> <p>The security update addresses this vulnerability by preventing the malicious Javascript from running in the WebView.</p> 31NETWORK
CVE‑2020‑160462021‑01‑14 21:15:13MEDIUM (6)Script injection in iOSWeb in Google Chrome on iOS prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code via a crafted HTML page.33NETWORK
CVE‑2020‑160452021‑01‑14 21:15:13CRITICAL (10)Use after Free in Payments in Google Chrome on Android prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160442021‑02‑09 14:15:14HIGH (9)Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.36NETWORK
CVE‑2020‑160432021‑01‑08 19:15:14HIGH (9)Insufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access control via malicious network traffic.36NETWORK
CVE‑2020‑160422021‑01‑08 19:15:14MEDIUM (7)Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑160412021‑01‑08 19:15:14HIGH (8)Out of bounds read in networking in Google Chrome prior to 87.0.4280.88 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.35NETWORK
CVE‑2020‑160402021‑01‑08 19:15:14MEDIUM (7)Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2020‑160392021‑01‑08 19:15:14HIGH (9)Use after free in extensions in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160382021‑01‑08 19:15:14HIGH (9)Use after free in media in Google Chrome on OS X prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160372021‑01‑08 19:15:14HIGH (9)Use after free in clipboard in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160362021‑01‑08 19:15:14MEDIUM (7)Inappropriate implementation in cookies in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass cookie restrictions via a crafted HTML page.34NETWORK
CVE‑2020‑160352021‑01‑08 19:15:14HIGH (9)Insufficient data validation in cros-disks in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.36NETWORK
CVE‑2020‑160342021‑01‑08 19:15:14MEDIUM (4)Inappropriate implementation in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a local attacker to bypass policy restrictions via a crafted HTML page.31NETWORK
CVE‑2020‑160332021‑01‑08 19:15:14MEDIUM (4)Inappropriate implementation in WebUSB in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof security UI via a crafted HTML page.31NETWORK
CVE‑2020‑160322021‑01‑08 19:15:14MEDIUM (4)Insufficient data validation in sharing in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2020‑160312021‑01‑08 19:15:14MEDIUM (4)Insufficient data validation in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2020‑160302021‑01‑08 19:15:14MEDIUM (6)Insufficient data validation in Blink in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.33NETWORK
CVE‑2020‑160292021‑01‑08 19:15:13HIGH (9)Inappropriate implementation in PDFium in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file.36NETWORK
CVE‑2020‑160282021‑01‑08 19:15:13HIGH (9)Heap buffer overflow in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160272021‑01‑08 19:15:13MEDIUM (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 87.0.4280.66 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from the user's disk via a crafted Chrome Extension.34NETWORK
CVE‑2020‑160262021‑01‑08 19:15:13HIGH (9)Use after free in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160252021‑01‑08 19:15:13CRITICAL (10)Heap buffer overflow in clipboard in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160242021‑01‑08 19:15:13CRITICAL (10)Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160232021‑01‑08 19:15:13HIGH (9)Use after free in WebCodecs in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160222021‑01‑08 19:15:13HIGH (9)Insufficient policy enforcement in networking in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially bypass firewall controls via a crafted HTML page.36NETWORK
CVE‑2020‑160212021‑01‑08 19:15:13HIGH (8)Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to perform OS-level privilege escalation via a malicious file.26NETWORK
CVE‑2020‑160202021‑01‑08 19:15:13HIGH (9)Inappropriate implementation in cryptohome in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass discretionary access control via a malicious file.36NETWORK
CVE‑2020‑160192021‑01‑08 19:15:13HIGH (9)Inappropriate implementation in filesystem in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.36NETWORK
CVE‑2020‑160182021‑01‑08 19:15:13CRITICAL (10)Use after free in payments in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160172021‑01‑08 19:15:13CRITICAL (10)Use after free in site isolation in Google Chrome prior to 86.0.4240.198 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160162021‑01‑08 19:15:13CRITICAL (10)Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160152021‑01‑08 19:15:13HIGH (9)Insufficient data validation in WASM in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160142021‑01‑08 19:15:13CRITICAL (10)Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160132021‑01‑08 19:15:12HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160122021‑01‑08 19:15:12MEDIUM (4)Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2020‑160112020‑11‑03 03:15:16CRITICAL (10)Heap buffer overflow in UI in Google Chrome on Windows prior to 86.0.4240.183 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160102020‑11‑03 03:15:16HIGH (9)Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑160092020‑11‑03 03:15:16HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160082020‑11‑03 03:15:15HIGH (9)Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.36NETWORK
CVE‑2020‑160072020‑11‑03 03:15:15HIGH (8)Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.26LOCAL
CVE‑2020‑160062020‑11‑03 03:15:15HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160052020‑11‑03 03:15:15HIGH (9)Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160042020‑11‑03 03:15:15HIGH (9)Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160032020‑11‑03 03:15:15HIGH (9)Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160022020‑11‑03 03:15:15HIGH (9)Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2020‑160012020‑11‑03 03:15:15HIGH (9)Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑160002020‑11‑03 03:15:15HIGH (9)Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159992020‑11‑03 03:15:15MEDIUM (7)Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2020‑159982020‑11‑03 03:15:15HIGH (9)Use after free in USB in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159972020‑11‑03 03:15:15HIGH (9)Use after free in Mojo in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159962020‑11‑03 03:15:15HIGH (9)Use after free in passwords in Google Chrome prior to 86.0.4240.99 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159952020‑11‑03 03:15:15HIGH (9)Out of bounds write in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159942020‑11‑03 03:15:15HIGH (9)Use after free in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159932020‑11‑03 03:15:14CRITICAL (10)Use after free in printing in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.46NETWORK
CVE‑2020‑159922020‑11‑03 03:15:14HIGH (9)Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2020‑159912020‑11‑03 03:15:14HIGH (9)Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159902020‑11‑03 03:15:14HIGH (9)Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159892020‑11‑03 03:15:14MEDIUM (6)Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.24LOCAL
CVE‑2020‑159882020‑11‑03 03:15:14MEDIUM (6)Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.33NETWORK
CVE‑2020‑159872020‑11‑03 03:15:14HIGH (9)Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.36NETWORK
CVE‑2020‑159862020‑11‑03 03:15:14MEDIUM (7)Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2020‑159852020‑11‑03 03:15:14MEDIUM (7)Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2020‑159842020‑11‑03 03:15:14MEDIUM (7)Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL.34NETWORK
CVE‑2020‑159832020‑11‑03 03:15:14HIGH (8)Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page.26LOCAL
CVE‑2020‑159822020‑11‑03 03:15:14MEDIUM (7)Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑159812020‑11‑03 03:15:14MEDIUM (7)Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2020‑159802020‑11‑03 03:15:14HIGH (8)Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents.26LOCAL
CVE‑2020‑159792020‑11‑03 03:15:13HIGH (9)Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159782020‑11‑03 03:15:13HIGH (9)Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2020‑159772020‑11‑03 03:15:13MEDIUM (7)Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.34NETWORK
CVE‑2020‑159762020‑11‑03 03:15:13HIGH (9)Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159752020‑11‑03 03:15:13HIGH (9)Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159742020‑11‑03 03:15:13HIGH (9)Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.36NETWORK
CVE‑2020‑159732020‑11‑03 03:15:13MEDIUM (7)Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.34NETWORK
CVE‑2020‑159722020‑11‑03 03:15:13HIGH (9)Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159712020‑11‑03 03:15:13HIGH (9)Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159702020‑11‑03 03:15:13HIGH (9)Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159692020‑11‑03 03:15:13HIGH (9)Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159682020‑11‑03 03:15:13HIGH (9)Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159672020‑11‑03 03:15:13HIGH (9)Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2020‑159662020‑09‑21 20:15:13MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.31NETWORK
CVE‑2020‑159652020‑09‑21 20:15:13HIGH (9)Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2020‑159642020‑09‑21 20:15:13HIGH (9)Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2020‑159632020‑09‑21 20:15:13CRITICAL (10)Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2020‑159622020‑09‑21 20:15:13HIGH (9)Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2020‑159612020‑09‑21 20:15:13CRITICAL (10)Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.36NETWORK
CVE‑2020‑159602020‑09‑21 20:15:13HIGH (9)Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2020‑159592020‑09‑21 20:15:13MEDIUM (4)Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.31NETWORK
CVE‑2019‑80752019‑09‑27 16:15:11HIGH (8)Adobe Flash Player version 32.0.0.192 and earlier versions have a Same Origin Policy Bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.44NETWORK
CVE‑2019‑58812019‑11‑25 15:15:38HIGH (8)Out of bounds read in SwiftShader in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.35NETWORK
CVE‑2019‑58802019‑11‑25 15:15:38HIGH (7)Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑58792019‑11‑25 15:15:38MEDIUM (7)Insufficient policy enforcement in extensions in Google Chrome prior to 77.0.3865.75 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.34NETWORK
CVE‑2019‑58782019‑11‑25 15:15:38HIGH (9)Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58772019‑11‑25 15:15:37HIGH (9)Out of bounds memory access in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58762019‑11‑25 15:15:37HIGH (9)Use after free in media in Google Chrome on Android prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58752019‑11‑25 15:15:37MEDIUM (4)Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑58742019‑11‑25 15:15:37HIGH (9)Insufficient filtering in URI schemes in Google Chrome on Windows prior to 77.0.3865.75 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2019‑58732019‑11‑25 15:15:37MEDIUM (4)Insufficient policy validation in navigation in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑58722019‑11‑25 15:15:37MEDIUM (7)Use after free in Mojo in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58712019‑11‑25 15:15:37HIGH (9)Heap buffer overflow in Skia in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58702019‑11‑25 15:15:37CRITICAL (10)Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2019‑58692019‑11‑25 15:15:37MEDIUM (7)Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58682019‑11‑25 15:15:37MEDIUM (6)Use after free in PDFium in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.24LOCAL
CVE‑2019‑58672019‑11‑25 15:15:37MEDIUM (7)Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58662019‑11‑25 15:15:37CRITICAL (10)Out of bounds memory access in JavaScript in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.46NETWORK
CVE‑2019‑58652019‑11‑25 15:15:37MEDIUM (7)Insufficient policy enforcement in navigations in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2019‑58642019‑11‑25 15:15:37MEDIUM (4)Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.31NETWORK
CVE‑2019‑58622019‑11‑25 15:15:37MEDIUM (7)Insufficient data validation in AppCache in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2019‑58612019‑11‑25 15:15:36MEDIUM (4)Insufficient data validation in Blink in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to bypass anti-clickjacking policy via a crafted HTML page.31NETWORK
CVE‑2019‑58602019‑11‑25 15:15:36MEDIUM (6)Use after free in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.24LOCAL
CVE‑2019‑58592019‑11‑25 15:15:36HIGH (9)Insufficient filtering in URI schemes in Google Chrome on Windows prior to 76.0.3809.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.36NETWORK
CVE‑2019‑58582019‑11‑25 15:15:36HIGH (9)Incorrect security UI in MacOS services integration in Google Chrome on OS X prior to 76.0.3809.87 allowed a local attacker to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2019‑58572019‑11‑25 15:15:36MEDIUM (7)Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58562019‑11‑25 15:15:36HIGH (9)Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.36NETWORK
CVE‑2019‑58552019‑11‑25 15:15:36MEDIUM (7)Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.34NETWORK
CVE‑2019‑58542019‑11‑25 15:15:36HIGH (9)Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2019‑58532019‑11‑25 15:15:36HIGH (9)Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58522019‑11‑25 15:15:36MEDIUM (7)Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑58512019‑11‑25 15:15:36HIGH (9)Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58502019‑11‑25 15:15:36CRITICAL (10)Use after free in offline mode in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.36NETWORK
CVE‑2019‑58492019‑11‑25 15:15:36HIGH (8)Out of bounds read in Skia in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.35NETWORK
CVE‑2019‑58482019‑11‑25 15:15:36MEDIUM (7)Incorrect font handling in autofill in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑58472019‑11‑25 15:15:36MEDIUM (7)Inappropriate implementation in JavaScript in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58462020‑01‑03 23:15:13MEDIUM (7)Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58452020‑01‑03 23:15:13MEDIUM (7)Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58442020‑01‑03 23:15:12MEDIUM (7)Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58432019‑12‑10 21:15:16HIGH (9)Out of bounds memory access in JavaScript in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58422019‑11‑25 15:15:36MEDIUM (7)Use after free in Blink in Google Chrome prior to 75.0.3770.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58412019‑12‑10 21:15:16HIGH (9)Out of bounds memory access in JavaScript in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58402019‑06‑27 17:15:16MEDIUM (4)Incorrect security UI in popup blocker in Google Chrome on iOS prior to 75.0.3770.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2019‑58392019‑06‑27 17:15:16MEDIUM (4)Excessive data validation in URL parser in Google Chrome prior to 75.0.3770.80 allowed a remote attacker who convinced a user to input a URL to bypass website URL validation via a crafted URL.31NETWORK
CVE‑2019‑58382019‑06‑27 17:15:16MEDIUM (4)Insufficient policy enforcement in extensions API in Google Chrome prior to 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension.31NETWORK
CVE‑2019‑58372019‑06‑27 17:15:16MEDIUM (7)Resource size information leakage in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑58362019‑06‑27 17:15:15HIGH (9)Heap buffer overflow in ANGLE in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58352019‑06‑27 17:15:15MEDIUM (7)Object lifecycle issue in SwiftShader in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.34NETWORK
CVE‑2019‑58342019‑06‑27 17:15:15MEDIUM (7)Insufficient data validation in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑58332019‑06‑27 17:15:15MEDIUM (4)Incorrect dialog box scoping in browser in Google Chrome on Android prior to 75.0.3770.80 allowed a remote attacker to display misleading security UI via a crafted HTML page.31NETWORK
CVE‑2019‑58322019‑06‑27 17:15:15MEDIUM (7)Insufficient policy enforcement in XMLHttpRequest in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑58312019‑06‑27 17:15:15HIGH (9)Object lifecycle issue in V8 in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58302019‑06‑27 17:15:15MEDIUM (7)Insufficient policy enforcement in CORS in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑58292019‑06‑27 17:15:15HIGH (9)Integer overflow in download manager in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2019‑58282019‑06‑27 17:15:15HIGH (9)Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2019‑58272019‑06‑27 17:15:15HIGH (9)Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58262019‑11‑25 20:15:12MEDIUM (7)Use after free in IndexedDB in Google Chrome prior to 73.0.3683.86 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58252019‑11‑25 20:15:11MEDIUM (7)Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑58242019‑06‑27 17:15:15HIGH (9)Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58232019‑06‑27 17:15:15MEDIUM (5)Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.33NETWORK
CVE‑2019‑58222019‑06‑27 17:15:15HIGH (9)Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2019‑58212019‑06‑27 17:15:15HIGH (9)Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2019‑58202019‑06‑27 17:15:15HIGH (9)Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2019‑58192019‑06‑27 17:15:15HIGH (8)Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.26LOCAL
CVE‑2019‑58182019‑06‑27 17:15:15MEDIUM (7)Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.34NETWORK
CVE‑2019‑58172019‑06‑27 17:15:14HIGH (9)Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58162019‑06‑27 17:15:14HIGH (9)Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page.36NETWORK
CVE‑2019‑58142019‑06‑27 17:15:14MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑58132019‑06‑27 17:15:14HIGH (9)Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58122019‑06‑27 17:15:14MEDIUM (7)Inadequate security UI in iOS UI in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑58112019‑06‑27 17:15:14HIGH (9)Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2019‑58102019‑06‑27 17:15:14MEDIUM (7)Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑58092019‑06‑27 17:15:14HIGH (9)Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.36NETWORK
CVE‑2019‑58082019‑06‑27 17:15:14HIGH (9)Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58072019‑06‑27 17:15:14HIGH (9)Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58062019‑06‑27 17:15:14HIGH (9)Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑58052019‑06‑27 17:15:14MEDIUM (7)Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.34NETWORK
CVE‑2019‑58042019‑05‑23 20:29:01MEDIUM (6)Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name.24LOCAL
CVE‑2019‑58032019‑05‑23 20:29:01MEDIUM (7)Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2019‑58022019‑05‑23 20:29:01MEDIUM (7)Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑58012019‑05‑23 20:29:01MEDIUM (7)Incorrect eliding of URLs in Omnibox in Google Chrome on iOS prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑58002019‑05‑23 20:29:01MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2019‑57992019‑05‑23 20:29:01MEDIUM (7)Incorrect inheritance of a new document's policy in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2019‑57982019‑05‑23 20:29:01MEDIUM (7)Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.34NETWORK
CVE‑2019‑57972022‑09‑29 02:15:12HIGH (8)Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.26NETWORK
CVE‑2019‑57962019‑05‑23 20:29:01HIGH (8)Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.26NETWORK
CVE‑2019‑57952019‑05‑23 20:29:01HIGH (9)Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.36NETWORK
CVE‑2019‑57942019‑05‑23 20:29:01MEDIUM (7)Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑57932019‑05‑23 20:29:01MEDIUM (7)Insufficient policy enforcement in extensions in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to initiate the extensions installation user interface via a crafted HTML page.34NETWORK
CVE‑2019‑57922019‑05‑23 20:29:01HIGH (9)Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.36NETWORK
CVE‑2019‑57912019‑05‑23 20:29:01HIGH (9)Inappropriate optimization in V8 in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2019‑57902019‑05‑23 20:29:01HIGH (9)An integer overflow leading to an incorrect capacity of a buffer in JavaScript in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2019‑57892019‑05‑23 20:29:01HIGH (9)An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2019‑57882019‑05‑23 20:29:01HIGH (9)An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2019‑57872019‑05‑23 20:29:01HIGH (9)Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑57862019‑06‑27 17:15:14MEDIUM (7)Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.34NETWORK
CVE‑2019‑57852019‑06‑27 17:15:14MEDIUM (4)Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2019‑57842019‑06‑27 17:15:14MEDIUM (4)Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57832019‑02‑19 17:29:02MEDIUM (7)Missing URI encoding of untrusted input in DevTools in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform a Dangling Markup Injection attack via a crafted HTML page.00NETWORK
CVE‑2019‑57822019‑02‑19 17:29:02MEDIUM (7)Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2019‑57812019‑02‑19 17:29:02MEDIUM (4)Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2019‑57802019‑02‑19 17:29:02MEDIUM (5)Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.00LOCAL
CVE‑2019‑57792019‑02‑19 17:29:02MEDIUM (4)Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.00NETWORK
CVE‑2019‑57782019‑02‑19 17:29:02MEDIUM (4)A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.00NETWORK
CVE‑2019‑57772019‑02‑19 17:29:02MEDIUM (4)Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2019‑57762019‑02‑19 17:29:02MEDIUM (4)Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2019‑57752019‑02‑19 17:29:02MEDIUM (4)Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2019‑57742019‑02‑19 17:29:02MEDIUM (7)Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux prior to 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.00NETWORK
CVE‑2019‑57732019‑02‑19 17:29:02MEDIUM (4)Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.00NETWORK
CVE‑2019‑57722019‑02‑19 17:29:02MEDIUM (7)Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2019‑57712019‑02‑19 17:29:02MEDIUM (7)An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2019‑57702019‑02‑19 17:29:01MEDIUM (7)Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2019‑57692019‑02‑19 17:29:01MEDIUM (7)Incorrect handling of invalid end character position when front rendering in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57682019‑02‑19 17:29:01MEDIUM (4)DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.00NETWORK
CVE‑2019‑57672019‑02‑19 17:29:01MEDIUM (4)Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to 72.0.3626.81 allowed an attacker who convinced the user to install a malicious application to access privacy/security sensitive web APIs via a crafted APK.00NETWORK
CVE‑2019‑57662019‑02‑19 17:29:01MEDIUM (4)Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2019‑57652019‑02‑19 17:29:01MEDIUM (4)An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.00NETWORK
CVE‑2019‑57642019‑02‑19 17:29:01MEDIUM (7)Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57632019‑02‑19 17:29:01MEDIUM (7)Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57622019‑02‑19 17:29:01MEDIUM (7)Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.00NETWORK
CVE‑2019‑57612019‑02‑19 17:29:01MEDIUM (7)Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57602019‑02‑19 17:29:01MEDIUM (7)Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57592019‑02‑19 17:29:01MEDIUM (7)Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2019‑57582019‑02‑19 17:29:01MEDIUM (7)Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57572019‑02‑19 17:29:01MEDIUM (7)An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.00NETWORK
CVE‑2019‑57562019‑02‑19 17:29:00MEDIUM (7)Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.00NETWORK
CVE‑2019‑57552019‑02‑19 17:29:00MEDIUM (6)Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.00NETWORK
CVE‑2019‑57542019‑02‑19 17:29:00MEDIUM (4)Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.00NETWORK
CVE‑2019‑156842019‑11‑25 16:15:14MEDIUM (4)Kaspersky Protection extension for web browser Google Chrome prior to 30.112.62.0 was vulnerable to unauthorized access to its features remotely that could lead to removing other installed extensions.31NETWORK
CVE‑2019‑137682023‑01‑02 23:15:10HIGH (7)Use after free in FileAPI in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chrome security severity: High)34NETWORK
CVE‑2019‑137672020‑01‑10 22:15:11HIGH (9)Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137662020‑01‑03 23:15:12MEDIUM (7)Use-after-free in accessibility in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑137652020‑01‑03 23:15:12MEDIUM (7)Use-after-free in content delivery manager in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑137642019‑12‑10 22:15:16HIGH (9)Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137632019‑12‑10 22:15:16MEDIUM (4)Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.31NETWORK
CVE‑2019‑137622019‑12‑10 22:15:16LOW (3)Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.21LOCAL
CVE‑2019‑137612019‑12‑10 22:15:16MEDIUM (4)Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2019‑137592019‑12‑10 22:15:15MEDIUM (4)Incorrect security UI in interstitials in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.31NETWORK
CVE‑2019‑137582019‑12‑10 22:15:15MEDIUM (4)Insufficient policy enforcement in navigation in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2019‑137572019‑12‑10 22:15:15MEDIUM (4)Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2019‑137562019‑12‑10 22:15:15MEDIUM (4)Incorrect security UI in printing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.31NETWORK
CVE‑2019‑137552019‑12‑10 22:15:15MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.31NETWORK
CVE‑2019‑137542019‑12‑10 22:15:15MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2019‑137532019‑12‑10 22:15:15MEDIUM (7)Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑137522019‑12‑10 22:15:15MEDIUM (7)Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑137512019‑12‑10 22:15:15MEDIUM (7)Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑137502019‑12‑10 22:15:15MEDIUM (7)Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.34NETWORK
CVE‑2019‑137492019‑12‑10 22:15:15MEDIUM (7)Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2019‑137482019‑12‑10 22:15:15MEDIUM (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑137472019‑12‑10 22:15:14HIGH (9)Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137462019‑12‑10 22:15:14MEDIUM (7)Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2019‑137452019‑12‑10 22:15:14MEDIUM (7)Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑137442019‑12‑10 22:15:14MEDIUM (7)Insufficient policy enforcement in cookies in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑137432019‑12‑10 22:15:14MEDIUM (7)Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page.34NETWORK
CVE‑2019‑137422019‑12‑10 22:15:14MEDIUM (7)Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.34NETWORK
CVE‑2019‑137412019‑12‑10 22:15:14HIGH (9)Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.36NETWORK
CVE‑2019‑137402019‑12‑10 22:15:14MEDIUM (7)Incorrect security UI in sharing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑137392019‑12‑10 22:15:14MEDIUM (7)Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.34NETWORK
CVE‑2019‑137382019‑12‑10 22:15:14MEDIUM (7)Insufficient policy enforcement in navigation in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2019‑137372019‑12‑10 22:15:13MEDIUM (7)Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2019‑137362019‑12‑10 22:15:13HIGH (9)Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.36NETWORK
CVE‑2019‑137352019‑12‑10 22:15:13HIGH (9)Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2019‑137342019‑12‑10 22:15:13HIGH (9)Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137322019‑12‑10 22:15:13HIGH (9)Use-after-free in WebAudio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137302019‑12‑10 22:15:13HIGH (9)Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137292019‑12‑10 22:15:13HIGH (9)Use-after-free in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137282019‑12‑10 22:15:13HIGH (9)Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137272019‑12‑10 22:15:13HIGH (9)Insufficient policy enforcement in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2019‑137262019‑12‑10 22:15:13HIGH (9)Buffer overflow in password manager in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2019‑137252019‑12‑10 22:15:13HIGH (9)Use-after-free in Bluetooth in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2019‑137242019‑11‑25 15:15:34HIGH (9)Out of bounds memory access in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137232019‑11‑25 15:15:34HIGH (9)Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137222020‑01‑14 19:15:13MEDIUM (7)Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑137212019‑11‑25 15:15:34HIGH (9)Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137202019‑11‑25 15:15:34HIGH (9)Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑137192019‑11‑25 15:15:34MEDIUM (4)Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.31NETWORK
CVE‑2019‑137182019‑11‑25 15:15:34MEDIUM (4)Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2019‑137172019‑11‑25 15:15:34MEDIUM (4)Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.31NETWORK
CVE‑2019‑137162019‑11‑25 15:15:34MEDIUM (4)Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.31NETWORK
CVE‑2019‑137152019‑11‑25 15:15:34MEDIUM (4)Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2019‑137142019‑11‑25 15:15:33MEDIUM (6)Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.33NETWORK
CVE‑2019‑137132019‑11‑25 15:15:33MEDIUM (7)Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑137112019‑11‑25 15:15:33MEDIUM (5)Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.41NETWORK
CVE‑2019‑137102019‑11‑25 15:15:33MEDIUM (4)Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.31NETWORK
CVE‑2019‑137092019‑11‑25 15:15:33MEDIUM (7)Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.34NETWORK
CVE‑2019‑137082019‑11‑25 15:15:33MEDIUM (4)Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑137072019‑11‑25 15:15:33MEDIUM (6)Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.24LOCAL
CVE‑2019‑137062019‑11‑25 15:15:33HIGH (8)Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.26LOCAL
CVE‑2019‑137052019‑11‑25 15:15:33MEDIUM (4)Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.31NETWORK
CVE‑2019‑137042019‑11‑25 15:15:33MEDIUM (4)Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.31NETWORK
CVE‑2019‑137032019‑11‑25 15:15:33MEDIUM (4)Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑137022019‑11‑25 15:15:33HIGH (8)Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.26LOCAL
CVE‑2019‑137012019‑11‑25 15:15:33MEDIUM (4)Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑137002019‑11‑25 15:15:33HIGH (9)Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136992019‑11‑25 15:15:33HIGH (9)Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136982019‑11‑25 15:15:32HIGH (9)Out of bounds memory access in JavaScript in Google Chrome prior to 73.0.3683.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136972019‑11‑25 15:15:32MEDIUM (7)Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑136962019‑11‑25 15:15:32HIGH (9)Use after free in JavaScript in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136952019‑11‑25 15:15:32HIGH (9)Use after free in audio in Google Chrome on Android prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136942019‑11‑25 15:15:32HIGH (9)Use after free in WebRTC in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136932019‑11‑25 15:15:32HIGH (9)Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2019‑136922019‑11‑25 15:15:32HIGH (9)Insufficient policy enforcement in reader mode in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.36NETWORK
CVE‑2019‑136912019‑11‑25 15:15:32MEDIUM (4)Insufficient validation of untrusted input in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑136902023‑08‑25 19:15:08CRITICAL (10)Inappropriate implementation in OS in Google Chrome on ChromeOS prior to 75.0.3770.80 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)36NETWORK
CVE‑2019‑136892023‑08‑25 19:15:08HIGH (8)Inappropriate implementation in OS in Google Chrome on ChromeOS prior to 75.0.3770.80 allowed a remote attacker to perform arbitrary read/write via a malicious file. (Chromium security severity: Critical)26LOCAL
CVE‑2019‑136882019‑11‑25 15:15:32HIGH (9)Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136872019‑11‑25 15:15:32HIGH (9)Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136862019‑11‑25 15:15:32HIGH (9)Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136852019‑11‑25 15:15:32HIGH (9)Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2019‑136842019‑11‑25 15:15:32MEDIUM (5)Inappropriate implementation in JavaScript in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.24NETWORK
CVE‑2019‑136832019‑11‑25 15:15:31MEDIUM (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑136822019‑11‑25 15:15:31HIGH (9)Insufficient policy enforcement in external protocol handling in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.36NETWORK
CVE‑2019‑136812019‑11‑25 15:15:31MEDIUM (4)Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass download restrictions via a crafted HTML page.31NETWORK
CVE‑2019‑136802019‑11‑25 15:15:31MEDIUM (5)Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections.41NETWORK
CVE‑2019‑136792019‑11‑25 15:15:31LOW (3)Insufficient policy enforcement in PDFium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to show print dialogs via a crafted PDF file.21LOCAL
CVE‑2019‑136782019‑11‑25 15:15:31MEDIUM (7)Incorrect data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.34NETWORK
CVE‑2019‑136772019‑11‑25 15:15:31MEDIUM (7)Insufficient policy enforcement in site isolation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.34NETWORK
CVE‑2019‑136762019‑11‑25 15:15:31MEDIUM (4)Insufficient policy enforcement in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.31NETWORK
CVE‑2019‑136752019‑11‑25 15:15:31MEDIUM (4)Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.31NETWORK
CVE‑2019‑136742019‑11‑25 15:15:31MEDIUM (4)IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2019‑136732019‑11‑25 15:15:31HIGH (7)Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑136722019‑12‑10 21:15:15MEDIUM (7)Incorrect security UI in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page on iOS.34NETWORK
CVE‑2019‑136712019‑11‑25 15:15:31MEDIUM (4)UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.31NETWORK
CVE‑2019‑136702019‑11‑25 15:15:31MEDIUM (7)Insufficient data validation in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.34NETWORK
CVE‑2019‑136692019‑11‑25 15:15:31MEDIUM (4)Incorrect data validation in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑136682019‑11‑25 15:15:30HIGH (7)Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑136672019‑11‑25 15:15:30MEDIUM (4)Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.31NETWORK
CVE‑2019‑136662019‑11‑25 15:15:30HIGH (7)Information leak in storage in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.34NETWORK
CVE‑2019‑136652019‑11‑25 15:15:30MEDIUM (7)Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.34NETWORK
CVE‑2019‑136642019‑11‑25 15:15:30MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2019‑136632019‑11‑25 15:15:30MEDIUM (4)IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2019‑136622019‑11‑25 15:15:30MEDIUM (7)Insufficient policy enforcement in navigations in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.34NETWORK
CVE‑2019‑136612019‑11‑25 15:15:30MEDIUM (4)UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.31NETWORK
CVE‑2019‑136602019‑11‑25 15:15:30MEDIUM (5)UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.41NETWORK
CVE‑2019‑136592019‑11‑25 15:15:30MEDIUM (4)IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.31NETWORK
CVE‑2018‑61792019‑01‑09 19:29:11MEDIUM (4)Insufficient enforcement of file access permission in the activeTab case in Extensions in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.00NETWORK
CVE‑2018‑61782019‑01‑09 19:29:11MEDIUM (4)Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension.00NETWORK
CVE‑2018‑61772019‑06‑27 17:15:14MEDIUM (4)Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑61762019‑06‑27 17:15:13MEDIUM (5)Insufficient file type enforcement in Extensions API in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted Chrome Extension.00LOCAL
CVE‑2018‑61752019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61742019‑01‑09 19:29:11MEDIUM (7)Integer overflows in Swiftshader in Google Chrome prior to 68.0.3440.75 potentially allowed a remote attacker to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2018‑61732019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61722019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61712019‑06‑27 17:15:13LOW (3)Use after free in Bluetooth in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.00ADJACENT_NETWORK
CVE‑2018‑61702019‑01‑09 19:29:11MEDIUM (7)A bad cast in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2018‑61692019‑01‑09 19:29:11MEDIUM (4)Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.00NETWORK
CVE‑2018‑61682019‑06‑27 17:15:13MEDIUM (4)Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2018‑61672019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61662019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61652019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of reloads in Navigation in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑61642019‑01‑09 19:29:11MEDIUM (4)Insufficient origin checks for CSS content in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑61632019‑01‑09 19:29:11MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61622019‑01‑09 19:29:11MEDIUM (7)Improper deserialization in WebGL in Google Chrome on Mac prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61612019‑06‑27 17:15:13MEDIUM (7)Insufficient policy enforcement in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.00NETWORK
CVE‑2018‑61602019‑01‑09 19:29:10MEDIUM (4)JavaScript alert handling in Prompts in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑61592019‑06‑27 17:15:13MEDIUM (4)Insufficient policy enforcement in ServiceWorker in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2018‑61582019‑01‑09 19:29:10MEDIUM (5)A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61572019‑06‑27 17:15:13MEDIUM (7)Type confusion in WebRTC in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.00NETWORK
CVE‑2018‑61562019‑06‑27 17:15:13HIGH (9)Incorect derivation of a packet length in WebRTC in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.36NETWORK
CVE‑2018‑61552019‑06‑27 17:15:13MEDIUM (4)Incorrect handling of frames in the VP8 parser in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.00NETWORK
CVE‑2018‑61542019‑06‑27 17:15:13MEDIUM (7)Insufficient data validation in WebGL in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61532019‑01‑09 19:29:10MEDIUM (7)A precision error in Skia in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2018‑61522018‑12‑04 17:29:02MEDIUM (7)The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction.00NETWORK
CVE‑2018‑61512019‑01‑09 19:29:10MEDIUM (7)Bad cast in DevTools in Google Chrome on Win, Linux, Mac, Chrome OS prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted Chrome Extension.00NETWORK
CVE‑2018‑61502019‑06‑27 17:15:13MEDIUM (4)Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑61492019‑06‑27 17:15:13MEDIUM (7)Type confusion in JavaScript in Google Chrome prior to 67.0.3396.87 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2018‑61482019‑06‑27 17:15:13MEDIUM (4)Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.00NETWORK
CVE‑2018‑61472019‑01‑09 19:29:10LOW (2)Lack of secure text entry mode in Browser UI in Google Chrome on Mac prior to 67.0.3396.62 allowed a local attacker to obtain potentially sensitive information from process memory via a local process.00LOCAL
CVE‑2018‑61452019‑06‑27 17:15:13MEDIUM (4)Insufficient data validation in HTML parser in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass same origin policy via a crafted HTML page.00NETWORK
CVE‑2018‑61442019‑01‑09 19:29:10MEDIUM (7)Off-by-one error in PDFium in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file.00NETWORK
CVE‑2018‑61432019‑01‑09 19:29:10MEDIUM (4)Insufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑61422019‑06‑27 17:15:13MEDIUM (4)Array bounds check failure in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2018‑61412019‑01‑09 19:29:10MEDIUM (7)Insufficient validation of an image filter in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑61402019‑01‑09 19:29:10HIGH (9)Allowing the chrome.debugger API to attach to Web UI pages in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.00NETWORK
CVE‑2018‑61392019‑01‑09 19:29:10MEDIUM (7)Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.00NETWORK
CVE‑2018‑61382019‑06‑27 17:15:13MEDIUM (6)Insufficient policy enforcement in Extensions API in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.00NETWORK
CVE‑2018‑61372019‑01‑09 19:29:10MEDIUM (4)CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑61362019‑06‑27 17:15:13MEDIUM (4)Missing type check in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑61352019‑01‑09 19:29:10MEDIUM (4)Lack of clearing the previous site before loading alerts from a new one in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page.00NETWORK
CVE‑2018‑61342019‑06‑27 17:15:13MEDIUM (4)Information leak in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass no-referrer policy via a crafted HTML page.00NETWORK
CVE‑2018‑61332019‑01‑09 19:29:10MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61322019‑06‑27 17:15:13MEDIUM (4)Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.00NETWORK
CVE‑2018‑61312019‑06‑27 17:15:12MEDIUM (7)Object lifecycle issue in WebAssembly in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61302019‑06‑27 17:15:12MEDIUM (4)Incorrect handling of object lifetimes in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.00NETWORK
CVE‑2018‑61292019‑06‑27 17:15:12MEDIUM (4)Out of bounds array access in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.00NETWORK
CVE‑2018‑61282019‑06‑27 17:15:12MEDIUM (4)Incorrect URL parsing in WebKit in Google Chrome on iOS prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page.00NETWORK
CVE‑2018‑61272019‑01‑09 19:29:10MEDIUM (7)Early free of object in use in IndexDB in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2018‑61262019‑01‑09 19:29:10MEDIUM (7)A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2018‑61252021‑11‑02 23:15:07MEDIUM (7)Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.34NETWORK
CVE‑2018‑61242019‑01‑09 19:29:09MEDIUM (7)Type confusion in ReadableStreams in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61232019‑01‑09 19:29:09MEDIUM (4)A use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61222021‑11‑02 23:15:07HIGH (9)Type confusion in WebAssembly in Google Chrome prior to 66.0.3359.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2018‑61212019‑06‑27 17:15:12MEDIUM (7)Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page.00NETWORK
CVE‑2018‑61202019‑01‑09 19:29:09MEDIUM (7)An integer overflow that could lead to an attacker-controlled heap out-of-bounds write in PDFium in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.00NETWORK
CVE‑2018‑61192018‑09‑25 14:29:04MEDIUM (4)Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑61182019‑06‑27 17:15:12MEDIUM (7)A double-eviction in the Incognito mode cache that lead to a user-after-free in cache in Google Chrome prior to 66.0.3359.139 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2018‑61172019‑01‑09 19:29:09MEDIUM (4)Confusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2018‑61162018‑12‑04 17:29:02MEDIUM (4)A nullptr dereference in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.00NETWORK
CVE‑2018‑61152018‑12‑04 17:29:02MEDIUM (4)Inappropriate setting of the SEE_MASK_FLAG_NO_UI flag in file downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially bypass OS malware checks via a crafted HTML page.00NETWORK
CVE‑2018‑61142019‑01‑09 19:29:09MEDIUM (4)Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page.00NETWORK
CVE‑2018‑61132019‑01‑09 19:29:09MEDIUM (4)Improper handling of pending navigation entries in Navigation in Google Chrome on iOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via a crafted HTML page.00NETWORK
CVE‑2018‑61122019‑01‑09 19:29:09MEDIUM (4)Making URLs clickable and allowing them to be styled in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.00NETWORK
CVE‑2018‑61112019‑01‑09 19:29:08MEDIUM (7)An object lifetime issue in the developer tools network handler in Google Chrome prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2018‑61102019‑01‑09 19:29:08MEDIUM (6)Parsing documents as HTML in Downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to cause Chrome to execute scripts via a local non-HTML page.00NETWORK
CVE‑2018‑61092019‑01‑09 19:29:08MEDIUM (4)readAsText() can indefinitely read the file picked by the user, rather than only once at the time the file is picked in File API in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to access data on the user file system without explicit consent via a crafted HTML page.00NETWORK
CVE‑2018‑61082018‑12‑04 17:29:02MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted HTML page.00NETWORK
CVE‑2018‑61072018‑12‑04 17:29:02MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61062019‑01‑09 19:29:08MEDIUM (7)An asynchronous generator may return an incorrect state in V8 in Google Chrome prior to 66.0.3359.117 allowing a remote attacker to potentially exploit object corruption via a crafted HTML page.00NETWORK
CVE‑2018‑61052018‑12‑04 17:29:02MEDIUM (4)Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61042018‑12‑04 17:29:02MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑61032018‑12‑04 17:29:02MEDIUM (4)A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page.00NETWORK
CVE‑2018‑61022018‑12‑04 17:29:02MEDIUM (4)Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑61012018‑12‑04 17:29:02MEDIUM (5)A lack of host validation in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page, if the user is running a remote DevTools debugging server.00NETWORK
CVE‑2018‑61002019‑01‑09 19:29:07MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome on macOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑60992018‑12‑04 17:29:01MEDIUM (4)A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60982018‑12‑04 17:29:01MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.00NETWORK
CVE‑2018‑60972019‑01‑09 19:29:06MEDIUM (4)Incorrect handling of asynchronous methods in Fullscreen in Google Chrome on macOS prior to 66.0.3359.117 allowed a remote attacker to enter full screen without showing a warning via a crafted HTML page.00NETWORK
CVE‑2018‑60962019‑01‑09 19:29:06MEDIUM (4)A JavaScript focused window could overlap the fullscreen notification in Fullscreen in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.00NETWORK
CVE‑2018‑60952018‑12‑04 17:29:01MEDIUM (4)Inappropriate dismissal of file picker on keyboard events in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to read local files via a crafted HTML page.00NETWORK
CVE‑2018‑60942018‑12‑04 17:29:01MEDIUM (7)Inline metadata in GarbageCollection in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑60932019‑01‑09 19:29:06MEDIUM (4)Insufficient origin checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60922018‑12‑04 17:29:01MEDIUM (7)An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑60912019‑01‑09 19:29:05MEDIUM (4)Service Workers can intercept any request made by an <embed> or <object> tag in Fetch API in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60902018‑12‑04 17:29:01MEDIUM (7)An integer overflow that lead to a heap buffer-overflow in Skia in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑60892018‑12‑04 17:29:01MEDIUM (4)A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60882018‑12‑04 17:29:01MEDIUM (7)An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.00NETWORK
CVE‑2018‑60872018‑12‑04 17:29:01MEDIUM (7)A use-after-free in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑60862018‑12‑04 17:29:01MEDIUM (7)A double-eviction in the Incognito mode cache that lead to a user-after-free in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2018‑60852018‑12‑04 17:29:01MEDIUM (7)Re-entry of a destructor in Networking Disk Cache in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2018‑60842019‑01‑09 19:29:04HIGH (7)Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via an executable file.00LOCAL
CVE‑2018‑60832018‑11‑14 15:29:02MEDIUM (7)Failure to disallow PWA installation from CSP sandboxed pages in AppManifest in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to access privileged APIs via a crafted HTML page.00NETWORK
CVE‑2018‑60822018‑11‑14 15:29:02MEDIUM (4)Including port 22 in the list of allowed FTP ports in Networking in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially enumerate internal host services via a crafted HTML page.00NETWORK
CVE‑2018‑60812018‑11‑14 15:29:02MEDIUM (4)XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page.00NETWORK
CVE‑2018‑60802018‑11‑14 15:29:02MEDIUM (4)Lack of access control checks in Instrumentation in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to obtain memory metadata from privileged processes .00NETWORK
CVE‑2018‑60792018‑11‑14 15:29:02MEDIUM (4)Inappropriate sharing of TEXTURE_2D_ARRAY/TEXTURE_3D data between tabs in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60782018‑11‑14 15:29:02MEDIUM (4)Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑60772018‑11‑14 15:29:02MEDIUM (4)Displacement map filters being applied to cross-origin images in Blink SVG rendering in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60762018‑11‑14 15:29:02MEDIUM (4)Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page.00NETWORK
CVE‑2018‑60752018‑11‑14 15:29:02MEDIUM (4)Incorrect handling of specified filenames in file downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page and user interaction.00NETWORK
CVE‑2018‑60742018‑11‑14 15:29:02MEDIUM (7)Failure to apply Mark-of-the-Web in Downloads in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to bypass OS level controls via a crafted HTML page.00NETWORK
CVE‑2018‑60732018‑11‑14 15:29:02MEDIUM (7)A heap buffer overflow in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2018‑60722018‑11‑14 15:29:02MEDIUM (7)An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2018‑60712018‑11‑14 15:29:02MEDIUM (7)An integer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑60702018‑11‑14 15:29:02MEDIUM (4)Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60692018‑11‑14 15:29:01MEDIUM (4)Stack buffer overflow in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑60682018‑11‑14 15:29:01MEDIUM (4)Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑60672018‑11‑14 15:29:01MEDIUM (7)Incorrect IPC serialization in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑60662018‑11‑14 15:29:01MEDIUM (4)Lack of CORS checking by ResourceFetcher/ResourceLoader in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60652018‑11‑14 15:29:01HIGH (9)Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2018‑60642018‑11‑14 15:29:01MEDIUM (7)Type Confusion in the implementation of __defineGetter__ in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑60632018‑11‑14 15:29:01MEDIUM (7)Incorrect use of mojo::WrapSharedMemoryHandle in Mojo in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2018‑60622018‑11‑14 15:29:01MEDIUM (7)Heap overflow write in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.00NETWORK
CVE‑2018‑60612018‑11‑14 15:29:01MEDIUM (5)A race in the handling of SharedArrayBuffers in WebAssembly in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑60602018‑11‑14 15:29:01MEDIUM (7)Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑60572018‑11‑14 15:29:01MEDIUM (7)Lack of special casing of Android ashmem in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to bypass inter-process read only guarantees via a crafted HTML page.00NETWORK
CVE‑2018‑60562019‑01‑09 19:29:04MEDIUM (7)Type confusion could lead to a heap out-of-bounds write in V8 in Google Chrome prior to 64.0.3282.168 allowing a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑60552018‑09‑25 14:29:04MEDIUM (7)Insufficient policy enforcement in Catalog Service in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑60542018‑09‑25 14:29:04MEDIUM (7)Use after free in WebUI in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60532018‑09‑25 14:29:04MEDIUM (4)Inappropriate implementation in New Tab Page in Google Chrome prior to 64.0.3282.119 allowed a local attacker to view website thumbnail images after clearing browser data via a crafted HTML page.00NETWORK
CVE‑2018‑60522018‑09‑25 14:29:04MEDIUM (4)Lack of support for a non standard no-referrer policy value in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to obtain referrer details from a web page that had thought it had opted out of sending referrer data.00NETWORK
CVE‑2018‑60512018‑09‑25 14:29:04MEDIUM (4)XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the same origin as the page it was on, which allowed a remote attacker to obtain referrer details via a crafted HTML page.00NETWORK
CVE‑2018‑60502018‑09‑25 14:29:03MEDIUM (4)Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑60492018‑09‑25 14:29:03MEDIUM (4)Incorrect security UI in permissions prompt in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the origin to which permission is granted via a crafted HTML page.00NETWORK
CVE‑2018‑60482018‑09‑25 14:29:03MEDIUM (4)Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak referrer information via a crafted HTML page.00NETWORK
CVE‑2018‑60472018‑09‑25 14:29:03MEDIUM (4)Insufficient policy enforcement in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user redirect URL via a crafted HTML page.00NETWORK
CVE‑2018‑60462018‑09‑25 14:29:03MEDIUM (4)Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60452018‑09‑25 14:29:02MEDIUM (4)Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60432018‑09‑25 14:29:02MEDIUM (7)Insufficient data validation in External Protocol Handler in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially execute arbitrary programs on user machine via a crafted HTML page.00NETWORK
CVE‑2018‑60422018‑09‑25 14:29:02MEDIUM (4)Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑60412018‑09‑25 14:29:02MEDIUM (4)Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑60402018‑09‑25 14:29:02MEDIUM (4)Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially bypass content security policy via a crafted HTML page.00NETWORK
CVE‑2018‑60392018‑09‑25 14:29:02MEDIUM (4)Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60382018‑09‑25 14:29:01MEDIUM (4)Heap buffer overflow in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑60372018‑09‑25 14:29:01MEDIUM (4)Inappropriate implementation in autofill in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to obtain autofill data with insufficient user gestures via a crafted HTML page.00NETWORK
CVE‑2018‑60362018‑09‑25 14:29:01MEDIUM (4)Insufficient data validation in V8 in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user data via a crafted HTML page.00NETWORK
CVE‑2018‑60352018‑09‑25 14:29:01MEDIUM (7)Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60342018‑09‑25 14:29:01MEDIUM (6)Insufficient data validation in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑60332018‑09‑25 14:29:01MEDIUM (7)Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted Chrome Extension.00NETWORK
CVE‑2018‑60322018‑09‑25 14:29:00MEDIUM (4)Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑60312018‑09‑25 14:29:00MEDIUM (7)Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2018‑200732019‑06‑27 17:15:12LOW (2)Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem.00LOCAL
CVE‑2018‑200712019‑01‑09 19:29:04MEDIUM (4)Insufficiently strict origin checks during JIT payment app installation in Payments in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to install a service worker for a domain that can host attacker controled files via a crafted HTML page.00NETWORK
CVE‑2018‑200702019‑01‑09 19:29:04MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑200692019‑01‑09 19:29:04MEDIUM (4)Failure to prevent navigation to top frame to data URLs in Navigation in Google Chrome on iOS prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page.00NETWORK
CVE‑2018‑200682019‑01‑09 19:29:03MEDIUM (4)Incorrect handling of 304 status codes in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page.00NETWORK
CVE‑2018‑200672019‑01‑09 19:29:03MEDIUM (4)A renderer initiated back navigation was incorrectly allowed to cancel a browser initiated one in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page.00NETWORK
CVE‑2018‑200662019‑01‑09 19:29:03MEDIUM (7)Incorrect object lifecycle in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑200652019‑01‑09 19:29:03MEDIUM (7)Handling of URI action in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to initiate potentially unsafe navigations without a user gesture via a crafted PDF file.00NETWORK
CVE‑2018‑183592018‑12‑11 16:29:02MEDIUM (7)Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑183582018‑12‑11 16:29:02LOW (3)Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed an attacker on the local network segment to proxy resources on localhost via a crafted WPAD file.00ADJACENT_NETWORK
CVE‑2018‑183572018‑12‑11 16:29:02MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑183562018‑12‑11 16:29:02MEDIUM (7)An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183552018‑12‑11 16:29:02MEDIUM (4)Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑183542018‑12‑11 16:29:02MEDIUM (7)Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.00NETWORK
CVE‑2018‑183532018‑12‑11 16:29:02MEDIUM (4)Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.00NETWORK
CVE‑2018‑183522018‑12‑11 16:29:02MEDIUM (4)Service works could inappropriately gain access to cross origin audio in Media in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass same origin policy for audio content via a crafted HTML page.00NETWORK
CVE‑2018‑183512018‑12‑11 16:29:02MEDIUM (4)Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page.00NETWORK
CVE‑2018‑183502018‑12‑11 16:29:02MEDIUM (4)Incorrect handling of CSP enforcement during navigations in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass content security policy via a crafted HTML page.00NETWORK
CVE‑2018‑183492018‑12‑11 16:29:02MEDIUM (4)Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.00NETWORK
CVE‑2018‑183482018‑12‑11 16:29:01MEDIUM (4)Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑183472018‑12‑11 16:29:01MEDIUM (7)Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page.00NETWORK
CVE‑2018‑183462018‑12‑11 16:29:01MEDIUM (4)Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.00NETWORK
CVE‑2018‑183452018‑12‑11 16:29:01MEDIUM (4)Incorrect handling of blob URLS in Site Isolation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker who had compromised the renderer process to bypass site isolation protections via a crafted HTML page.00NETWORK
CVE‑2018‑183442018‑12‑11 16:29:01MEDIUM (4)Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension.00NETWORK
CVE‑2018‑183432018‑12‑11 16:29:01MEDIUM (7)Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183422018‑12‑11 16:29:01MEDIUM (7)Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑183412018‑12‑11 16:29:01MEDIUM (7)An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183402018‑12‑11 16:29:01MEDIUM (7)Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183392018‑12‑11 16:29:01MEDIUM (7)Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183382018‑12‑11 16:29:01MEDIUM (7)Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183372018‑12‑11 16:29:01MEDIUM (7)Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑183362018‑12‑11 16:29:01MEDIUM (7)Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2018‑183352018‑12‑11 16:29:01MEDIUM (7)Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑174812018‑12‑11 16:29:01MEDIUM (7)Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2018‑174802018‑12‑11 16:29:01HIGH (9)Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2018‑174792019‑06‑27 17:15:12MEDIUM (7)Incorrect object lifetime calculations in GPU code in Google Chrome prior to 70.0.3538.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑174782019‑06‑27 17:15:12MEDIUM (7)Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.00NETWORK
CVE‑2018‑174772018‑11‑14 15:29:01MEDIUM (4)Incorrect dialog placement in Extensions in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of extension popups via a crafted HTML page.00NETWORK
CVE‑2018‑174762018‑11‑14 15:29:01MEDIUM (4)Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.00NETWORK
CVE‑2018‑174752018‑11‑14 15:29:01MEDIUM (4)Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑174742018‑11‑14 15:29:01MEDIUM (7)Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑174732018‑11‑14 15:29:01MEDIUM (4)Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑174722018‑11‑14 15:29:01MEDIUM (7)Incorrect handling of googlechrome:// URL scheme on iOS in Intents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to escape the <iframe> sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑174712018‑11‑14 15:29:01MEDIUM (4)Incorrect dialog placement in WebContents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.00NETWORK
CVE‑2018‑174702019‑01‑09 19:29:03MEDIUM (4)A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2018‑174692018‑11‑14 15:29:01MEDIUM (7)Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2018‑174682018‑11‑14 15:29:01MEDIUM (4)Incorrect handling of timer information during navigation in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obtain cross origin URLs via a crafted HTML page.00NETWORK
CVE‑2018‑174672018‑11‑14 15:29:00MEDIUM (4)Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑174662018‑11‑14 15:29:00MEDIUM (7)Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑174652018‑11‑14 15:29:00MEDIUM (7)Incorrect implementation of object trimming in V8 in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.00NETWORK
CVE‑2018‑174642018‑11‑14 15:29:00MEDIUM (4)Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑174632018‑11‑14 15:29:00HIGH (9)Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2018‑174622018‑11‑14 15:29:00MEDIUM (7)Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2018‑174612019‑01‑09 19:29:03MEDIUM (7)An out of bounds read in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2018‑174602019‑06‑27 17:15:12MEDIUM (4)Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.00NETWORK
CVE‑2018‑174592019‑01‑09 19:29:03MEDIUM (4)Incorrect handling of clicks in the omnibox in Navigation in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑174582019‑01‑09 19:29:03MEDIUM (7)An improper update of the WebAssembly dispatch table in WebAssembly in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑174572019‑01‑09 19:29:03MEDIUM (7)An object lifecycle issue in Blink could lead to a use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑160882019‑01‑09 19:29:03MEDIUM (4)A missing check for JS-simulated input events in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to download arbitrary files with no user input via a crafted HTML page.00NETWORK
CVE‑2018‑160872019‑01‑09 19:29:02MEDIUM (4)Lack of proper state tracking in Permissions in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.00NETWORK
CVE‑2018‑160862019‑06‑27 17:15:12MEDIUM (6)Insufficient policy enforcement in extensions API in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.00NETWORK
CVE‑2018‑160852019‑01‑09 19:29:02MEDIUM (7)A use after free in ResourceCoordinator in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑160842019‑01‑09 19:29:02MEDIUM (4)The default selected dialog button in CustomHandlers in Google Chrome prior to 69.0.3497.81 allowed a remote attacker who convinced the user to perform certain operations to open external programs via a crafted HTML page.00NETWORK
CVE‑2018‑160832019‑01‑09 19:29:02MEDIUM (7)An out of bounds read in forward error correction code in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2018‑160822019‑01‑09 19:29:02MEDIUM (4)An out of bounds read in Swiftshader in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.00NETWORK
CVE‑2018‑160812019‑01‑09 19:29:02MEDIUM (4)Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension.00NETWORK
CVE‑2018‑160802019‑01‑09 19:29:02MEDIUM (4)A missing check for popup window handling in Fullscreen in Google Chrome on macOS prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑160792019‑01‑09 19:29:02LOW (3)A race condition between permission prompts and navigations in Prompts in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2018‑160782019‑01‑09 19:29:02MEDIUM (4)Unsafe handling of credit card details in Autofill in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2018‑160772019‑06‑27 17:15:12MEDIUM (4)Object lifecycle issue in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass content security policy via a crafted HTML page.00NETWORK
CVE‑2018‑160762019‑01‑09 19:29:02MEDIUM (7)Missing bounds check in PDFium in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2018‑160752019‑06‑27 17:15:12LOW (3)Insufficient file type enforcement in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to obtain local file data via a crafted HTML page.00NETWORK
CVE‑2018‑160742019‑06‑27 17:15:12MEDIUM (4)Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page.00NETWORK
CVE‑2018‑160732019‑06‑27 17:15:12MEDIUM (4)Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page.00NETWORK
CVE‑2018‑160722019‑01‑09 19:29:02MEDIUM (4)A missing origin check related to HLS manifests in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass same origin policy via a crafted HTML page.00NETWORK
CVE‑2018‑160712019‑01‑09 19:29:02MEDIUM (7)A use after free in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.00NETWORK
CVE‑2018‑160702019‑06‑27 17:15:11MEDIUM (7)Integer overflows in Skia in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑160692019‑06‑27 17:15:11MEDIUM (4)Unintended floating-point error accumulation in SwiftShader in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2018‑160682019‑01‑09 19:29:02MEDIUM (7)Missing validation in Mojo in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2018‑160672019‑01‑09 19:29:02MEDIUM (4)A use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑160662019‑01‑09 19:29:02MEDIUM (4)A use after free in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2018‑160652019‑01‑09 19:29:02MEDIUM (7)A Javascript reentrancy issues that caused a use-after-free in V8 in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2018‑160642019‑06‑27 17:15:11MEDIUM (4)Insufficient data validation in Extensions API in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.00NETWORK
CVE‑2017‑51332018‑02‑07 23:29:02MEDIUM (7)Off-by-one read/write on the heap in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to corrupt memory and possibly leak information and potentially execute code via a crafted PDF file.00NETWORK
CVE‑2017‑51322018‑02‑07 23:29:02MEDIUM (7)Inappropriate implementation in V8 in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka incorrect WebAssembly stack manipulation.00NETWORK
CVE‑2017‑51312018‑02‑07 23:29:01MEDIUM (7)An integer overflow in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an out-of-bounds write.00NETWORK
CVE‑2017‑51302018‑02‑07 23:29:01MEDIUM (7)An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.00NETWORK
CVE‑2017‑51292018‑02‑07 23:29:01MEDIUM (7)A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑51282018‑02‑07 23:29:01MEDIUM (7)Heap buffer overflow in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, related to WebGL.00NETWORK
CVE‑2017‑51272018‑02‑07 23:29:01MEDIUM (7)Use after free in PDFium in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2017‑51262018‑02‑07 23:29:01MEDIUM (7)A use after free in PDFium in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2017‑51252018‑02‑07 23:29:01MEDIUM (7)Heap buffer overflow in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑51242018‑02‑07 23:29:01MEDIUM (4)Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page.00NETWORK
CVE‑2017‑51222017‑10‑27 05:29:03MEDIUM (7)Inappropriate use of table size handling in V8 in Google Chrome prior to 61.0.3163.100 for Windows allowed a remote attacker to trigger out-of-bounds access via a crafted HTML page.00NETWORK
CVE‑2017‑51212017‑10‑27 05:29:03HIGH (9)Inappropriate use of JIT optimisation in V8 in Google Chrome prior to 61.0.3163.100 for Linux, Windows, and Mac allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to the escape analysis phase.36NETWORK
CVE‑2017‑51202017‑10‑27 05:29:03MEDIUM (7)Inappropriate use of www mismatch redirects in browser navigation in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially downgrade HTTPS requests to HTTP via a crafted HTML page. In other words, Chrome could transmit cleartext even though the user had entered an https URL, because of a misdesigned workaround for cases where the domain name in a URL almost matches the domain name in an X.509 server certificate (but differs in the initial "www." substring).34NETWORK
CVE‑2017‑51192017‑10‑27 05:29:03MEDIUM (4)Use of an uninitialized value in Skia in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2017‑51182017‑10‑27 05:29:03MEDIUM (4)Blink in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, failed to correctly propagate CSP restrictions to javascript scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page.31NETWORK
CVE‑2017‑51172017‑10‑27 05:29:03MEDIUM (4)Use of an uninitialized value in Skia in Google Chrome prior to 61.0.3163.79 for Linux and Windows allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2017‑51162017‑10‑27 05:29:02HIGH (9)Type confusion in V8 in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2017‑51152017‑10‑27 05:29:02MEDIUM (7)Type confusion in V8 in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.00NETWORK
CVE‑2017‑51142017‑10‑27 05:29:02HIGH (9)Inappropriate use of partition alloc in PDFium in Google Chrome prior to 61.0.3163.79 for Linux, Windows, and Mac, and 61.0.3163.81 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted PDF file.36NETWORK
CVE‑2017‑51132017‑10‑27 05:29:02HIGH (9)Math overflow in Skia in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2017‑51122017‑10‑27 05:29:02MEDIUM (7)Heap buffer overflow in WebGL in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2017‑51112017‑10‑27 05:29:02HIGH (9)A use after free in PDFium in Google Chrome prior to 61.0.3163.79 for Linux, Windows, and Mac allowed a remote attacker to potentially exploit memory corruption via a crafted PDF file.36NETWORK
CVE‑2017‑51102017‑10‑27 05:29:02MEDIUM (7)Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page.34NETWORK
CVE‑2017‑51092017‑10‑27 05:29:02MEDIUM (4)Inappropriate implementation of unload handler handling in permission prompts in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.31NETWORK
CVE‑2017‑51082017‑10‑27 05:29:02HIGH (9)Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file.36NETWORK
CVE‑2017‑51072017‑10‑27 05:29:02MEDIUM (5)A timing attack in SVG rendering in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to extract pixel values from a cross-origin page being iframe'd via a crafted HTML page.24NETWORK
CVE‑2017‑51062017‑10‑27 05:29:02MEDIUM (7)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.34NETWORK
CVE‑2017‑51052017‑10‑27 05:29:02MEDIUM (7)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.34NETWORK
CVE‑2017‑51042017‑10‑27 05:29:02MEDIUM (7)Inappropriate implementation in interstitials in Google Chrome prior to 60.0.3112.78 for Mac allowed a remote attacker to spoof the contents of the omnibox via a crafted HTML page.34NETWORK
CVE‑2017‑51032017‑10‑27 05:29:02MEDIUM (4)Use of an uninitialized value in Skia in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.31NETWORK
CVE‑2017‑51022017‑10‑27 05:29:02MEDIUM (4)Use of an uninitialized value in Skia in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.31NETWORK
CVE‑2017‑51012017‑10‑27 05:29:02MEDIUM (7)Inappropriate implementation in Omnibox in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page.34NETWORK
CVE‑2017‑51002017‑10‑27 05:29:02HIGH (9)A use after free in Apps in Google Chrome prior to 60.0.3112.78 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50992017‑10‑27 05:29:02MEDIUM (7)Insufficient validation of untrusted input in PPAPI Plugins in Google Chrome prior to 60.0.3112.78 for Mac allowed a remote attacker to potentially gain privilege elevation via a crafted HTML page.00NETWORK
CVE‑2017‑50982017‑10‑27 05:29:02HIGH (9)A use after free in V8 in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50972017‑10‑27 05:29:02MEDIUM (7)Insufficient validation of untrusted input in Skia in Google Chrome prior to 60.0.3112.78 for Linux allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑50962017‑10‑27 05:29:02MEDIUM (4)Insufficient policy enforcement during navigation between different schemes in Google Chrome prior to 60.0.3112.78 for Android allowed a remote attacker to perform cross origin content download via a crafted HTML page, related to intents.00NETWORK
CVE‑2017‑50952017‑10‑27 05:29:02HIGH (9)Stack overflow in PDFium in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to potentially exploit stack corruption via a crafted PDF file.36NETWORK
CVE‑2017‑50942017‑10‑27 05:29:02MEDIUM (7)Type confusion in extensions JavaScript bindings in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted HTML page.34NETWORK
CVE‑2017‑50932017‑10‑27 05:29:02MEDIUM (7)Inappropriate implementation in modal dialog handling in Blink in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to prevent a full screen warning from being displayed via a crafted HTML page.34NETWORK
CVE‑2017‑50922017‑10‑27 05:29:02MEDIUM (7)Insufficient validation of untrusted input in PPAPI Plugins in Google Chrome prior to 60.0.3112.78 for Windows allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2017‑50912017‑10‑27 05:29:02HIGH (9)A use after free in IndexedDB in Google Chrome prior to 60.0.3112.78 for Linux, Android, Windows, and Mac allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50902017‑10‑27 05:29:02MEDIUM (4)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.115 for Mac allowed a remote attacker to perform domain spoofing via a crafted domain name containing a U+0620 character, aka Apple rdar problem 32458012.00NETWORK
CVE‑2017‑50892017‑10‑27 05:29:02MEDIUM (7)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.104 for Mac allowed a remote attacker to perform domain spoofing via a crafted domain name.34NETWORK
CVE‑2017‑50882017‑10‑27 05:29:01HIGH (9)Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.104 for Mac, Windows, and Linux, and 59.0.3071.117 for Android, allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.36NETWORK
CVE‑2017‑50872017‑10‑27 05:29:01HIGH (9)A use after free in Blink in Google Chrome prior to 59.0.3071.104 for Mac, Windows, and Linux, and 59.0.3071.117 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page, aka an IndexedDB sandbox escape.36NETWORK
CVE‑2017‑50862017‑10‑27 05:29:01MEDIUM (7)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.34NETWORK
CVE‑2017‑50852017‑10‑27 05:29:01MEDIUM (4)Inappropriate implementation in Bookmarks in Google Chrome prior to 59 for iOS allowed a remote attacker who convinced the user to perform certain operations to run JavaScript on chrome:// pages via a crafted bookmark.00NETWORK
CVE‑2017‑50832017‑10‑27 05:29:01MEDIUM (4)Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.31NETWORK
CVE‑2017‑50822017‑10‑27 05:29:01LOW (2)Failure to take advantage of available mitigations in credit card autofill in Google Chrome prior to 59.0.3071.92 for Android allowed a local attacker to take screen shots of credit card information via a crafted HTML page.00LOCAL
CVE‑2017‑50812017‑10‑27 05:29:01LOW (3)Lack of verification of an extension's locale folder in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed an attacker with local write access to modify extensions by modifying extension files.21LOCAL
CVE‑2017‑50802017‑10‑27 05:29:01MEDIUM (7)A use after free in credit card autofill in Google Chrome prior to 59.0.3071.86 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑50792017‑10‑27 05:29:01MEDIUM (4)Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.31NETWORK
CVE‑2017‑50782017‑10‑27 05:29:01HIGH (9)Insufficient validation of untrusted input in Blink's mailto: handling in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac allowed a remote attacker to perform command injection via a crafted HTML page, a similar issue to CVE-2004-0121. For example, characters such as * have an incorrect interaction with xdg-email in xdg-utils, and a space character can be used in front of a command-line argument.36NETWORK
CVE‑2017‑50772017‑10‑27 05:29:01HIGH (9)Insufficient validation of untrusted input in Skia in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50762017‑10‑27 05:29:01MEDIUM (7)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.34NETWORK
CVE‑2017‑50752017‑10‑27 05:29:01MEDIUM (4)Inappropriate implementation in CSP reporting in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to obtain the value of url fragments via a crafted HTML page.31NETWORK
CVE‑2017‑50742017‑10‑27 05:29:01MEDIUM (5)A use after free in Chrome Apps in Google Chrome prior to 59.0.3071.86 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page, related to Bluetooth.00ADJACENT_NETWORK
CVE‑2017‑50732017‑10‑27 05:29:01HIGH (9)Use after free in print preview in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50722017‑10‑27 05:29:01MEDIUM (4)Inappropriate implementation in Omnibox in Google Chrome prior to 59.0.3071.92 for Android allowed a remote attacker to perform domain spoofing with RTL characters via a crafted URL page.00NETWORK
CVE‑2017‑50712017‑10‑27 05:29:01MEDIUM (6)Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows and Mac, and 59.0.3071.92 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.33NETWORK
CVE‑2017‑50702017‑10‑27 05:29:01HIGH (9)Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.36NETWORK
CVE‑2017‑50692017‑10‑27 05:29:01MEDIUM (6)Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page.33NETWORK
CVE‑2017‑50682017‑10‑27 05:29:01HIGH (8)Incorrect handling of picture ID in WebRTC in Google Chrome prior to 58.0.3029.96 for Mac, Windows, and Linux allowed a remote attacker to trigger a race condition via a crafted HTML page.26NETWORK
CVE‑2017‑50672017‑10‑27 05:29:01MEDIUM (7)An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.34NETWORK
CVE‑2017‑50662017‑10‑27 05:29:01MEDIUM (7)Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.34NETWORK
CVE‑2017‑50652017‑10‑27 05:29:01MEDIUM (5)Lack of an appropriate action on page navigation in Blink in Google Chrome prior to 58.0.3029.81 for Windows and Mac allowed a remote attacker to potentially confuse a user into making an incorrect security decision via a crafted HTML page.31NETWORK
CVE‑2017‑50642017‑10‑27 05:29:01MEDIUM (7)Incorrect handling of DOM changes in Blink in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑50632017‑10‑27 05:29:01HIGH (9)A numeric overflow in Skia in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50622017‑10‑27 05:29:01HIGH (9)A use after free in Chrome Apps in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to potentially perform out of bounds memory access via a crafted Chrome extension.36NETWORK
CVE‑2017‑50612017‑10‑27 05:29:01MEDIUM (5)A race condition in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.24NETWORK
CVE‑2017‑50602017‑10‑27 05:29:01MEDIUM (7)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.34NETWORK
CVE‑2017‑50592017‑10‑27 05:29:00HIGH (9)Type confusion in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to potentially obtain code execution via a crafted HTML page.36NETWORK
CVE‑2017‑50582017‑10‑27 05:29:00MEDIUM (7)A use after free in PrintPreview in Google Chrome prior to 58.0.3029.81 for Windows allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.00NETWORK
CVE‑2017‑50572017‑10‑27 05:29:00HIGH (9)Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.36NETWORK
CVE‑2017‑50562017‑10‑27 05:29:00HIGH (9)A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.36NETWORK
CVE‑2017‑50552017‑10‑27 05:29:00HIGH (9)A use after free in printing in Google Chrome prior to 57.0.2987.133 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑50542017‑10‑27 05:29:00HIGH (9)An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to obtain heap memory contents via a crafted HTML page.36NETWORK
CVE‑2017‑50532017‑10‑27 05:29:00CRITICAL (10)An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf.36NETWORK
CVE‑2017‑50522017‑10‑27 05:29:00HIGH (9)An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.36NETWORK
CVE‑2017‑50512017‑04‑25 03:59:00MEDIUM (7)An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.00NETWORK
CVE‑2017‑50502017‑04‑25 03:59:00MEDIUM (7)An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.00NETWORK
CVE‑2017‑50492017‑04‑25 03:59:00MEDIUM (7)An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.00NETWORK
CVE‑2017‑50482017‑04‑25 03:59:00MEDIUM (7)An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.00NETWORK
CVE‑2017‑50472017‑04‑25 03:59:00MEDIUM (7)An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.00NETWORK
CVE‑2017‑50462017‑04‑24 23:59:01MEDIUM (4)V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android had insufficient policy enforcement, which allowed a remote attacker to spoof the location object via a crafted HTML page, related to Blink information disclosure.31NETWORK
CVE‑2017‑50452017‑04‑24 23:59:01MEDIUM (6)XSS Auditor in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed detection of a blocked iframe load, which allowed a remote attacker to brute force JavaScript variables via a crafted HTML page.33NETWORK
CVE‑2017‑50442017‑04‑24 23:59:01MEDIUM (6)Heap buffer overflow in filter processing in Skia in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.33NETWORK
CVE‑2017‑50432017‑04‑24 23:59:01HIGH (9)Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.36NETWORK
CVE‑2017‑50422017‑04‑24 23:59:01MEDIUM (6)Cast in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android sent cookies to sites discovered via SSDP, which allowed an attacker on the local network segment to initiate connections to arbitrary URLs and observe any plaintext cookies sent.24ADJACENT_NETWORK
CVE‑2017‑50412017‑04‑24 23:59:01MEDIUM (4)Google Chrome prior to 57.0.2987.100 incorrectly handled back-forward navigation, which allowed a remote attacker to display incorrect information for a site via a crafted HTML page.00NETWORK
CVE‑2017‑50402017‑04‑24 23:59:01MEDIUM (4)V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android was missing a neutering check, which allowed a remote attacker to read values in memory via a crafted HTML page.31NETWORK
CVE‑2017‑50392017‑04‑24 23:59:00HIGH (8)A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.26LOCAL
CVE‑2017‑50382017‑04‑24 23:59:00MEDIUM (6)Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.33NETWORK
CVE‑2017‑50372017‑04‑24 23:59:00HIGH (8)An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.26LOCAL
CVE‑2017‑50362017‑04‑24 23:59:00HIGH (8)A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to have an unspecified impact via a crafted PDF file.26LOCAL
CVE‑2017‑50352017‑04‑24 23:59:00HIGH (8)Google Chrome prior to 57.0.2987.98 for Windows and Mac had a race condition, which could cause Chrome to display incorrect certificate information for a site.26NETWORK
CVE‑2017‑50342017‑04‑24 23:59:00MEDIUM (7)A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2017‑50332017‑04‑24 23:59:00MEDIUM (4)Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android failed to correctly propagate CSP restrictions to local scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page, related to the unsafe-inline keyword.31NETWORK
CVE‑2017‑50322017‑04‑24 23:59:00MEDIUM (7)PDFium in Google Chrome prior to 57.0.2987.98 for Windows could be made to increment off the end of a buffer, which allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2017‑50312017‑04‑24 23:59:00MEDIUM (7)A use after free in ANGLE in Google Chrome prior to 57.0.2987.98 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑50302017‑04‑24 23:59:00HIGH (9)Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.36NETWORK
CVE‑2017‑50292017‑04‑24 23:59:00HIGH (9)The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.36NETWORK
CVE‑2017‑50282019‑06‑27 17:15:11MEDIUM (4)Insufficient data validation in V8 in Google Chrome prior to 56.0.2924.76 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2017‑50272017‑02‑17 07:59:01MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.00NETWORK
CVE‑2017‑50262017‑02‑17 07:59:01MEDIUM (4)Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to prevent alerts from being displayed by swapped out frames, which allowed a remote attacker to show alerts on a page they don't control via a crafted HTML page.00NETWORK
CVE‑2017‑50252017‑02‑17 07:59:01MEDIUM (4)FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.00NETWORK
CVE‑2017‑50242017‑02‑17 07:59:01MEDIUM (4)FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.00NETWORK
CVE‑2017‑50232017‑02‑17 07:59:01MEDIUM (4)Type confusion in Histogram in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit a near null dereference via a crafted HTML page.00NETWORK
CVE‑2017‑50222017‑02‑17 07:59:01MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.00NETWORK
CVE‑2017‑50212017‑02‑17 07:59:01MEDIUM (4)A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑50202017‑02‑17 07:59:01MEDIUM (4)Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to require a user gesture for powerful download operations, which allowed a remote attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted HTML page.00NETWORK
CVE‑2017‑50192017‑02‑17 07:59:01MEDIUM (7)A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑50182017‑02‑17 07:59:01MEDIUM (4)Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.00NETWORK
CVE‑2017‑50172017‑02‑17 07:59:01MEDIUM (4)Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.00NETWORK
CVE‑2017‑50162017‑02‑17 07:59:01MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page.00NETWORK
CVE‑2017‑50152017‑02‑17 07:59:00MEDIUM (4)Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled Unicode glyphs, which allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.00NETWORK
CVE‑2017‑50142017‑02‑17 07:59:00MEDIUM (7)Heap buffer overflow during image processing in Skia in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑50132017‑02‑17 07:59:00MEDIUM (4)Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2017‑50122017‑02‑17 07:59:00MEDIUM (7)A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑50112017‑02‑17 07:59:00MEDIUM (4)Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs, which allowed a remote attacker who convinced a user to install a malicious extension to read filesystem contents via a crafted HTML page.00NETWORK
CVE‑2017‑50102017‑02‑17 07:59:00MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2017‑50092017‑02‑17 07:59:00MEDIUM (7)WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑50082017‑02‑17 07:59:00MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2017‑50072017‑02‑17 07:59:00MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2017‑50062017‑02‑17 07:59:00MEDIUM (4)Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled object owner relationships, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2017‑154302018‑08‑28 19:29:15MEDIUM (4)Insufficient data validation in Chromecast plugin in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2017‑154292018‑08‑28 20:29:01MEDIUM (4)Inappropriate implementation in V8 WebAssembly JS bindings in Google Chrome prior to 63.0.3239.108 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2017‑154282019‑01‑09 19:29:02MEDIUM (7)Insufficient data validation in V8 builtins string generator could lead to out of bounds read and write access in V8 in Google Chrome prior to 62.0.3202.94 and allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2017‑154272018‑08‑28 19:29:15MEDIUM (4)Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.00NETWORK
CVE‑2017‑154262018‑08‑28 19:29:14MEDIUM (4)Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.00NETWORK
CVE‑2017‑154252018‑08‑28 19:29:14MEDIUM (4)Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.00NETWORK
CVE‑2017‑154242018‑08‑28 19:29:13MEDIUM (4)Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.00NETWORK
CVE‑2017‑154232018‑08‑28 19:29:12MEDIUM (5)Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.00NETWORK
CVE‑2017‑154222018‑08‑28 19:29:12MEDIUM (4)Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑154202018‑08‑28 19:29:11MEDIUM (4)Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2017‑154192018‑08‑28 19:29:10MEDIUM (4)Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.00NETWORK
CVE‑2017‑154182018‑08‑28 19:29:10MEDIUM (4)Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.00NETWORK
CVE‑2017‑154172018‑08‑28 19:29:09LOW (3)Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin data via a crafted HTML page.00NETWORK
CVE‑2017‑154162018‑08‑28 19:29:09MEDIUM (4)Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read.00NETWORK
CVE‑2017‑154152018‑08‑28 19:29:08MEDIUM (4)Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the value of a pointer via a crafted HTML page.00NETWORK
CVE‑2017‑154132018‑08‑28 19:29:07MEDIUM (7)Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑154122018‑08‑28 19:29:06MEDIUM (7)Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑154112018‑08‑28 19:29:05MEDIUM (7)Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2017‑154102018‑08‑28 19:29:04MEDIUM (7)Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2017‑154092018‑08‑28 19:29:03MEDIUM (7)Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑154082018‑08‑28 19:29:02MEDIUM (7)Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file that is mishandled by PDFium.00NETWORK
CVE‑2017‑154072018‑08‑28 19:29:01MEDIUM (7)Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server.00NETWORK
CVE‑2017‑154062018‑08‑28 20:29:01MEDIUM (7)A stack buffer overflow in V8 in Google Chrome prior to 62.0.3202.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑154052019‑01‑09 19:29:01MEDIUM (7)Inappropriate symlink handling and a race condition in the stateful recovery feature implementation could lead to a persistance established by a malicious code running with root privileges in cryptohomed in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.00LOCAL
CVE‑2017‑154042019‑01‑09 19:29:01HIGH (7)An ability to process crash dumps under root privileges and inappropriate symlinks handling could lead to a local privilege escalation in Crash Reporting in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to perform privilege escalation via a crafted HTML page.00LOCAL
CVE‑2017‑154032019‑01‑09 19:29:01MEDIUM (4)Insufficient data validation in crosh could lead to a command injection under chronos privileges in Networking in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.00LOCAL
CVE‑2017‑154022019‑01‑09 19:29:00MEDIUM (7)Using an ID that can be controlled by a compromised renderer which allows any frame to overwrite the page_state of any other frame in the same process in Navigation in Google Chrome on Chrome OS prior to 62.0.3202.74 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.00NETWORK
CVE‑2017‑154012019‑01‑09 19:29:00MEDIUM (7)A memory corruption bug in WebAssembly could lead to out of bounds read and write through V8 in WebAssembly in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2017‑153992018‑08‑28 20:29:01HIGH (9)A use after free in V8 in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑153982018‑08‑28 20:29:00HIGH (8)A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server.00NETWORK
CVE‑2017‑153962018‑08‑28 20:29:00MEDIUM (4)A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2017‑153952018‑02‑07 23:29:01MEDIUM (4)A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference.00NETWORK
CVE‑2017‑153942018‑02‑07 23:29:01MEDIUM (4)Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension.00NETWORK
CVE‑2017‑153932018‑02‑07 23:29:01MEDIUM (7)Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak.00NETWORK
CVE‑2017‑153922018‑02‑07 23:29:01MEDIUM (4)Insufficient data validation in V8 in Google Chrome prior to 62.0.3202.62 allowed an attacker who can write to the Windows Registry to potentially exploit heap corruption via a crafted Windows Registry entry, related to PlatformIntegration.00NETWORK
CVE‑2017‑153912018‑02‑07 23:29:01MEDIUM (4)Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to access Extension pages without authorisation via a crafted HTML page.00NETWORK
CVE‑2017‑153902018‑02‑07 23:29:00MEDIUM (4)Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.00NETWORK
CVE‑2017‑153892018‑02‑07 23:29:00MEDIUM (4)An insufficient watchdog timer in navigation in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2017‑153882018‑02‑07 23:29:00MEDIUM (7)Iteration through non-finite points in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2017‑153872018‑02‑07 23:29:00MEDIUM (7)Insufficient enforcement of Content Security Policy in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to open javascript: URL windows when they should not be allowed to via a crafted HTML page.00NETWORK
CVE‑2017‑153862018‑02‑07 23:29:00MEDIUM (4)Incorrect implementation in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2016‑96522019‑11‑20 15:15:12CRITICAL (10)Multiple unspecified vulnerabilities in Google Chrome before 55.0.2883.75.46NETWORK
CVE‑2016‑96512019‑01‑09 19:29:00MEDIUM (7)A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.00NETWORK
CVE‑2016‑96502017‑01‑19 05:59:01MEDIUM (4)Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled iframes, which allowed a remote attacker to bypass a no-referrer policy via a crafted HTML page.00NETWORK
CVE‑2016‑75492016‑09‑25 20:59:09MEDIUM (7)Google Chrome before 53.0.2785.113 does not ensure that the recipient of a certain IPC message is a valid RenderFrame or RenderWidget, which allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) or possibly have unspecified other impact by leveraging access to a renderer process, related to render_frame_host_impl.cc and render_widget_host_impl.cc, as demonstrated by a Password Manager message.00NETWORK
CVE‑2016‑73952016‑09‑11 10:59:25MEDIUM (7)SkPath.cpp in Skia, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, does not properly validate the return values of ChopMonoAtY calls, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via crafted graphics data.00NETWORK
CVE‑2016‑52262017‑01‑19 05:59:01MEDIUM (4)Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.00NETWORK
CVE‑2016‑52252017‑01‑19 05:59:01MEDIUM (4)Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.00NETWORK
CVE‑2016‑52242017‑01‑19 05:59:01MEDIUM (4)A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.00NETWORK
CVE‑2016‑52232017‑01‑19 05:59:01MEDIUM (4)Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.00NETWORK
CVE‑2016‑52222017‑01‑19 05:59:01MEDIUM (4)Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.00NETWORK
CVE‑2016‑52212017‑01‑19 05:59:01MEDIUM (7)Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.00NETWORK
CVE‑2016‑52202017‑01‑19 05:59:01MEDIUM (4)PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file.00NETWORK
CVE‑2016‑52192017‑01‑19 05:59:01MEDIUM (7)A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2016‑52182017‑01‑19 05:59:01MEDIUM (4)The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.00NETWORK
CVE‑2016‑52172017‑01‑19 05:59:01MEDIUM (4)The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.00NETWORK
CVE‑2016‑52162017‑01‑19 05:59:01MEDIUM (7)A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2016‑52152017‑01‑19 05:59:01MEDIUM (7)A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.00NETWORK
CVE‑2016‑52142017‑01‑19 05:59:01MEDIUM (4)Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote attacker to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.00NETWORK
CVE‑2016‑52132017‑01‑19 05:59:01MEDIUM (7)A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2016‑52122017‑01‑19 05:59:01MEDIUM (4)Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.00NETWORK
CVE‑2016‑52112017‑01‑19 05:59:01MEDIUM (7)A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2016‑52102017‑01‑19 05:59:01MEDIUM (7)Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2016‑52092017‑01‑19 05:59:01MEDIUM (7)Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2016‑52082017‑01‑19 05:59:01MEDIUM (4)Blink in Google Chrome prior to 55.0.2883.75 for Linux and Windows, and 55.0.2883.84 for Android allowed possible corruption of the DOM tree during synchronous event handling, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2016‑52072017‑01‑19 05:59:00MEDIUM (4)In Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android, corruption of the DOM tree could occur during the removal of a full screen element, which allowed a remote attacker to achieve arbitrary code execution via a crafted HTML page.00NETWORK
CVE‑2016‑52062017‑01‑19 05:59:00MEDIUM (7)The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.00NETWORK
CVE‑2016‑52052017‑01‑19 05:59:00MEDIUM (4)Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2016‑52042017‑01‑19 05:59:00MEDIUM (4)Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.00NETWORK
CVE‑2016‑52032017‑01‑19 05:59:00MEDIUM (7)A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.00NETWORK
CVE‑2016‑52022019‑10‑25 15:15:12CRITICAL (9)browser/extensions/api/dial/dial_registry.cc in Google Chrome before 54.0.2840.98 on macOS, before 54.0.2840.99 on Windows, and before 54.0.2840.100 on Linux neglects to copy a device ID before an erase() call, which causes the erase operation to access data that that erase operation will destroy.45NETWORK
CVE‑2016‑52012017‑01‑19 05:59:00MEDIUM (4)A leak of privateClass in the extensions API in Google Chrome prior to 54.0.2840.100 for Linux, and 54.0.2840.99 for Windows, and 54.0.2840.98 for Mac allowed a remote attacker to access privileged JavaScript code via a crafted HTML page.00NETWORK
CVE‑2016‑52002017‑01‑19 05:59:00MEDIUM (7)V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.00NETWORK
CVE‑2016‑51992017‑01‑19 05:59:00MEDIUM (7)An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file.00NETWORK
CVE‑2016‑51982017‑01‑19 05:59:00HIGH (9)V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.36NETWORK
CVE‑2016‑51972017‑01‑19 05:59:00MEDIUM (7)The content view client in Google Chrome prior to 54.0.2840.85 for Android insufficiently validated intent URLs, which allowed a remote attacker who had compromised the renderer process to start arbitrary activity on the system via a crafted HTML page.00NETWORK
CVE‑2016‑51962017‑01‑19 05:59:00MEDIUM (7)The content renderer client in Google Chrome prior to 54.0.2840.85 for Android insufficiently enforced the Same Origin Policy amongst downloaded files, which allowed a remote attacker to access any downloaded file and interact with sites, including those the user was logged into, via a crafted HTML page.00NETWORK
CVE‑2016‑51942019‑11‑20 15:15:11CRITICAL (10)Unspecified vulnerabilities in Google Chrome before 54.0.2840.59.46NETWORK
CVE‑2016‑51932016‑12‑18 03:59:01MEDIUM (4)Google Chrome prior to 54.0 for iOS had insufficient validation of URLs for windows open by DOM, which allowed a remote attacker to bypass restrictions on navigation to certain URL schemes via crafted HTML pages.00NETWORK
CVE‑2016‑51922016‑12‑18 03:59:01MEDIUM (4)Blink in Google Chrome prior to 54.0.2840.59 for Windows missed a CORS check on redirect in TextTrackLoader, which allowed a remote attacker to bypass cross-origin restrictions via crafted HTML pages.00NETWORK
CVE‑2016‑51912016‑12‑18 03:59:00MEDIUM (4)Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.00NETWORK
CVE‑2016‑51902016‑12‑18 03:59:00MEDIUM (7)Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles during shutdown, which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.00NETWORK
CVE‑2016‑51892016‑12‑18 03:59:00MEDIUM (4)Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted navigation to blob URLs with non-canonical origins, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.00NETWORK
CVE‑2016‑51882016‑12‑18 03:59:00MEDIUM (4)Multiple issues in Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux allow a remote attacker to spoof various parts of browser UI via crafted HTML pages.00NETWORK
CVE‑2016‑51872016‑12‑18 03:59:00MEDIUM (4)Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.00NETWORK
CVE‑2016‑51862016‑12‑18 03:59:00MEDIUM (7)Devtools in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled objects after a tab crash, which allowed a remote attacker to perform an out of bounds memory read via crafted PDF files.00NETWORK
CVE‑2016‑51852016‑12‑18 03:59:00MEDIUM (7)Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.00NETWORK
CVE‑2016‑51842016‑12‑18 03:59:00MEDIUM (7)PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles in CFFL_FormFillter::KillFocusForAnnot, which allowed a remote attacker to potentially exploit heap corruption via crafted PDF files.00NETWORK
CVE‑2016‑51832016‑12‑18 03:59:00MEDIUM (7)A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android allows a remote attacker to potentially exploit heap corruption via crafted PDF files.00NETWORK
CVE‑2016‑51822016‑12‑18 03:59:00MEDIUM (7)Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages.00NETWORK
CVE‑2016‑51812016‑12‑18 03:59:00MEDIUM (4)Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted execution of v8 microtasks while the DOM was in an inconsistent state, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages.00NETWORK
CVE‑2016‑51782017‑05‑23 04:29:01HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.143 allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑51772017‑05‑23 04:29:01MEDIUM (7)Use-after-free vulnerability in V8 in Google Chrome before 53.0.2785.143 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑51762016‑09‑29 10:59:03MEDIUM (4)Google Chrome before 53.0.2785.113 allows remote attackers to bypass the SafeBrowsing protection mechanism via unspecified vectors.00NETWORK
CVE‑2016‑51752016‑09‑25 20:59:08MEDIUM (7)Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.113 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑51742016‑09‑25 20:59:07MEDIUM (4)browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.00NETWORK
CVE‑2016‑51732016‑09‑25 20:59:06MEDIUM (7)The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.00NETWORK
CVE‑2016‑51722016‑09‑25 20:59:04MEDIUM (7)The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.34NETWORK
CVE‑2016‑51712016‑09‑25 20:59:03MEDIUM (7)WebKit/Source/bindings/templates/interface.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not prevent certain constructor calls, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑51702016‑09‑25 20:59:02MEDIUM (7)WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Indexed Database (aka IndexedDB) API calls.00NETWORK
CVE‑2016‑51682017‑04‑21 20:59:01MEDIUM (5)Skia, as used in Google Chrome before 50.0.2661.94, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information.00NETWORK
CVE‑2016‑51672016‑09‑11 10:59:24HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑51662016‑09‑11 10:59:23LOW (3)The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.00NETWORK
CVE‑2016‑51652016‑09‑11 10:59:22MEDIUM (4)Cross-site scripting (XSS) vulnerability in the Developer Tools (aka DevTools) subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allows remote attackers to inject arbitrary web script or HTML via the settings parameter in a chrome-devtools-frontend.appspot.com URL's query string.00NETWORK
CVE‑2016‑51642016‑09‑11 10:59:21MEDIUM (4)Cross-site scripting (XSS) vulnerability in WebKit/Source/platform/v8_inspector/V8Debugger.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML into the Developer Tools (aka DevTools) subsystem via a crafted web site, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2016‑51632016‑09‑11 10:59:20MEDIUM (4)The bidirectional-text implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not ensure left-to-right (LTR) rendering of URLs, which allows remote attackers to spoof the address bar via crafted right-to-left (RTL) Unicode text, related to omnibox/SuggestionView.java and omnibox/UrlBar.java in Chrome for Android.00NETWORK
CVE‑2016‑51622016‑09‑11 10:59:19MEDIUM (4)The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension's manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5160.00NETWORK
CVE‑2016‑51612016‑09‑11 10:59:18MEDIUM (7)The EditingStyle::mergeStyle function in WebKit/Source/core/editing/EditingStyle.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles custom properties, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that leverages "type confusion" in the StylePropertySerializer class.00NETWORK
CVE‑2016‑51602016‑09‑11 10:59:17MEDIUM (4)The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension's manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5162.00NETWORK
CVE‑2016‑51592016‑09‑11 10:59:15MEDIUM (7)Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.00NETWORK
CVE‑2016‑51582016‑09‑11 10:59:14MEDIUM (7)Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.00NETWORK
CVE‑2016‑51572016‑09‑11 10:59:13MEDIUM (7)Heap-based buffer overflow in the opj_dwt_interleave_v function in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data.00NETWORK
CVE‑2016‑51562016‑09‑11 10:59:12MEDIUM (7)extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑51552016‑09‑11 10:59:11MEDIUM (4)Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly validate access to the initial document, which allows remote attackers to spoof the address bar via a crafted web site.00NETWORK
CVE‑2016‑51542016‑09‑11 10:59:10MEDIUM (7)Multiple heap-based buffer overflows in PDFium, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JBig2 image.00NETWORK
CVE‑2016‑51532016‑09‑11 10:59:09MEDIUM (7)The Web Animations implementation in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, improperly relies on list iteration, which allows remote attackers to cause a denial of service (use-after-destruction) or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2016‑51522016‑09‑11 10:59:08MEDIUM (7)Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.00NETWORK
CVE‑2016‑51512016‑09‑11 10:59:07MEDIUM (7)PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux mishandles timers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted PDF document, related to fpdfsdk/javascript/JS_Object.cpp and fpdfsdk/javascript/app.cpp.00NETWORK
CVE‑2016‑51502016‑09‑11 10:59:05MEDIUM (7)WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, has an Indexed Database (aka IndexedDB) API implementation that does not properly restrict key-path evaluation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code that leverages certain side effects.00NETWORK
CVE‑2016‑51492016‑09‑11 10:59:04MEDIUM (7)The extensions subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux relies on an IFRAME source URL to identify an associated extension, which allows remote attackers to conduct extension-bindings injection attacks by leveraging script access to a resource that initially has the about:blank URL.00NETWORK
CVE‑2016‑51482016‑09‑11 10:59:03MEDIUM (4)Cross-site scripting (XSS) vulnerability in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML via vectors related to widget updates, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2016‑51472016‑09‑11 10:59:00MEDIUM (4)Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2016‑51462016‑08‑07 19:59:12HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑51452016‑08‑07 19:59:10MEDIUM (7)Blink, as used in Google Chrome before 52.0.2743.116, does not ensure that a taint property is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.00NETWORK
CVE‑2016‑51442016‑08‑07 19:59:09HIGH (8)The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5143.00NETWORK
CVE‑2016‑51432016‑08‑07 19:59:08HIGH (8)The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5144.00NETWORK
CVE‑2016‑51422016‑08‑07 19:59:07HIGH (8)The Web Cryptography API (aka WebCrypto) implementation in Blink, as used in Google Chrome before 52.0.2743.116, does not properly copy data buffers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code, related to NormalizeAlgorithm.cpp and SubtleCrypto.cpp.00NETWORK
CVE‑2016‑51412016‑08‑07 19:59:05MEDIUM (5)Blink, as used in Google Chrome before 52.0.2743.116, allows remote attackers to spoof the address bar via vectors involving a provisional URL for an initially empty document, related to FrameLoader.cpp and ScopedPageLoadDeferrer.cpp.00NETWORK
CVE‑2016‑51402016‑08‑07 19:59:03HIGH (8)Heap-based buffer overflow in the opj_j2k_read_SQcd_SQcc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JPEG 2000 data.00NETWORK
CVE‑2016‑51392016‑08‑07 19:59:02MEDIUM (7)Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.00NETWORK
CVE‑2016‑51382016‑08‑01 02:59:17MEDIUM (7)Integer overflow in the kbasep_vinstr_attach_client function in midgard/mali_kbase_vinstr.c in Google Chrome before 52.0.2743.85 allows remote attackers to cause a denial of service (heap-based buffer overflow and use-after-free) by leveraging an unrestricted multiplication.00NETWORK
CVE‑2016‑51372016‑07‑23 19:59:21MEDIUM (4)The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 52.0.2743.82, does not apply http :80 policies to https :443 URLs and does not apply ws :80 policies to wss :443 URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report. NOTE: this vulnerability is associated with a specification change after CVE-2016-1617 resolution.00NETWORK
CVE‑2016‑51362016‑07‑23 19:59:20MEDIUM (7)Use-after-free vulnerability in extensions/renderer/user_script_injector.cc in the Extensions subsystem in Google Chrome before 52.0.2743.82 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to script deletion.00NETWORK
CVE‑2016‑51352016‑07‑23 19:59:19MEDIUM (4)WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not consider referrer-policy information inside an HTML document during a preload request, which allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a crafted web site, as demonstrated by a "Content-Security-Policy: referrer origin-when-cross-origin" header that overrides a "<META name='referrer' content='no-referrer'>" element.00NETWORK
CVE‑2016‑51342016‑07‑23 19:59:17MEDIUM (4)net/proxy/proxy_service.cc in the Proxy Auto-Config (PAC) feature in Google Chrome before 52.0.2743.82 does not ensure that URL information is restricted to a scheme, host, and port, which allows remote attackers to discover credentials by operating a server with a PAC script, a related issue to CVE-2016-3763.00NETWORK
CVE‑2016‑51332016‑07‑23 19:59:16MEDIUM (4)Google Chrome before 52.0.2743.82 mishandles origin information during proxy authentication, which allows man-in-the-middle attackers to spoof a proxy-authentication login prompt or trigger incorrect credential storage by modifying the client-server data stream.00NETWORK
CVE‑2016‑51322016‑07‑23 19:59:15MEDIUM (7)The Service Workers subsystem in Google Chrome before 52.0.2743.82 does not properly implement the Secure Contexts specification during decisions about whether to control a subframe, which allows remote attackers to bypass the Same Origin Policy via an https IFRAME element inside an http IFRAME element.00NETWORK
CVE‑2016‑51312016‑07‑23 19:59:14MEDIUM (7)Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.00NETWORK
CVE‑2016‑51302016‑07‑23 19:59:12MEDIUM (4)content/renderer/history_controller.cc in Google Chrome before 52.0.2743.82 does not properly restrict multiple uses of a JavaScript forward method, which allows remote attackers to spoof the URL display via a crafted web site.00NETWORK
CVE‑2016‑51292016‑07‑23 19:59:11MEDIUM (7)Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑51282016‑07‑23 19:59:10MEDIUM (7)objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑51272016‑07‑23 19:59:09MEDIUM (7)Use-after-free vulnerability in WebKit/Source/core/editing/VisibleUnits.cpp in Blink, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code involving an @import at-rule in a Cascading Style Sheets (CSS) token sequence in conjunction with a rel=import attribute of a LINK element.00NETWORK
CVE‑2016‑36792016‑03‑29 10:59:05HIGH (9)Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑28452016‑03‑06 02:59:16MEDIUM (5)The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL's path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.00NETWORK
CVE‑2016‑28442016‑03‑06 02:59:15HIGH (9)WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑28432016‑03‑06 02:59:14HIGH (10)Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑20522016‑01‑25 11:59:11MEDIUM (7)Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than CVE-2015-8947.00NETWORK
CVE‑2016‑20512016‑01‑25 11:59:10MEDIUM (7)Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑17112016‑07‑23 19:59:08MEDIUM (7)WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not disable frame navigation during a detach operation on a DocumentLoader object, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑17102016‑07‑23 19:59:07MEDIUM (7)The ChromeClientImpl::createWindow method in WebKit/Source/web/ChromeClientImpl.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not prevent window creation by a deferred frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑17092016‑07‑23 19:59:06MEDIUM (7)Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.00NETWORK
CVE‑2016‑17082016‑07‑23 19:59:04MEDIUM (7)The Chrome Web Store inline-installation implementation in the Extensions subsystem in Google Chrome before 52.0.2743.82 does not properly consider object lifetimes during progress observation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2016‑17072016‑07‑23 19:59:03MEDIUM (4)ios/web/web_state/ui/crw_web_controller.mm in Google Chrome before 52.0.2743.82 on iOS does not ensure that an invalid URL is replaced with the about:blank URL, which allows remote attackers to spoof the URL display via a crafted web site.00NETWORK
CVE‑2016‑17062016‑07‑23 19:59:02HIGH (9)The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.00NETWORK
CVE‑2016‑17052016‑07‑23 19:59:00MEDIUM (7)Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑17042016‑07‑03 21:59:10MEDIUM (7)Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑17032016‑06‑05 23:59:33MEDIUM (7)Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑17022016‑06‑05 23:59:32MEDIUM (4)The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.00NETWORK
CVE‑2016‑17012016‑06‑05 23:59:31MEDIUM (7)The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.00NETWORK
CVE‑2016‑17002016‑06‑05 23:59:30MEDIUM (5)extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.00NETWORK
CVE‑2016‑16992016‑06‑05 23:59:29MEDIUM (4)WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.00NETWORK
CVE‑2016‑16982016‑06‑05 23:59:28MEDIUM (4)The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.00NETWORK
CVE‑2016‑16972016‑06‑05 23:59:27MEDIUM (7)The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.00NETWORK
CVE‑2016‑16962016‑06‑05 23:59:26MEDIUM (7)The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2016‑16952016‑06‑05 23:59:25MEDIUM (7)Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑16942016‑06‑05 23:59:24MEDIUM (4)browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.00NETWORK
CVE‑2016‑16932016‑06‑05 23:59:23LOW (3)browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.00NETWORK
CVE‑2016‑16922016‑06‑05 23:59:22MEDIUM (4)WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑16912016‑06‑05 23:59:21MEDIUM (5)Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.00NETWORK
CVE‑2016‑16902016‑06‑05 23:59:20MEDIUM (5)The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.00NETWORK
CVE‑2016‑16892016‑06‑05 23:59:19MEDIUM (4)Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2016‑16882016‑06‑05 23:59:18MEDIUM (4)The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.00NETWORK
CVE‑2016‑16872016‑06‑05 23:59:17MEDIUM (4)The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.00NETWORK
CVE‑2016‑16862016‑06‑05 23:59:15MEDIUM (4)The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.00NETWORK
CVE‑2016‑16852016‑06‑05 23:59:14MEDIUM (4)core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.00NETWORK
CVE‑2016‑16842016‑06‑05 23:59:13MEDIUM (5)numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2016‑16832016‑06‑05 23:59:12MEDIUM (5)numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2016‑16822016‑06‑05 23:59:11MEDIUM (4)The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.00NETWORK
CVE‑2016‑16812016‑06‑05 23:59:10MEDIUM (7)Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.00NETWORK
CVE‑2016‑16802016‑06‑05 23:59:09MEDIUM (7)Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑16792016‑06‑05 23:59:08MEDIUM (7)The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑16782016‑06‑05 23:59:07MEDIUM (7)objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑16772016‑06‑05 23:59:06MEDIUM (4)uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."00NETWORK
CVE‑2016‑16762016‑06‑05 23:59:05MEDIUM (7)extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2016‑16752016‑06‑05 23:59:04MEDIUM (7)Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.00NETWORK
CVE‑2016‑16742016‑06‑05 23:59:02MEDIUM (7)The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2016‑16732016‑06‑05 23:59:01MEDIUM (7)Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2016‑16722016‑06‑05 23:59:00MEDIUM (7)The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2016‑16712016‑05‑14 21:59:12MEDIUM (7)Google Chrome before 50.0.2661.102 on Android mishandles / (slash) and \ (backslash) characters, which allows attackers to conduct directory traversal attacks via a file: URL, related to net/base/escape.cc and net/base/filename_util.cc.00NETWORK
CVE‑2016‑16702016‑05‑14 21:59:10LOW (3)Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.00NETWORK
CVE‑2016‑16692016‑05‑14 21:59:09HIGH (9)The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.36NETWORK
CVE‑2016‑16682016‑05‑14 21:59:08MEDIUM (7)The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.102, uses an improper creation context, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑16672016‑05‑14 21:59:07MEDIUM (7)The TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp in the DOM implementation in Blink, as used in Google Chrome before 50.0.2661.102, does not prevent script execution during node-adoption operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑16662016‑05‑14 21:59:06HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑16652016‑05‑14 21:59:05MEDIUM (4)The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.00NETWORK
CVE‑2016‑16642016‑05‑14 21:59:04MEDIUM (4)The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.00NETWORK
CVE‑2016‑16632016‑05‑14 21:59:03MEDIUM (7)The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2016‑16622016‑05‑14 21:59:02HIGH (10)extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑16612016‑05‑14 21:59:01HIGH (8)Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.00NETWORK
CVE‑2016‑16602016‑05‑14 21:59:00MEDIUM (7)Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2016‑16592016‑04‑18 10:59:08HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑16582016‑04‑18 10:59:07MEDIUM (4)The Extensions subsystem in Google Chrome before 50.0.2661.75 incorrectly relies on GetOrigin method calls for origin comparisons, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted extension.00NETWORK
CVE‑2016‑16572016‑04‑18 10:59:06MEDIUM (4)The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL.00NETWORK
CVE‑2016‑16562016‑04‑18 10:59:05MEDIUM (5)The download implementation in Google Chrome before 50.0.2661.75 on Android allows remote attackers to bypass intended pathname restrictions via unspecified vectors.00NETWORK
CVE‑2016‑16552016‑04‑18 10:59:04MEDIUM (7)Google Chrome before 50.0.2661.75 does not properly consider that frame removal may occur during callback execution, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted extension.00NETWORK
CVE‑2016‑16542016‑04‑18 10:59:03MEDIUM (4)The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors.00NETWORK
CVE‑2016‑16532016‑04‑18 10:59:02HIGH (9)The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.00NETWORK
CVE‑2016‑16522016‑04‑18 10:59:01MEDIUM (4)Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2016‑16512016‑04‑18 10:59:00MEDIUM (6)fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 50.0.2661.75, does not properly implement the sycc420_to_rgb and sycc422_to_rgb functions, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted JPEG 2000 data in a PDF document.00NETWORK
CVE‑2016‑16502016‑03‑29 10:59:04HIGH (9)The PageCaptureSaveAsMHTMLFunction::ReturnFailure function in browser/extensions/api/page_capture/page_capture_api.cc in Google Chrome before 49.0.2623.108 allows attackers to cause a denial of service or possibly have unspecified other impact by triggering an error in creating an MHTML document.00NETWORK
CVE‑2016‑16492016‑03‑29 10:59:03HIGH (9)The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.00NETWORK
CVE‑2016‑16482016‑03‑29 10:59:02HIGH (9)Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑16472016‑03‑29 10:59:01HIGH (9)Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑16462016‑03‑29 10:59:00HIGH (9)The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.36NETWORK
CVE‑2016‑16452016‑03‑13 22:59:05HIGH (9)Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.36NETWORK
CVE‑2016‑16442016‑03‑13 22:59:04HIGH (9)WebKit/Source/core/layout/LayoutObject.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly restrict relayout scheduling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2016‑16432016‑03‑13 22:59:03HIGH (9)The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."00NETWORK
CVE‑2016‑16422016‑03‑06 02:59:13HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑16412016‑03‑06 02:59:12HIGH (9)Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.00NETWORK
CVE‑2016‑16402016‑03‑06 02:59:11MEDIUM (4)The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site.00NETWORK
CVE‑2016‑16392016‑03‑06 02:59:10HIGH (10)Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.00NETWORK
CVE‑2016‑16382016‑03‑06 02:59:09MEDIUM (7)extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.00NETWORK
CVE‑2016‑16372016‑03‑06 02:59:08MEDIUM (4)The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.00NETWORK
CVE‑2016‑16362016‑03‑06 02:59:07HIGH (8)The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.00NETWORK
CVE‑2016‑16352016‑03‑06 02:59:06HIGH (10)extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑16342016‑03‑06 02:59:05HIGH (9)Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.00NETWORK
CVE‑2016‑16332016‑03‑06 02:59:04HIGH (10)Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2016‑16322016‑03‑06 02:59:03MEDIUM (7)The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.00NETWORK
CVE‑2016‑16312016‑03‑06 02:59:02MEDIUM (7)The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑16302016‑03‑06 02:59:00MEDIUM (7)The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2016‑16292016‑02‑21 18:59:01HIGH (10)Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors.00NETWORK
CVE‑2016‑16282016‑02‑21 05:59:00MEDIUM (7)pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, does not validate a certain precision value, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted JPEG 2000 image in a PDF document, related to the opj_pi_next_rpcl, opj_pi_next_pcrl, and opj_pi_next_cprl functions.00NETWORK
CVE‑2016‑16272016‑02‑14 02:59:05MEDIUM (7)The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js.00NETWORK
CVE‑2016‑16262016‑02‑14 02:59:04MEDIUM (4)The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.00NETWORK
CVE‑2016‑16252016‑02‑14 02:59:03MEDIUM (4)The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc.00NETWORK
CVE‑2016‑16242016‑02‑14 02:59:02MEDIUM (7)Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression.00NETWORK
CVE‑2016‑16232016‑02‑14 02:59:01MEDIUM (7)The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp.00NETWORK
CVE‑2016‑16222016‑02‑14 02:59:00MEDIUM (7)The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.00NETWORK
CVE‑2016‑16202016‑01‑25 11:59:09HIGH (9)Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2016‑16192016‑01‑25 11:59:08MEDIUM (7)Multiple integer overflows in the (1) sycc422_to_rgb and (2) sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted PDF document.00NETWORK
CVE‑2016‑16182016‑01‑25 11:59:07MEDIUM (4)Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.00NETWORK
CVE‑2016‑16172016‑01‑25 11:59:06MEDIUM (4)The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.00NETWORK
CVE‑2016‑16162016‑01‑25 11:59:05MEDIUM (4)The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button.00NETWORK
CVE‑2016‑16152016‑01‑25 11:59:04MEDIUM (4)The Omnibox implementation in Google Chrome before 48.0.2564.82 allows remote attackers to spoof a document's origin via unspecified vectors.00NETWORK
CVE‑2016‑16142016‑01‑25 11:59:02MEDIUM (4)The UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp in Blink, as used in Google Chrome before 48.0.2564.82, mishandles the initialization mode, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.00NETWORK
CVE‑2016‑16132016‑01‑25 11:59:01MEDIUM (7)Multiple use-after-free vulnerabilities in the formfiller implementation in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to improper tracking of the destruction of (1) IPWL_FocusHandler and (2) IPWL_Provider objects.00NETWORK
CVE‑2016‑16122016‑01‑25 11:59:00MEDIUM (7)The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript code.00NETWORK
CVE‑2016‑104032019‑01‑09 19:29:00MEDIUM (7)Insufficient data validation on image data in PDFium in Google Chrome prior to 51.0.2704.63 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.00NETWORK
CVE‑2015‑86642015‑12‑24 03:59:01HIGH (8)Integer overflow in the WebCursor::Deserialize function in content/common/cursors/webcursor.cc in Google Chrome before 47.0.2526.106 allows remote attackers to cause a denial of service or possibly have unspecified other impact via an RGBA pixel array with crafted dimensions, a different vulnerability than CVE-2015-6792.00NETWORK
CVE‑2015‑85482015‑12‑14 11:59:05HIGH (10)Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.80, allow attackers to cause a denial of service or possibly have other impact via unknown vectors, a different issue than CVE-2015-8478.00NETWORK
CVE‑2015‑84802015‑12‑06 01:59:28HIGH (10)The VideoFramePool::PoolImpl::CreateFrame function in media/base/video_frame_pool.cc in Google Chrome before 47.0.2526.73 does not initialize memory for a video-frame data structure, which might allow remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact by leveraging improper interaction with the vp3_h_loop_filter_c function in libavcodec/vp3dsp.c in FFmpeg.00NETWORK
CVE‑2015‑84792015‑12‑06 01:59:26HIGH (8)Use-after-free vulnerability in the AudioOutputDevice::OnDeviceAuthorized function in media/audio/audio_output_device.cc in Google Chrome before 47.0.2526.73 allows attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering access to an unauthorized audio output device.00NETWORK
CVE‑2015‑84782015‑12‑06 01:59:25HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as used in Google Chrome before 47.0.2526.73, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑78342015‑10‑15 10:59:12HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑67922015‑12‑24 03:59:00HIGH (10)The MIDI subsystem in Google Chrome before 47.0.2526.106 does not properly handle the sending of data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to midi_manager.cc, midi_manager_alsa.cc, and midi_manager_mac.cc, a different vulnerability than CVE-2015-8664.00NETWORK
CVE‑2015‑67912015‑12‑14 11:59:04HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.80 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑67902015‑12‑14 11:59:03MEDIUM (4)The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.00NETWORK
CVE‑2015‑67892015‑12‑14 11:59:02HIGH (9)Race condition in the MutationObserver implementation in Blink, as used in Google Chrome before 47.0.2526.80, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact by leveraging unanticipated object deletion.00NETWORK
CVE‑2015‑67882015‑12‑14 11:59:00HIGH (10)The ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc in the extensions subsystem in Google Chrome before 47.0.2526.80 improperly implements handler functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."00NETWORK
CVE‑2015‑67872015‑12‑06 01:59:24HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑67862015‑12‑06 01:59:24MEDIUM (4)The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in opportunistic circumstances by leveraging a policy that relies on this pattern.00NETWORK
CVE‑2015‑67852015‑12‑06 01:59:22MEDIUM (4)The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.00NETWORK
CVE‑2015‑67842015‑12‑06 01:59:21MEDIUM (4)The page serializer in Google Chrome before 47.0.2526.73 mishandles Mark of the Web (MOTW) comments for URLs containing a "--" sequence, which might allow remote attackers to inject HTML via a crafted URL, as demonstrated by an initial http://example.com?-- substring.00NETWORK
CVE‑2015‑67832015‑12‑06 01:59:21MEDIUM (4)The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive.00NETWORK
CVE‑2015‑67822015‑12‑06 01:59:20MEDIUM (4)The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.00NETWORK
CVE‑2015‑67812015‑12‑06 01:59:19HIGH (8)Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.00NETWORK
CVE‑2015‑67802015‑12‑06 01:59:18MEDIUM (7)Use-after-free vulnerability in the Infobars implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site, related to browser/ui/views/website_settings/website_settings_popup_view.cc.00NETWORK
CVE‑2015‑67792015‑12‑06 01:59:17MEDIUM (4)PDFium, as used in Google Chrome before 47.0.2526.73, does not properly restrict use of chrome: URLs, which allows remote attackers to bypass intended scheme restrictions via a crafted PDF document, as demonstrated by a document with a link to a chrome://settings URL.00NETWORK
CVE‑2015‑67782015‑12‑06 01:59:16HIGH (8)The CJBig2_SymbolDict class in fxcodec/jbig2/JBig2_SymbolDict.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a PDF document containing crafted data with JBIG2 compression.00NETWORK
CVE‑2015‑67772015‑12‑06 01:59:15HIGH (8)Use-after-free vulnerability in the ContainerNode::notifyNodeInsertedInternal function in WebKit/Source/core/dom/ContainerNode.cpp in the DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOMCharacterDataModified events for certain detached-subtree insertions.00NETWORK
CVE‑2015‑67762015‑12‑06 01:59:14MEDIUM (7)The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.00NETWORK
CVE‑2015‑67752015‑12‑06 01:59:13HIGH (8)fpdfsdk/src/jsapi/fxjs_v8.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, does not use signatures, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."00NETWORK
CVE‑2015‑67742015‑12‑06 01:59:12HIGH (8)Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data.00NETWORK
CVE‑2015‑67732015‑12‑06 01:59:10HIGH (8)The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data.00NETWORK
CVE‑2015‑67722015‑12‑06 01:59:09HIGH (8)The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin.00NETWORK
CVE‑2015‑67712015‑12‑06 01:59:08HIGH (8)js/array.js in Google V8, as used in Google Chrome before 47.0.2526.73, improperly implements certain map and filter operations for arrays, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2015‑67702015‑12‑06 01:59:07HIGH (8)The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.00NETWORK
CVE‑2015‑67692015‑12‑06 01:59:06HIGH (8)The provisional-load commit implementation in WebKit/Source/bindings/core/v8/WindowProxy.cpp in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy by leveraging a delay in window proxy clearing.00NETWORK
CVE‑2015‑67682015‑12‑06 01:59:05HIGH (8)The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770.00NETWORK
CVE‑2015‑67672015‑12‑06 01:59:04HIGH (8)Use-after-free vulnerability in content/browser/appcache/appcache_dispatcher_host.cc in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect pointer maintenance associated with certain callbacks.00NETWORK
CVE‑2015‑67662015‑12‑06 01:59:03HIGH (8)Use-after-free vulnerability in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers with renderer access to cause a denial of service or possibly have unspecified other impact by leveraging incorrect AppCacheUpdateJob behavior associated with duplicate cache selection.00NETWORK
CVE‑2015‑67652015‑12‑06 01:59:02HIGH (10)Use-after-free vulnerability in content/browser/appcache/appcache_update_job.cc in Google Chrome before 47.0.2526.73 allows remote attackers to execute arbitrary code or cause a denial of service by leveraging the mishandling of AppCache update jobs.00NETWORK
CVE‑2015‑67642015‑12‑06 01:59:00CRITICAL (10)The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.46NETWORK
CVE‑2015‑67632015‑10‑15 10:59:10HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑67622015‑10‑15 10:59:09HIGH (8)The CSSFontFaceSrcValue::fetch function in core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation in Blink, as used in Google Chrome before 46.0.2490.71, does not use the CORS cross-origin request algorithm when a font's URL appears to be a same-origin URL, which allows remote web servers to bypass the Same Origin Policy via a redirect.00NETWORK
CVE‑2015‑67612015‑10‑15 10:59:07MEDIUM (7)The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.00NETWORK
CVE‑2015‑67602015‑10‑15 10:59:06HIGH (8)The Image11::map function in renderer/d3d/d3d11/Image11.cpp in libANGLE, as used in Google Chrome before 46.0.2490.71, mishandles mapping failures after device-lost events, which allows remote attackers to cause a denial of service (invalid read or write) or possibly have unspecified other impact via vectors involving a removed device.00NETWORK
CVE‑2015‑67592015‑10‑15 10:59:05MEDIUM (5)The shouldTreatAsUniqueOrigin function in platform/weborigin/SecurityOrigin.cpp in Blink, as used in Google Chrome before 46.0.2490.71, does not ensure that the origin of a LocalStorage resource is considered unique, which allows remote attackers to obtain sensitive information via vectors involving a blob: URL.00NETWORK
CVE‑2015‑67582015‑10‑15 10:59:04MEDIUM (7)The CPDF_Document::GetPage function in fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, does not properly perform a cast of a dictionary object, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.00NETWORK
CVE‑2015‑67572015‑10‑15 10:59:03HIGH (8)Use-after-free vulnerability in content/browser/service_worker/embedded_worker_instance.cc in the ServiceWorker implementation in Google Chrome before 46.0.2490.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging object destruction in a callback.00NETWORK
CVE‑2015‑67562015‑10‑15 10:59:02MEDIUM (7)Use-after-free vulnerability in the CPDFSDK_PageView implementation in fpdfsdk/src/fsdk_mgr.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging mishandling of a focused annotation in a PDF document.00NETWORK
CVE‑2015‑67552015‑10‑15 10:59:00HIGH (8)The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.00NETWORK
CVE‑2015‑65832015‑09‑03 22:59:17MEDIUM (4)Google Chrome before 45.0.2454.85 does not display a location bar for a hosted app's window after navigation away from the installation site, which might make it easier for remote attackers to spoof content via a crafted app, related to browser.cc and hosted_app_browser_controller.cc.00NETWORK
CVE‑2015‑65822015‑09‑03 22:59:16MEDIUM (7)The decompose function in platform/transforms/TransformationMatrix.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not verify that a matrix inversion succeeded, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2015‑65812015‑09‑03 22:59:15HIGH (8)Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 45.0.2454.85, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure.00NETWORK
CVE‑2015‑65802015‑09‑03 22:59:14HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑56052015‑07‑23 00:59:19MEDIUM (5)The regular-expression implementation in Google V8, as used in Google Chrome before 44.0.2403.89, mishandles interrupts, which allows remote attackers to cause a denial of service (application crash) via crafted JavaScript code, as demonstrated by an error in garbage collection during allocation of a stack-overflow exception message.00NETWORK
CVE‑2015‑44912015‑08‑16 01:59:19MEDIUM (7)Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.00NETWORK
CVE‑2015‑39102015‑05‑20 10:59:20HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 4.3.61.21, as used in Google Chrome before 43.0.2357.65, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑33362015‑04‑19 10:59:16MEDIUM (4)Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL.00NETWORK
CVE‑2015‑33352015‑04‑19 10:59:15HIGH (8)The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox.00NETWORK
CVE‑2015‑33342015‑04‑19 10:59:14MEDIUM (4)browser/ui/website_settings/website_settings.cc in Google Chrome before 42.0.2311.90 does not always display "Media: Allowed by you" in a Permissions table after the user has granted camera permission to a web site, which might make it easier for user-assisted remote attackers to obtain sensitive video data from a device's physical environment via a crafted web site that turns on the camera at a time when the user believes that camera access is prohibited.00NETWORK
CVE‑2015‑33332015‑04‑19 10:59:13HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑22392015‑03‑09 00:59:30MEDIUM (4)Google Chrome before 41.0.2272.76, when Instant Extended mode is used, does not properly consider the interaction between the "1993 search" features and restore-from-disk RELOAD transitions, which makes it easier for remote attackers to spoof the address bar for a search-results page by leveraging (1) a compromised search engine or (2) an XSS vulnerability in a search engine, a different vulnerability than CVE-2015-1231.00NETWORK
CVE‑2015‑22382015‑03‑09 00:59:29HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑13612015‑01‑27 20:04:16MEDIUM (7)platform/image-decoders/ImageFrame.h in Blink, as used in Google Chrome before 40.0.2214.91, does not initialize a variable that is used in calls to the Skia SkBitmap::setAlphaType function, which might allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted HTML document, a different vulnerability than CVE-2015-1205.00NETWORK
CVE‑2015‑13602015‑01‑27 20:04:15HIGH (8)Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data that is improperly handled during text drawing, related to gpu/GrBitmapTextContext.cpp and gpu/GrDistanceFieldTextContext.cpp, a different vulnerability than CVE-2015-1205.00NETWORK
CVE‑2015‑13592015‑01‑27 20:04:13MEDIUM (7)Multiple off-by-one errors in fpdfapi/fpdf_font/font_int.h in PDFium, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted PDF document, related to an "intra-object-overflow" issue, a different vulnerability than CVE-2015-1205.00NETWORK
CVE‑2015‑13462015‑01‑22 22:59:30HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑13042015‑10‑12 01:59:17HIGH (8)object-observe.js in Google V8, as used in Google Chrome before 45.0.2454.101, does not properly restrict method calls on access-checked objects, which allows remote attackers to bypass the Same Origin Policy via a (1) observe or (2) getNotifier call.00NETWORK
CVE‑2015‑13032015‑10‑12 01:59:15HIGH (8)bindings/core/v8/V8DOMWrapper.h in Blink, as used in Google Chrome before 45.0.2454.101, does not perform a rethrow action to propagate information about a cross-context exception, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document containing an IFRAME element.00NETWORK
CVE‑2015‑13022015‑11‑11 11:59:00HIGH (8)The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc.00NETWORK
CVE‑2015‑13012015‑09‑03 22:59:13HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 45.0.2454.85 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑13002015‑09‑03 22:59:11MEDIUM (5)The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call.00NETWORK
CVE‑2015‑12992015‑09‑03 22:59:10HIGH (8)Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.00NETWORK
CVE‑2015‑12982015‑09‑03 22:59:09MEDIUM (4)The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.00NETWORK
CVE‑2015‑12972015‑09‑03 22:59:08HIGH (8)The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.00NETWORK
CVE‑2015‑12962015‑09‑03 22:59:07MEDIUM (5)The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.00NETWORK
CVE‑2015‑12952015‑09‑03 22:59:06HIGH (8)Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.00NETWORK
CVE‑2015‑12942015‑09‑03 22:59:05HIGH (8)Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.00NETWORK
CVE‑2015‑12932015‑09‑03 22:59:03HIGH (8)The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2015‑12922015‑09‑03 22:59:02MEDIUM (5)The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.00NETWORK
CVE‑2015‑12912015‑09‑03 22:59:00MEDIUM (6)The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.00NETWORK
CVE‑2015‑12902018‑01‑09 16:29:00HIGH (9)The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.00NETWORK
CVE‑2015‑12892015‑07‑23 00:59:18HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑12882015‑07‑23 00:59:17MEDIUM (7)The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.00NETWORK
CVE‑2015‑12872015‑07‑23 00:59:16MEDIUM (4)Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.00NETWORK
CVE‑2015‑12862015‑07‑23 00:59:16MEDIUM (4)Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink "Universal XSS (UXSS)."00NETWORK
CVE‑2015‑12852015‑07‑23 00:59:15MEDIUM (5)The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.00NETWORK
CVE‑2015‑12842015‑07‑23 00:59:14HIGH (8)The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.00NETWORK
CVE‑2015‑12832015‑07‑23 00:59:13MEDIUM (7)Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.00NETWORK
CVE‑2015‑12822015‑07‑23 00:59:12MEDIUM (7)Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to the (1) Document::delay and (2) Document::DoFieldDelay functions.00NETWORK
CVE‑2015‑12812015‑07‑23 00:59:11MEDIUM (4)core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.00NETWORK
CVE‑2015‑12802015‑07‑23 00:59:10HIGH (8)SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.00NETWORK
CVE‑2015‑12792015‑07‑23 00:59:09HIGH (8)Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.00NETWORK
CVE‑2015‑12782015‑07‑23 00:59:08MEDIUM (4)content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document's modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted document, as demonstrated by the alert_dialog.pdf document.00NETWORK
CVE‑2015‑12772015‑07‑23 00:59:07HIGH (8)Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.00NETWORK
CVE‑2015‑12762015‑07‑23 00:59:06HIGH (8)Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.00NETWORK
CVE‑2015‑12752015‑07‑23 00:59:05MEDIUM (4)Cross-site scripting (XSS) vulnerability in org/chromium/chrome/browser/UrlUtilities.java in Google Chrome before 44.0.2403.89 on Android allows remote attackers to inject arbitrary web script or HTML via a crafted intent: URL, as demonstrated by a trailing alert(document.cookie);// substring, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2015‑12742015‑07‑23 00:59:04MEDIUM (7)Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous "Always open files of this type" choice, related to download_commands.cc and download_prefs.cc.00NETWORK
CVE‑2015‑12732015‑07‑23 00:59:03MEDIUM (7)Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.00NETWORK
CVE‑2015‑12722015‑07‑23 00:59:02HIGH (8)Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.00NETWORK
CVE‑2015‑12712015‑07‑23 00:59:01MEDIUM (7)PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation.00NETWORK
CVE‑2015‑12702015‑07‑23 00:59:00MEDIUM (7)The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.00NETWORK
CVE‑2015‑12692015‑06‑26 14:59:04MEDIUM (4)The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase.00NETWORK
CVE‑2015‑12682015‑06‑26 14:59:03MEDIUM (5)bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.00NETWORK
CVE‑2015‑12672015‑06‑26 14:59:02MEDIUM (5)Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp.00NETWORK
CVE‑2015‑12662015‑06‑26 14:59:00MEDIUM (5)content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests.00NETWORK
CVE‑2015‑12652015‑05‑20 10:59:17HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑12642015‑05‑20 10:59:16MEDIUM (4)Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.00NETWORK
CVE‑2015‑12632015‑05‑20 10:59:15MEDIUM (4)The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.00NETWORK
CVE‑2015‑12622015‑05‑20 10:59:14HIGH (8)platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.00NETWORK
CVE‑2015‑12612015‑05‑20 10:59:13MEDIUM (5)android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java in Google Chrome before 43.0.2357.65 on Android does not properly restrict use of a URL's fragment identifier during construction of a page-info popup, which allows remote attackers to spoof the URL bar or deliver misleading popup content via crafted text.00NETWORK
CVE‑2015‑12602015‑05‑20 10:59:13HIGH (8)Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.00NETWORK
CVE‑2015‑12592015‑05‑20 10:59:12HIGH (8)PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2015‑12582015‑05‑20 10:59:11HIGH (8)Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.00NETWORK
CVE‑2015‑12572015‑05‑20 10:59:10HIGH (8)platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2015‑12562015‑05‑20 10:59:09HIGH (8)Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.00NETWORK
CVE‑2015‑12552015‑05‑20 10:59:08MEDIUM (7)Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.00NETWORK
CVE‑2015‑12542015‑05‑20 10:59:07MEDIUM (5)core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.00NETWORK
CVE‑2015‑12532015‑05‑20 10:59:06HIGH (8)core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.00NETWORK
CVE‑2015‑12522015‑05‑20 10:59:04HIGH (8)common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.00NETWORK
CVE‑2015‑12512015‑05‑20 10:59:03MEDIUM (7)Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.00NETWORK
CVE‑2015‑12502015‑05‑01 10:59:06HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑12492015‑04‑19 10:59:12HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑12482015‑04‑19 10:59:11MEDIUM (4)The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.00NETWORK
CVE‑2015‑12472015‑04‑19 10:59:11MEDIUM (5)The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.00NETWORK
CVE‑2015‑12462015‑04‑19 10:59:10MEDIUM (5)Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2015‑12452015‑04‑19 10:59:09MEDIUM (7)Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium "Open PDF in Reader" button that has an invalid tab association.00NETWORK
CVE‑2015‑12442015‑04‑19 10:59:08MEDIUM (5)The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.00NETWORK
CVE‑2015‑12432015‑05‑01 10:59:05HIGH (8)Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.00NETWORK
CVE‑2015‑12422015‑04‑19 10:59:07HIGH (8)The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.00NETWORK
CVE‑2015‑12412015‑04‑19 10:59:06MEDIUM (4)Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a "tapjacking" attack.00NETWORK
CVE‑2015‑12402015‑04‑19 10:59:05MEDIUM (5)gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.00NETWORK
CVE‑2015‑12392017‑10‑18 17:29:00MEDIUM (7)Double free vulnerability in the j2k_read_ppm_v3 function in OpenJPEG before r2997, as used in PDFium in Google Chrome, allows remote attackers to cause a denial of service (process crash) via a crafted PDF.34NETWORK
CVE‑2015‑12382015‑04‑19 10:59:04HIGH (8)Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2015‑12372015‑04‑19 10:59:02HIGH (8)Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.00NETWORK
CVE‑2015‑12362015‑04‑19 10:59:01MEDIUM (4)The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.00NETWORK
CVE‑2015‑12352015‑04‑19 10:59:00MEDIUM (5)The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.00NETWORK
CVE‑2015‑12342015‑04‑01 21:59:01MEDIUM (7)Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.00NETWORK
CVE‑2015‑12332015‑04‑01 21:59:00HIGH (8)Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.00NETWORK
CVE‑2015‑12322015‑03‑09 00:59:27HIGH (8)Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out-of-bounds write operation, a different vulnerability than CVE-2015-1212.00NETWORK
CVE‑2015‑12312015‑03‑09 00:59:24HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑12302015‑03‑09 00:59:23HIGH (8)The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers "type confusion."00NETWORK
CVE‑2015‑12292015‑03‑09 00:59:22MEDIUM (5)net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.00NETWORK
CVE‑2015‑12282015‑03‑09 00:59:21HIGH (8)The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.00NETWORK
CVE‑2015‑12272015‑03‑09 00:59:20HIGH (8)The DragImage::create function in platform/DragImage.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not initialize memory for image drawing, which allows remote attackers to have an unspecified impact by triggering a failed image decoding, as demonstrated by an image for which the default orientation cannot be used.00NETWORK
CVE‑2015‑12262015‑03‑09 00:59:20MEDIUM (5)The DebuggerFunction::InitAgentHost function in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 41.0.2272.76 does not properly restrict what URLs are available as debugger targets, which allows remote attackers to bypass intended access restrictions via a crafted extension.00NETWORK
CVE‑2015‑12252015‑03‑09 00:59:19MEDIUM (5)PDFium, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2015‑12242015‑03‑09 00:59:18MEDIUM (5)The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.00NETWORK
CVE‑2015‑12232015‑03‑09 00:59:17HIGH (8)Multiple use-after-free vulnerabilities in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions.00NETWORK
CVE‑2015‑12222015‑03‑09 00:59:16HIGH (8)Multiple use-after-free vulnerabilities in the ServiceWorkerScriptCacheMap implementation in content/browser/service_worker/service_worker_script_cache_map.cc in Google Chrome before 41.0.2272.76 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a ServiceWorkerContextWrapper::DeleteAndStartOver call, related to the NotifyStartedCaching and NotifyFinishedCaching functions.00NETWORK
CVE‑2015‑12212015‑03‑09 00:59:15HIGH (8)Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink's main thread, related to the shutdown function in web/WebKit.cpp.00NETWORK
CVE‑2015‑12202015‑03‑09 00:59:13MEDIUM (7)Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.00NETWORK
CVE‑2015‑12192015‑03‑09 00:59:12HIGH (8)Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.00NETWORK
CVE‑2015‑12182015‑03‑09 00:59:11HIGH (8)Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.00NETWORK
CVE‑2015‑12172015‑03‑09 00:59:09HIGH (8)The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."00NETWORK
CVE‑2015‑12162015‑03‑09 00:59:08HIGH (8)Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.00NETWORK
CVE‑2015‑12152015‑03‑09 00:59:07HIGH (8)The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.00NETWORK
CVE‑2015‑12142015‑03‑09 00:59:06HIGH (8)Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.00NETWORK
CVE‑2015‑12132015‑03‑09 00:59:04HIGH (8)The SkBitmap::ReadRawPixels function in core/SkBitmap.cpp in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.00NETWORK
CVE‑2015‑12122015‑02‑06 11:59:10HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2015‑12112015‑02‑06 11:59:09HIGH (8)The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.00NETWORK
CVE‑2015‑12102015‑02‑06 11:59:08MEDIUM (5)The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2015‑12092015‑02‑06 11:59:07HIGH (8)Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.00NETWORK
CVE‑2015‑12072017‑06‑06 18:29:00MEDIUM (4)Double-free vulnerability in libavformat/mov.c in FFMPEG in Google Chrome 41.0.2251.0 allows remote attackers to cause a denial of service (memory corruption and crash) via a crafted .m4a file.00NETWORK
CVE‑2015‑12062017‑10‑06 15:29:00MEDIUM (4)Heap-based buffer overflow in Google Chrome before M40 allows remote attackers to cause a denial of service (unpaged memory write and process crash) via a crafted MP4 file.00NETWORK
CVE‑2015‑12052015‑01‑22 22:59:29HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑96892015‑03‑09 00:59:02MEDIUM (5)content/renderer/device_sensors/device_orientation_event_pump.cc in Google Chrome before 41.0.2272.76 does not properly restrict access to high-rate gyroscope data, which makes it easier for remote attackers to obtain speech signals from a device's physical environment via a crafted web site that listens for ondeviceorientation events, a different vulnerability than CVE-2015-1231.00NETWORK
CVE‑2014‑96542017‑04‑24 06:59:00HIGH (8)The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.00NETWORK
CVE‑2014‑96482015‑01‑27 20:01:44MEDIUM (4)components/navigation_interception/intercept_navigation_resource_throttle.cc in Google Chrome before 40.0.2214.91 on Android does not properly restrict use of intent: URLs to open an application after navigation to a web site, which allows remote attackers to cause a denial of service (loss of browser access to that site) via crafted JavaScript code, as demonstrated by pandora.com and the Pandora application, a different vulnerability than CVE-2015-1205.00NETWORK
CVE‑2014‑96472015‑01‑27 20:00:29MEDIUM (7)Use-after-free vulnerability in PDFium, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to fpdfsdk/src/fpdfview.cpp and fpdfsdk/src/fsdk_mgr.cpp, a different vulnerability than CVE-2015-1205.00NETWORK
CVE‑2014‑96462015‑01‑27 19:59:12MEDIUM (5)Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% directory, as demonstrated by program.exe, a different vulnerability than CVE-2015-1205.00LOCAL
CVE‑2014‑79672014‑10‑08 10:55:07HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 3.28.71.15, as used in Google Chrome before 38.0.2125.101, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑79482015‑01‑22 22:59:28MEDIUM (4)The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.00NETWORK
CVE‑2014‑79472015‑01‑22 22:59:27MEDIUM (5)OpenJPEG before r2944, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, pi.c, t1.c, t2.c, and tcd.c.00NETWORK
CVE‑2014‑79462015‑01‑22 22:59:26MEDIUM (5)The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation.00NETWORK
CVE‑2014‑79452015‑01‑22 22:59:25MEDIUM (5)OpenJPEG before r2908, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, and t2.c.00NETWORK
CVE‑2014‑79442015‑01‑22 22:59:24MEDIUM (5)The sycc422_to_rgb function in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 40.0.2214.91, does not properly handle odd values of image width, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.00NETWORK
CVE‑2014‑79432015‑01‑22 22:59:23MEDIUM (5)Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2014‑79422015‑01‑22 22:59:23HIGH (8)The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑79412015‑01‑22 22:59:22MEDIUM (5)The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.00NETWORK
CVE‑2014‑79402015‑01‑22 22:59:21HIGH (8)The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence.00NETWORK
CVE‑2014‑79392015‑01‑22 22:59:20MEDIUM (4)Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an "X-Content-Type-Options: nosniff" header.00NETWORK
CVE‑2014‑79382015‑01‑22 22:59:19HIGH (8)The Fonts implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑79372015‑01‑22 22:59:18HIGH (8)Multiple off-by-one errors in libavcodec/vorbisdec.c in FFmpeg before 2.4.2, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Vorbis I data.00NETWORK
CVE‑2014‑79362015‑01‑22 22:59:17MEDIUM (7)Use-after-free vulnerability in the ZoomBubbleView::Close function in browser/ui/views/location_bar/zoom_bubble_view.cc in the Views implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that triggers improper maintenance of a zoom bubble.00NETWORK
CVE‑2014‑79352015‑01‑22 22:59:17HIGH (8)Use-after-free vulnerability in browser/speech/tts_message_filter.cc in the Speech implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving utterances from a closed tab.00NETWORK
CVE‑2014‑79342015‑01‑22 22:59:16HIGH (8)Use-after-free vulnerability in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to unexpected absence of document data structures.00NETWORK
CVE‑2014‑79332015‑01‑22 22:59:15HIGH (8)Use-after-free vulnerability in the matroska_read_seek function in libavformat/matroskadec.c in FFmpeg before 2.5.1, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska file that triggers improper maintenance of tracks data.00NETWORK
CVE‑2014‑79322015‑01‑22 22:59:14HIGH (8)Use-after-free vulnerability in the Element::detach function in core/dom/Element.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving pending updates of detached elements.00NETWORK
CVE‑2014‑79312015‑01‑22 22:59:13HIGH (8)factory.cc in Google V8, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of backing-store pointers.00NETWORK
CVE‑2014‑79302015‑01‑22 22:59:12HIGH (8)Use-after-free vulnerability in core/events/TreeScopeEventContext.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of TreeScope data.00NETWORK
CVE‑2014‑79292015‑01‑22 22:59:11HIGH (8)Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents.00NETWORK
CVE‑2014‑79282015‑01‑22 22:59:10HIGH (8)hydrogen.cc in Google V8, as used Google Chrome before 40.0.2214.91, does not properly handle arrays with holes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers an array copy.00NETWORK
CVE‑2014‑79272015‑01‑22 22:59:09HIGH (8)The SimplifiedLowering::DoLoadBuffer function in compiler/simplified-lowering.cc in Google V8, as used in Google Chrome before 40.0.2214.91, does not properly choose an integer data type, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2014‑79262015‑01‑22 22:59:08HIGH (8)The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.00NETWORK
CVE‑2014‑79252015‑01‑22 22:59:07HIGH (8)Use-after-free vulnerability in the WebAudio implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an audio-rendering thread in which AudioNode data is improperly maintained.00NETWORK
CVE‑2014‑79242015‑01‑22 22:59:06MEDIUM (5)Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering duplicate BLOB references, related to content/browser/indexed_db/indexed_db_callbacks.cc and content/browser/indexed_db/indexed_db_dispatcher_host.cc.00NETWORK
CVE‑2014‑79232015‑01‑22 22:59:00HIGH (8)The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression.00NETWORK
CVE‑2014‑79102014‑11‑19 11:59:12HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 39.0.2171.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑79092014‑11‑19 11:59:11MEDIUM (5)effects/SkDashPathEffect.cpp in Skia, as used in Google Chrome before 39.0.2171.65, computes a hash key using uninitialized integer values, which might allow remote attackers to cause a denial of service by rendering crafted data.00NETWORK
CVE‑2014‑79082014‑11‑19 11:59:10HIGH (8)Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data.00NETWORK
CVE‑2014‑79072014‑11‑19 11:59:09HIGH (8)Multiple use-after-free vulnerabilities in modules/screen_orientation/ScreenOrientationController.cpp in Blink, as used in Google Chrome before 39.0.2171.65, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger improper handling of a detached frame, related to the (1) lock and (2) unlock methods.00NETWORK
CVE‑2014‑79062014‑11‑19 11:59:08HIGH (8)Use-after-free vulnerability in the Pepper plugins in Google Chrome before 39.0.2171.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Flash content that triggers an attempted PepperMediaDeviceManager access outside of the object's lifetime.00NETWORK
CVE‑2014‑79052014‑11‑19 11:59:07MEDIUM (5)Google Chrome before 39.0.2171.65 on Android does not prevent navigation to a URL in cases where an intent for the URL lacks CATEGORY_BROWSABLE, which allows remote attackers to bypass intended access restrictions via a crafted web site.00NETWORK
CVE‑2014‑79042014‑11‑19 11:59:06HIGH (8)Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑79032014‑11‑19 11:59:05HIGH (8)Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image.00NETWORK
CVE‑2014‑79022014‑11‑19 11:59:04HIGH (8)Use-after-free vulnerability in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.00NETWORK
CVE‑2014‑79012014‑11‑19 11:59:03HIGH (8)Integer overflow in the opj_t2_read_packet_data function in fxcodec/fx_libopenjpeg/libopenjpeg20/t2.c in OpenJPEG in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long segment in a JPEG image.00NETWORK
CVE‑2014‑79002014‑11‑19 11:59:01HIGH (8)Use-after-free vulnerability in the CPDF_Parser::IsLinearizedFile function in fpdfapi/fpdf_parser/fpdf_parser_parser.cpp in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.00NETWORK
CVE‑2014‑78992014‑11‑19 11:59:00MEDIUM (5)Google Chrome before 38.0.2125.101 allows remote attackers to spoof the address bar by placing a blob: substring at the beginning of the URL, followed by the original URI scheme and a long username string.00NETWORK
CVE‑2014‑38032014‑05‑21 11:14:10MEDIUM (4)The SpeechInput feature in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to enable microphone access and obtain speech-recognition text without indication via an INPUT element with a -x-webkit-speech attribute.00NETWORK
CVE‑2014‑32012014‑10‑10 01:55:09MEDIUM (5)core/rendering/compositing/RenderLayerCompositor.cpp in Blink, as used in Google Chrome before 38.0.2125.102 on Android, does not properly handle a certain IFRAME overflow condition, which allows remote attackers to spoof content via a crafted web site that interferes with the scrollbar.00NETWORK
CVE‑2014‑32002014‑10‑08 10:55:07HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 38.0.2125.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑31992014‑10‑08 10:55:07MEDIUM (5)The wrap function in bindings/core/v8/custom/V8EventCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 38.0.2125.101, has an erroneous fallback outcome for wrapper-selection failures, which allows remote attackers to cause a denial of service via vectors that trigger stopping a worker process that had been handling an Event object.00NETWORK
CVE‑2014‑31982014‑10‑08 10:55:07MEDIUM (5)The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google Chrome before 38.0.2125.101 interprets a certain -1 value as an index instead of a no-visible-page error code, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2014‑31972014‑10‑08 10:55:07MEDIUM (5)The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in Blink, as used in Google Chrome before 38.0.2125.101, does not properly provide substitute data for pages blocked by the XSS auditor, which allows remote attackers to obtain sensitive information via a crafted web site.00NETWORK
CVE‑2014‑31962014‑10‑08 10:55:07HIGH (8)base/memory/shared_memory_win.cc in Google Chrome before 38.0.2125.101 on Windows does not properly implement read-only restrictions on shared memory, which allows attackers to bypass a sandbox protection mechanism via unspecified vectors.00NETWORK
CVE‑2014‑31952014‑10‑08 10:55:07MEDIUM (5)Google V8, as used in Google Chrome before 38.0.2125.101, does not properly track JavaScript heap-memory allocations as allocations of uninitialized memory and does not properly concatenate arrays of double-precision floating-point numbers, which allows remote attackers to obtain sensitive information via crafted JavaScript code, related to the PagedSpace::AllocateRaw and NewSpace::AllocateRaw functions in heap/spaces-inl.h, the LargeObjectSpace::AllocateRaw function in heap/spaces.cc, and the Runtime_ArrayConcat function in runtime.cc.00NETWORK
CVE‑2014‑31942014‑10‑08 10:55:07HIGH (8)Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑31932014‑10‑08 10:55:07HIGH (8)The SessionService::GetLastSession function in browser/sessions/session_service.cc in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors that leverage "type confusion" for callback processing.00NETWORK
CVE‑2014‑31922014‑10‑08 10:55:06HIGH (8)Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑31912014‑10‑08 10:55:06HIGH (8)Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView::updateLayoutAndStyleForPainting function in core/frame/FrameView.cpp and the RenderLayerScrollableArea::setScrollOffset function in core/rendering/RenderLayerScrollableArea.cpp.00NETWORK
CVE‑2014‑31902014‑10‑08 10:55:06HIGH (8)Use-after-free vulnerability in the Event::currentTarget function in core/events/Event.cpp in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that accesses the path property of an Event object.00NETWORK
CVE‑2014‑31892014‑10‑08 10:55:06HIGH (8)The chrome_pdf::CopyImage function in pdf/draw_utils.cc in the PDFium component in Google Chrome before 38.0.2125.101 does not properly validate image-data dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑31882014‑10‑08 10:55:06HIGH (10)Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101 do not properly handle the interaction of IPC and Google V8, which allows remote attackers to execute arbitrary code via vectors involving JSON data, related to improper parsing of an escaped index by ParseJsonObject in json-parser.h.00NETWORK
CVE‑2014‑31872014‑10‑08 10:55:06MEDIUM (7)Google Chrome before 37.0.2062.60 and 38.x before 38.0.2125.59 on iOS does not properly restrict processing of (1) facetime:// and (2) facetime-audio:// URLs, which allows remote attackers to obtain video and audio data from a device via a crafted web site.00NETWORK
CVE‑2014‑31792014‑09‑10 10:55:08HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.120 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑31782014‑09‑10 10:55:08HIGH (8)Use-after-free vulnerability in core/dom/Node.cpp in Blink, as used in Google Chrome before 37.0.2062.120, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of render-tree inconsistencies.00NETWORK
CVE‑2014‑31772014‑08‑27 01:55:06HIGH (10)Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3176.00NETWORK
CVE‑2014‑31762014‑08‑27 01:55:06HIGH (10)Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.00NETWORK
CVE‑2014‑31752014‑08‑27 01:55:06HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors, related to the load_truetype_glyph function in truetype/ttgload.c in FreeType and other functions in other components.00NETWORK
CVE‑2014‑31742014‑08‑27 01:55:06MEDIUM (5)modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.00NETWORK
CVE‑2014‑31732014‑08‑27 01:55:06MEDIUM (5)The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_manager.cc and gpu/command_buffer/service/gles2_cmd_decoder.cc.00NETWORK
CVE‑2014‑31722014‑08‑27 01:55:06MEDIUM (6)The Debugger extension API in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 37.0.2062.94 does not validate a tab's URL before an attach operation, which allows remote attackers to bypass intended access limitations via an extension that uses a restricted URL, as demonstrated by a chrome:// URL.00NETWORK
CVE‑2014‑31712014‑08‑27 01:55:06HIGH (8)Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap set operations, related to bindings/core/v8/DOMWrapperMap.h and bindings/core/v8/SerializedScriptValue.cpp.00NETWORK
CVE‑2014‑31702014‑08‑27 01:55:06MEDIUM (6)extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '\0' character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.00NETWORK
CVE‑2014‑31692014‑08‑27 01:55:05HIGH (8)Use-after-free vulnerability in core/dom/ContainerNode.cpp in the DOM implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging script execution that occurs before notification of node removal.00NETWORK
CVE‑2014‑31682014‑08‑27 01:55:05HIGH (8)Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper caching associated with animation.00NETWORK
CVE‑2014‑31672014‑08‑13 04:57:13HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.143 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑31662014‑08‑13 04:57:13MEDIUM (4)The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.00NETWORK
CVE‑2014‑31652014‑08‑13 04:57:12HIGH (8)Use-after-free vulnerability in modules/websockets/WorkerThreadableWebSocketChannel.cpp in the Web Sockets implementation in Blink, as used in Google Chrome before 36.0.1985.143, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an unexpectedly long lifetime of a temporary object during method completion.00NETWORK
CVE‑2014‑31622014‑07‑20 11:12:50MEDIUM (5)Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.125 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑31612014‑07‑20 11:12:50HIGH (8)The WebMediaPlayerAndroid::load function in content/renderer/media/android/webmediaplayer_android.cc in Google Chrome before 36.0.1985.122 on Android does not properly interact with redirects, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that hosts a video stream.00NETWORK
CVE‑2014‑31602014‑07‑20 11:12:50MEDIUM (7)The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file.00NETWORK
CVE‑2014‑31592014‑07‑20 11:12:50MEDIUM (6)The WebContentsDelegateAndroid::OpenURLFromTab function in components/web_contents_delegate_android/web_contents_delegate_android.cc in Google Chrome before 36.0.1985.122 on Android does not properly restrict URL loading, which allows remote attackers to spoof the URL in the Omnibox via unspecified vectors.00NETWORK
CVE‑2014‑31572014‑06‑11 10:57:19HIGH (8)Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.00NETWORK
CVE‑2014‑31562014‑06‑11 10:57:19HIGH (8)Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard_impl.cc.00NETWORK
CVE‑2014‑31552014‑06‑11 10:57:19MEDIUM (5)net/spdy/spdy_write_queue.cc in the SPDY implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging incorrect queue maintenance.00NETWORK
CVE‑2014‑31542014‑06‑11 10:57:18HIGH (8)Use-after-free vulnerability in the ChildThread::Shutdown function in content/child/child_thread.cc in the filesystem API in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to a Blink shutdown.00NETWORK
CVE‑2014‑31522014‑05‑21 11:14:10HIGH (8)Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.00NETWORK
CVE‑2014‑17492014‑05‑21 11:14:10HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 35.0.1916.114 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑17482014‑05‑21 11:14:10MEDIUM (5)The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.00NETWORK
CVE‑2014‑17472014‑05‑21 11:14:10MEDIUM (4)Cross-site scripting (XSS) vulnerability in the DocumentLoader::maybeCreateArchive function in core/loader/DocumentLoader.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to inject arbitrary web script or HTML via crafted MHTML content, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2014‑17462014‑05‑21 11:14:10MEDIUM (5)The InMemoryUrlProtocol::Read function in media/filters/in_memory_url_protocol.cc in Google Chrome before 35.0.1916.114 relies on an insufficiently large integer data type, which allows remote attackers to cause a denial of service (out-of-bounds read) via vectors that trigger use of a large buffer.00NETWORK
CVE‑2014‑17452014‑05‑21 11:14:10HIGH (8)Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger removal of an SVGFontFaceElement object, related to core/svg/SVGFontFaceElement.cpp.00NETWORK
CVE‑2014‑17442014‑05‑21 11:14:10HIGH (8)Integer overflow in the AudioInputRendererHost::OnCreateStream function in content/browser/renderer_host/media/audio_input_renderer_host.cc in Google Chrome before 35.0.1916.114 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large shared-memory allocation.00NETWORK
CVE‑2014‑17432014‑05‑21 11:14:10HIGH (8)Use-after-free vulnerability in the StyleElement::removedFromDocument function in core/dom/StyleElement.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that triggers tree mutation.00NETWORK
CVE‑2014‑17422014‑05‑14 11:13:06HIGH (8)Use-after-free vulnerability in the FrameSelection::updateAppearance function in core/editing/FrameSelection.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper RenderObject handling.00NETWORK
CVE‑2014‑17412014‑05‑14 11:13:06HIGH (8)Multiple integer overflows in the replace-data functionality in the CharacterData interface implementation in core/dom/CharacterData.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to ranges.00NETWORK
CVE‑2014‑17402014‑05‑14 11:13:06HIGH (8)Multiple use-after-free vulnerabilities in net/websockets/websocket_job.cc in the WebSockets implementation in Google Chrome before 34.0.1847.137 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to WebSocketJob deletion.00NETWORK
CVE‑2014‑17362014‑05‑06 10:44:06HIGH (8)Integer overflow in api.cc in Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value.00NETWORK
CVE‑2014‑17352014‑04‑26 10:55:06HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 3.24.35.33, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑17342014‑04‑26 10:55:06HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑17332014‑04‑26 10:55:06HIGH (8)The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.00NETWORK
CVE‑2014‑17322014‑04‑26 10:55:06HIGH (8)Use-after-free vulnerability in browser/ui/views/speech_recognition_bubble_views.cc in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via an INPUT element that triggers the presence of a Speech Recognition Bubble window for an incorrect duration.00NETWORK
CVE‑2014‑17312014‑04‑26 10:55:05HIGH (8)core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.00NETWORK
CVE‑2014‑17302014‑04‑26 10:55:05HIGH (8)Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote attackers to bypass intended access restrictions by leveraging "type confusion" and reading property values, related to i18n.js and runtime.cc.00NETWORK
CVE‑2014‑17292014‑04‑09 10:57:57HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 3.24.35.22, as used in Google Chrome before 34.0.1847.116, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑17282014‑04‑09 10:57:57HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑17272014‑04‑09 10:57:57HIGH (8)Use-after-free vulnerability in content/renderer/renderer_webcolorchooser_impl.h in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to forms.00NETWORK
CVE‑2014‑17262014‑04‑09 10:57:57MEDIUM (4)The drag implementation in Google Chrome before 34.0.1847.116 allows user-assisted remote attackers to bypass the Same Origin Policy and forge local pathnames by leveraging renderer access.00NETWORK
CVE‑2014‑17252014‑04‑09 10:57:57MEDIUM (5)The base64DecodeInternal function in wtf/text/Base64.cpp in Blink, as used in Google Chrome before 34.0.1847.116, does not properly handle string data composed exclusively of whitespace characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via a window.atob method call.00NETWORK
CVE‑2014‑17242014‑04‑09 10:57:57HIGH (8)Use-after-free vulnerability in Free(b)soft Laboratory Speech Dispatcher 0.7.1, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service (application hang) or possibly have unspecified other impact via a text-to-speech request.00NETWORK
CVE‑2014‑17232014‑04‑09 10:57:51HIGH (8)The UnescapeURLWithOffsetsImpl function in net/base/escape.cc in Google Chrome before 34.0.1847.116 does not properly handle bidirectional Internationalized Resource Identifiers (IRIs), which makes it easier for remote attackers to spoof URLs via crafted use of right-to-left (RTL) Unicode text.00NETWORK
CVE‑2014‑17222014‑04‑09 10:57:51HIGH (8)Use-after-free vulnerability in the RenderBlock::addChildIgnoringAnonymousColumnBlocks function in core/rendering/RenderBlock.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving addition of a child node.00NETWORK
CVE‑2014‑17212014‑04‑09 10:57:51HIGH (8)Google V8, as used in Google Chrome before 34.0.1847.116, does not properly implement lazy deoptimization, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by improper handling of a heap allocation of a number outside the Small Integer (aka smi) range.00NETWORK
CVE‑2014‑17202014‑04‑09 10:57:51HIGH (8)Use-after-free vulnerability in the HTMLBodyElement::insertedInto function in core/html/HTMLBodyElement.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attributes.00NETWORK
CVE‑2014‑17192014‑04‑09 10:57:16HIGH (8)Use-after-free vulnerability in the WebSharedWorkerStub::OnTerminateWorkerContext function in content/worker/websharedworker_stub.cc in the Web Workers implementation in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger a SharedWorker termination during script loading.00NETWORK
CVE‑2014‑17182014‑04‑09 10:57:16HIGH (8)Integer overflow in the SoftwareFrameManager::SwapToNewFrame function in content/browser/renderer_host/software_frame_manager.cc in the software compositor in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted mapping of a large amount of renderer memory.00NETWORK
CVE‑2014‑17172014‑04‑09 10:57:16HIGH (8)Google V8, as used in Google Chrome before 34.0.1847.116, does not properly use numeric casts during handling of typed arrays, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2014‑17162014‑04‑09 10:56:51HIGH (8)Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2014‑17152014‑03‑16 14:06:46HIGH (8)Directory traversal vulnerability in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows has unspecified impact and attack vectors.00NETWORK
CVE‑2014‑17142014‑03‑16 14:06:46HIGH (8)The ScopedClipboardWriter::WritePickledData function in ui/base/clipboard/scoped_clipboard_writer.cc in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows does not verify a certain format value, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the clipboard.00NETWORK
CVE‑2014‑17132014‑03‑16 14:06:46HIGH (8)Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the document.location value.00NETWORK
CVE‑2014‑17052014‑03‑16 14:06:45HIGH (8)Google V8, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2014‑17042014‑03‑16 14:06:45HIGH (10)Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2014‑17032014‑03‑16 14:06:45HIGH (8)Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.00NETWORK
CVE‑2014‑17022014‑03‑16 14:06:45HIGH (8)Use-after-free vulnerability in the DatabaseThread::cleanupDatabaseThread function in modules/webdatabase/DatabaseThread.cpp in the web database implementation in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of scheduled tasks during shutdown of a thread.00NETWORK
CVE‑2014‑17012014‑03‑16 14:06:45MEDIUM (4)The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events.00NETWORK
CVE‑2014‑17002014‑03‑16 14:06:45HIGH (8)Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.00NETWORK
CVE‑2014‑16812014‑01‑28 14:30:40HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.102 have unknown impact and attack vectors, related to 12 "security fixes [that were not] either contributed by external researchers or particularly interesting."00NETWORK
CVE‑2014‑15682014‑09‑25 17:55:04HIGH (8)Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.00NETWORK
CVE‑2013‑68022013‑11‑18 05:23:58MEDIUM (6)Google Chrome before 31.0.1650.57 allows remote attackers to bypass intended sandbox restrictions by leveraging access to a renderer process, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013, a different vulnerability than CVE-2013-6632.00NETWORK
CVE‑2013‑66682014‑03‑05 05:11:22HIGH (8)Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑66672014‑03‑05 05:11:22HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.146 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑66662014‑03‑05 05:11:22MEDIUM (6)The PepperFlashRendererHost::OnNavigate function in renderer/pepper/pepper_flash_renderer_host.cc in Google Chrome before 33.0.1750.146 does not verify that all headers are Cross-Origin Resource Sharing (CORS) simple headers before proceeding with a PPB_Flash.Navigate operation, which might allow remote attackers to bypass intended CORS restrictions via an inappropriate header.00NETWORK
CVE‑2013‑66652014‑03‑05 05:11:22HIGH (8)Heap-based buffer overflow in the ResourceProvider::InitializeSoftware function in cc/resources/resource_provider.cc in Google Chrome before 33.0.1750.146 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large texture size that triggers improper memory allocation in the software renderer.00NETWORK
CVE‑2013‑66642014‑03‑05 05:11:22HIGH (8)Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving FORM elements, as demonstrated by use of the speech-recognition feature.00NETWORK
CVE‑2013‑66632014‑03‑05 05:11:22HIGH (8)Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view.00NETWORK
CVE‑2013‑66622017‑04‑13 17:59:00MEDIUM (4)Google Chrome caches TLS sessions before certificate validation occurs.00NETWORK
CVE‑2013‑66612014‑02‑24 04:48:10HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.117 allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact, via unknown vectors.00NETWORK
CVE‑2013‑66602014‑02‑24 04:48:10MEDIUM (5)The drag-and-drop implementation in Google Chrome before 33.0.1750.117 does not properly restrict the information in WebDropData data structures, which allows remote attackers to discover full pathnames via a crafted web site.00NETWORK
CVE‑2013‑66592014‑02‑24 04:48:10MEDIUM (6)The SSLClientSocketNSS::Core::OwnAuthCertHandler function in net/socket/ssl_client_socket_nss.cc in Google Chrome before 33.0.1750.117 does not prevent changes to server X.509 certificates during renegotiations, which allows remote SSL servers to trigger use of a new certificate chain, inconsistent with the user's expectations, by initiating a TLS renegotiation.00NETWORK
CVE‑2013‑66582014‑02‑24 04:48:10HIGH (8)Multiple use-after-free vulnerabilities in the layout implementation in Blink, as used in Google Chrome before 33.0.1750.117, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving (1) running JavaScript code during execution of the updateWidgetPositions function or (2) making a call into a plugin during execution of the updateWidgetPositions function.00NETWORK
CVE‑2013‑66572014‑02‑24 04:48:10MEDIUM (6)core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, inserts the about:blank URL during certain blocking of FORM elements within HTTP requests, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.00NETWORK
CVE‑2013‑66562014‑02‑24 04:48:10MEDIUM (5)The XSSAuditor::init function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, processes POST requests by using the body of a redirecting page instead of the body of a redirect target, which allows remote attackers to obtain sensitive information via unspecified vectors.00NETWORK
CVE‑2013‑66552014‑02‑24 04:48:10HIGH (8)Use-after-free vulnerability in Blink, as used in Google Chrome before 33.0.1750.117, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper handling of overflowchanged DOM events during interaction between JavaScript and layout.00NETWORK
CVE‑2013‑66542014‑02‑24 04:48:10HIGH (8)The SVGAnimateElement::calculateAnimatedValue function in core/svg/SVGAnimateElement.cpp in Blink, as used in Google Chrome before 33.0.1750.117, does not properly handle unexpected data types, which allows remote attackers to cause a denial of service (incorrect cast) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑66532014‑02‑24 04:48:10HIGH (8)Use-after-free vulnerability in the web contents implementation in Google Chrome before 33.0.1750.117 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attempted conflicting access to the color chooser.00NETWORK
CVE‑2013‑66522014‑02‑24 04:48:10HIGH (8)Directory traversal vulnerability in sandbox/win/src/named_pipe_dispatcher.cc in Google Chrome before 33.0.1750.117 on Windows allows attackers to bypass intended named-pipe policy restrictions in the sandbox via vectors related to (1) lack of checks for .. (dot dot) sequences or (2) lack of use of the \\?\ protection mechanism.00NETWORK
CVE‑2013‑66502014‑01‑28 14:30:39HIGH (8)The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of "popular pages."00NETWORK
CVE‑2013‑66492014‑01‑28 14:30:34HIGH (8)Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image.00NETWORK
CVE‑2013‑66472017‑04‑11 19:59:00HIGH (8)A use-after-free in AnimationController::endAnimationUpdate in Google Chrome.00NETWORK
CVE‑2013‑66462014‑01‑16 12:17:26HIGH (8)Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process.00NETWORK
CVE‑2013‑66452014‑01‑16 12:17:26MEDIUM (7)Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element.00NETWORK
CVE‑2013‑66442014‑01‑16 12:17:26HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑66432014‑01‑16 12:17:26HIGH (8)The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog.00NETWORK
CVE‑2013‑66422014‑01‑16 12:17:26MEDIUM (5)Google Chrome through 32.0.1700.23 on Android allows remote attackers to spoof the address bar via unspecified vectors.00NETWORK
CVE‑2013‑66412014‑01‑16 12:17:26HIGH (8)Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of the past names map of a FORM element.00NETWORK
CVE‑2013‑66402013‑12‑07 00:55:04HIGH (8)The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.00NETWORK
CVE‑2013‑66392013‑12‑07 00:55:04HIGH (8)The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.00NETWORK
CVE‑2013‑66382013‑12‑07 00:55:04HIGH (8)Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.00NETWORK
CVE‑2013‑66372013‑12‑07 00:55:04HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑66362013‑12‑07 00:55:04MEDIUM (4)The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method.00NETWORK
CVE‑2013‑66352013‑12‑07 00:55:04MEDIUM (7)Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.00NETWORK
CVE‑2013‑66342013‑12‑07 00:55:04MEDIUM (7)The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.00NETWORK
CVE‑2013‑66322013‑11‑18 05:23:58HIGH (9)Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.00NETWORK
CVE‑2013‑66312013‑11‑19 04:50:56HIGH (8)Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.00NETWORK
CVE‑2013‑66302013‑11‑19 04:50:56MEDIUM (5)The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.00NETWORK
CVE‑2013‑66292013‑11‑19 04:50:56MEDIUM (5)The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.00NETWORK
CVE‑2013‑66282013‑11‑13 15:55:04MEDIUM (4)net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.00NETWORK
CVE‑2013‑66272013‑11‑13 15:55:04MEDIUM (5)net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.00NETWORK
CVE‑2013‑66262013‑11‑13 15:55:04MEDIUM (4)The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.00NETWORK
CVE‑2013‑66252013‑11‑13 15:55:04MEDIUM (7)Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.00NETWORK
CVE‑2013‑66242013‑11‑13 15:55:04HIGH (8)Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.00NETWORK
CVE‑2013‑66232013‑11‑13 15:55:04MEDIUM (4)The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.00NETWORK
CVE‑2013‑66222013‑11‑13 15:55:04MEDIUM (7)Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.00NETWORK
CVE‑2013‑66212013‑11‑13 15:55:04HIGH (8)Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.00NETWORK
CVE‑2013‑61662014‑02‑15 14:57:08MEDIUM (7)Google Chrome before 29 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.00NETWORK
CVE‑2013‑29312013‑11‑13 15:55:03HIGH (10)Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑29282013‑10‑16 20:55:07HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑29272013‑10‑16 20:55:07MEDIUM (7)Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.00NETWORK
CVE‑2013‑29262013‑10‑16 20:55:06MEDIUM (7)Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.00NETWORK
CVE‑2013‑29252013‑10‑16 20:55:05MEDIUM (7)Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.00NETWORK
CVE‑2013‑29242013‑10‑02 10:35:36HIGH (8)Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑29232013‑10‑02 10:35:35HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑29222013‑10‑02 10:35:35MEDIUM (7)Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.00NETWORK
CVE‑2013‑29212013‑10‑02 10:35:35MEDIUM (7)Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.00NETWORK
CVE‑2013‑29202013‑10‑02 10:35:35MEDIUM (5)The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.00NETWORK
CVE‑2013‑29192013‑10‑02 10:35:35HIGH (8)Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑29182013‑10‑02 10:35:35HIGH (8)Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.00NETWORK
CVE‑2013‑29172013‑10‑02 10:35:35MEDIUM (5)The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.00NETWORK
CVE‑2013‑29162013‑10‑02 10:35:35MEDIUM (4)Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.00NETWORK
CVE‑2013‑29152013‑10‑02 10:35:35MEDIUM (4)Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.00NETWORK
CVE‑2013‑29142013‑10‑02 10:35:35MEDIUM (7)Use-after-free vulnerability in the color-chooser dialog in Google Chrome before 30.0.1599.66 on Windows allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to color_chooser_dialog.cc and color_chooser_win.cc in browser/ui/views/.00NETWORK
CVE‑2013‑29132013‑10‑02 10:35:35MEDIUM (7)Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.00NETWORK
CVE‑2013‑29122013‑10‑02 10:35:35HIGH (8)Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.00NETWORK
CVE‑2013‑29112013‑10‑02 10:35:35MEDIUM (7)Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.00NETWORK
CVE‑2013‑29102013‑10‑02 10:35:35HIGH (8)Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑29092013‑10‑02 10:35:35HIGH (8)Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.00NETWORK
CVE‑2013‑29082013‑10‑02 10:35:35MEDIUM (5)Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.00NETWORK
CVE‑2013‑29072013‑10‑02 10:35:35MEDIUM (5)The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2013‑29062013‑10‑02 10:35:33MEDIUM (7)Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.00NETWORK
CVE‑2013‑29052013‑08‑21 12:17:57MEDIUM (5)The SharedMemory::Create function in memory/shared_memory_posix.cc in Google Chrome before 29.0.1547.57 uses weak permissions under /dev/shm/, which allows attackers to obtain sensitive information via direct access to a POSIX shared-memory file.00NETWORK
CVE‑2013‑29042013‑08‑21 12:17:57HIGH (8)Use-after-free vulnerability in the Document::finishedParsing function in core/dom/Document.cpp in Blink, as used in Google Chrome before 29.0.1547.57, allows remote attackers to cause a denial of service or possibly have unspecified other impact via an onload event that changes an IFRAME element so that its src attribute is no longer an XML document, leading to unintended garbage collection of this document.00NETWORK
CVE‑2013‑29032013‑08‑21 12:17:57HIGH (8)Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 29.0.1547.57, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving moving a (1) AUDIO or (2) VIDEO element between documents.00NETWORK
CVE‑2013‑29022013‑08‑21 12:17:57HIGH (8)Use-after-free vulnerability in the XSLT ProcessingInstruction implementation in Blink, as used in Google Chrome before 29.0.1547.57, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to an applyXSLTransform call involving (1) an HTML document or (2) an xsl:processing-instruction element that is still in the process of loading.00NETWORK
CVE‑2013‑29012013‑08‑21 12:17:57HIGH (8)Multiple integer overflows in (1) libGLESv2/renderer/Renderer9.cpp and (2) libGLESv2/renderer/Renderer11.cpp in Almost Native Graphics Layer Engine (ANGLE), as used in Google Chrome before 29.0.1547.57, allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑29002013‑08‑21 12:17:57HIGH (8)The FilePath::ReferencesParent function in files/file_path.cc in Google Chrome before 29.0.1547.57 on Windows does not properly handle pathname components composed entirely of . (dot) and whitespace characters, which allows remote attackers to conduct directory traversal attacks via a crafted directory name.00NETWORK
CVE‑2013‑28872013‑08‑21 12:17:54HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 29.0.1547.57 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑28862013‑07‑31 13:20:14HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑28852013‑07‑31 13:20:14HIGH (8)Use-after-free vulnerability in Google Chrome before 28.0.1500.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to not properly considering focus during the processing of JavaScript events in the presence of a multiple-fields input type.00NETWORK
CVE‑2013‑28842013‑07‑31 13:20:14HIGH (8)Use-after-free vulnerability in the DOM implementation in Google Chrome before 28.0.1500.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper tracking of which document owns an Attr object.00NETWORK
CVE‑2013‑28832013‑07‑31 13:20:14HIGH (8)Use-after-free vulnerability in Google Chrome before 28.0.1500.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to deleting the registration of a MutationObserver object.00NETWORK
CVE‑2013‑28822013‑07‑31 13:20:14HIGH (8)Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."00NETWORK
CVE‑2013‑28812013‑07‑31 13:20:14MEDIUM (6)Google Chrome before 28.0.1500.95 does not properly handle frames, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.00NETWORK
CVE‑2013‑28802013‑07‑10 10:55:02HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑28792013‑07‑10 10:55:02MEDIUM (6)Google Chrome before 28.0.1500.71 does not properly determine the circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site.00NETWORK
CVE‑2013‑28782013‑07‑10 10:55:02MEDIUM (5)Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the handling of text.00NETWORK
CVE‑2013‑28772013‑07‑10 10:55:02MEDIUM (5)parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.00NETWORK
CVE‑2013‑28762013‑07‑10 10:55:02MEDIUM (5)browser/extensions/api/tabs/tabs_api.cc in Google Chrome before 28.0.1500.71 does not properly enforce restrictions on the capture of screenshots by extensions, which allows remote attackers to obtain sensitive information about the content of a previous page via vectors involving an interstitial page.00NETWORK
CVE‑2013‑28752013‑07‑10 10:55:02MEDIUM (5)core/rendering/svg/SVGInlineTextBox.cpp in the SVG implementation in Blink, as used in Google Chrome before 28.0.1500.71, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2013‑28742013‑07‑10 10:55:02MEDIUM (4)Google Chrome before 28.0.1500.71 on Windows, when an Nvidia GPU is used, allows remote attackers to bypass intended restrictions on access to screen data via vectors involving IPC transmission of GL textures.00NETWORK
CVE‑2013‑28732013‑07‑10 10:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a 404 HTTP status code during the loading of resources.00NETWORK
CVE‑2013‑28722013‑07‑10 10:55:02MEDIUM (5)Google Chrome before 28.0.1500.71 on Mac OS X does not ensure a sufficient source of entropy for renderer processes, which might make it easier for remote attackers to defeat cryptographic protection mechanisms in third-party components via unspecified vectors.00NETWORK
CVE‑2013‑28712013‑07‑10 10:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input.00NETWORK
CVE‑2013‑28702013‑07‑10 10:55:02HIGH (9)Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request.00NETWORK
CVE‑2013‑28692013‑07‑10 10:55:02MEDIUM (4)Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted JPEG2000 image.00NETWORK
CVE‑2013‑28682013‑07‑10 10:55:02MEDIUM (5)common/extensions/sync_helper.cc in Google Chrome before 28.0.1500.71 proceeds with sync operations for NPAPI extensions without checking for a certain plugin permission setting, which might allow remote attackers to trigger unwanted extension changes via unspecified vectors.00NETWORK
CVE‑2013‑28672013‑07‑10 10:55:02HIGH (8)Google Chrome before 28.0.1500.71 does not properly prevent pop-under windows, which allows remote attackers to have an unspecified impact via a crafted web site.00NETWORK
CVE‑2013‑28662013‑06‑19 20:55:01MEDIUM (4)The Flash plug-in in Google Chrome before 27.0.1453.116, as used on Google Chrome OS before 27.0.1453.116 and separately, does not properly determine whether a user wishes to permit camera or microphone access by a Flash application, which allows remote attackers to obtain sensitive information from a machine's physical environment via a clickjacking attack, as demonstrated by an attack using a crafted Cascading Style Sheets (CSS) opacity property.00NETWORK
CVE‑2013‑28652013‑06‑05 00:55:01HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.110 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑28642013‑06‑05 00:55:01HIGH (8)The PDF functionality in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28632013‑06‑05 00:55:01HIGH (10)Google Chrome before 27.0.1453.110 does not properly handle SSL sockets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2013‑28622013‑06‑05 00:55:01HIGH (8)Skia, as used in Google Chrome before 27.0.1453.110, does not properly handle GPU acceleration, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28612013‑06‑05 00:55:01HIGH (8)Use-after-free vulnerability in the SVG implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28602013‑06‑05 00:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving access to a database API by a worker process.00NETWORK
CVE‑2013‑28592013‑06‑05 00:55:01HIGH (8)Google Chrome before 27.0.1453.110 allows remote attackers to bypass the Same Origin Policy and trigger namespace pollution via unspecified vectors.00NETWORK
CVE‑2013‑28582013‑06‑05 00:55:01HIGH (8)Use-after-free vulnerability in the HTML5 Audio implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28572013‑06‑05 00:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of images.00NETWORK
CVE‑2013‑28562013‑06‑05 00:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input.00NETWORK
CVE‑2013‑28552013‑06‑05 00:55:01MEDIUM (5)The Developer Tools API in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28542013‑06‑05 00:55:01HIGH (8)Google Chrome before 27.0.1453.110 on Windows provides an incorrect handle to a renderer process in unspecified circumstances, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑28532013‑07‑10 10:55:02MEDIUM (7)The HTTPS implementation in Google Chrome before 28.0.1500.71 does not ensure that headers are terminated by \r\n\r\n (carriage return, newline, carriage return, newline), which allows man-in-the-middle attackers to have an unspecified impact via vectors that trigger header truncation.00NETWORK
CVE‑2013‑28492013‑05‑22 13:29:56MEDIUM (4)Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome before 27.0.1453.93 allow user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) drag-and-drop or (2) copy-and-paste operation.00NETWORK
CVE‑2013‑28482013‑05‑22 13:29:56MEDIUM (5)The XSS Auditor in Google Chrome before 27.0.1453.93 might allow remote attackers to obtain sensitive information via unspecified vectors.00NETWORK
CVE‑2013‑28472013‑05‑22 13:29:56MEDIUM (7)Race condition in the workers implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28462013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in the media loader in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2013-2840.00NETWORK
CVE‑2013‑28452013‑05‑22 13:29:56HIGH (8)The Web Audio implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28442013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to style resolution.00NETWORK
CVE‑2013‑28432013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of speech data.00NETWORK
CVE‑2013‑28422013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of widgets.00NETWORK
CVE‑2013‑28412013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of Pepper resources.00NETWORK
CVE‑2013‑28402013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in the media loader in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2013-2846.00NETWORK
CVE‑2013‑28392013‑05‑22 13:29:56HIGH (8)Google Chrome before 27.0.1453.93 does not properly perform a cast of an unspecified variable during handling of clipboard data, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑28382013‑05‑22 13:29:56MEDIUM (5)Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2013‑28372013‑05‑22 13:29:56HIGH (8)Use-after-free vulnerability in the SVG implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑28362013‑05‑22 13:29:56HIGH (8)Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.93 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑26322013‑03‑21 21:55:01MEDIUM (7)Google V8 before 3.17.13, as used in Google Chrome before 27.0.1444.3, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by the Bejeweled game.00NETWORK
CVE‑2013‑22682013‑02‑23 21:55:02HIGH (8)Unspecified vulnerability in the MathML implementation in WebKit in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, has unknown impact and remote attack vectors, related to a "high severity security issue."00NETWORK
CVE‑2013‑14892013‑01‑31 14:55:02HIGH (10)Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 10 and Update 11, when running on Windows using Internet Explorer, Firefox, Opera, and Google Chrome, allows remote attackers to bypass the "Very High" security level of the Java Control Panel and execute unsigned Java code without prompting the user via unknown vectors, aka "Issue 53" and the "Java Security Slider" vulnerability.00NETWORK
CVE‑2013‑09262013‑03‑28 12:18:52MEDIUM (7)Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site.00NETWORK
CVE‑2013‑09252013‑03‑28 12:18:52HIGH (8)Google Chrome before 26.0.1410.43 does not ensure that an extension has the tabs (aka APIPermission::kTab) permission before providing a URL to this extension, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2013‑09242013‑03‑28 12:18:52HIGH (8)The extension functionality in Google Chrome before 26.0.1410.43 does not verify that use of the permissions API is consistent with file permissions, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑09232013‑03‑28 12:18:52MEDIUM (5)The USB Apps API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2013‑09222013‑03‑28 12:18:52HIGH (8)Google Chrome before 26.0.1410.43 does not properly restrict brute-force access attempts against web sites that require HTTP Basic Authentication, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑09212013‑03‑28 12:18:52MEDIUM (7)The Isolated Sites feature in Google Chrome before 26.0.1410.43 does not properly enforce the use of separate processes, which makes it easier for remote attackers to bypass intended access restrictions via a crafted web site.00NETWORK
CVE‑2013‑09202013‑03‑28 12:18:52HIGH (8)Use-after-free vulnerability in the extension bookmarks API in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑09192013‑03‑28 12:18:52HIGH (8)Use-after-free vulnerability in Google Chrome before 26.0.1410.43 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the presence of an extension that creates a pop-up window.00NETWORK
CVE‑2013‑09182013‑03‑28 12:18:52MEDIUM (7)Google Chrome before 26.0.1410.43 does not prevent navigation to developer tools in response to a drag-and-drop operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site.00NETWORK
CVE‑2013‑09172013‑03‑28 12:18:52MEDIUM (5)The URL loader in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2013‑09162013‑03‑28 12:18:44HIGH (8)Use-after-free vulnerability in the Web Audio implementation in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑09122013‑03‑11 10:55:01HIGH (8)WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion."00NETWORK
CVE‑2013‑09112013‑03‑05 21:55:24HIGH (8)Directory traversal vulnerability in Google Chrome before 25.0.1364.152 allows remote attackers to have an unspecified impact via vectors related to databases.00NETWORK
CVE‑2013‑09102013‑03‑05 21:55:24HIGH (8)Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer processes during authorization of the loading of a plug-in, which makes it easier for remote attackers to bypass intended access restrictions via vectors involving a blocked plug-in.00NETWORK
CVE‑2013‑09092013‑03‑05 21:55:12MEDIUM (5)The XSS Auditor in Google Chrome before 25.0.1364.152 allows remote attackers to obtain sensitive HTTP Referer information via unspecified vectors.00NETWORK
CVE‑2013‑09082013‑03‑05 21:55:11HIGH (8)Google Chrome before 25.0.1364.152 does not properly manage bindings of extension processes, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑09072013‑03‑05 21:55:11HIGH (8)Race condition in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media threads.00NETWORK
CVE‑2013‑09062013‑03‑05 21:55:11HIGH (8)The IndexedDB implementation in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑09052013‑03‑05 21:55:11HIGH (8)Use-after-free vulnerability in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an SVG animation.00NETWORK
CVE‑2013‑09042013‑03‑05 21:55:11HIGH (8)The Web Audio implementation in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑09032013‑03‑05 21:55:11HIGH (8)Use-after-free vulnerability in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of browser navigation.00NETWORK
CVE‑2013‑09022013‑03‑05 21:55:11HIGH (8)Use-after-free vulnerability in the frame-loader implementation in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑09002013‑02‑23 21:55:02MEDIUM (7)Race condition in the International Components for Unicode (ICU) functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑08992013‑02‑23 21:55:02MEDIUM (5)Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.00NETWORK
CVE‑2013‑08982013‑02‑23 21:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a URL.00NETWORK
CVE‑2013‑08972013‑02‑23 21:55:02MEDIUM (4)Off-by-one error in the PDF functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service via a crafted document.00NETWORK
CVE‑2013‑08962013‑02‑23 21:55:02HIGH (8)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly manage memory during message handling for plug-ins, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑08952013‑02‑23 21:55:02HIGH (8)Google Chrome before 25.0.1364.97 on Linux, and before 25.0.1364.99 on Mac OS X, does not properly handle pathnames during copy operations, which might make it easier for remote attackers to execute arbitrary programs via unspecified vectors.00NETWORK
CVE‑2013‑08942013‑02‑23 21:55:02HIGH (8)Buffer overflow in the vorbis_parse_setup_hdr_floors function in the Vorbis decoder in vorbisdec.c in libavcodec in FFmpeg through 1.1.3, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds array access) or possibly have unspecified other impact via vectors involving a zero value for a bark map size.00NETWORK
CVE‑2013‑08932013‑02‑23 21:55:02MEDIUM (7)Race condition in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media.00NETWORK
CVE‑2013‑08922013‑02‑23 21:55:02HIGH (8)Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑08912013‑02‑23 21:55:02HIGH (8)Integer overflow in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a blob.00NETWORK
CVE‑2013‑08902013‑02‑23 21:55:01HIGH (8)Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors.00NETWORK
CVE‑2013‑08892013‑02‑23 21:55:01MEDIUM (7)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly enforce a user gesture requirement before proceeding with a file download, which might make it easier for remote attackers to execute arbitrary code via a crafted file.00NETWORK
CVE‑2013‑08882013‑02‑23 21:55:01MEDIUM (5)Skia, as used in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a "user gesture check for dangerous file downloads."00NETWORK
CVE‑2013‑08872013‑02‑23 21:55:01HIGH (8)The developer-tools process in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly restrict privileges during interaction with a connected server, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑08862013‑02‑23 21:55:01HIGH (8)Google Chrome before 25.0.1364.99 on Mac OS X does not properly implement signal handling for Native Client (aka NaCl) code, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑08852013‑02‑23 21:55:01HIGH (8)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly restrict API privileges during interaction with the Chrome Web Store, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑08842013‑02‑23 21:55:01MEDIUM (7)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly load Native Client (aka NaCl) code, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑08832013‑02‑23 21:55:01MEDIUM (5)Skia, as used in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.00NETWORK
CVE‑2013‑08822013‑02‑23 21:55:01HIGH (8)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect memory access) or possibly have unspecified other impact via a large number of SVG parameters.00NETWORK
CVE‑2013‑08812013‑02‑23 21:55:01MEDIUM (5)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via crafted data in the Matroska container format.00NETWORK
CVE‑2013‑08802013‑02‑23 21:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to databases.00NETWORK
CVE‑2013‑08792013‑02‑23 21:55:01HIGH (8)Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly implement web audio nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑08432013‑01‑24 21:55:06HIGH (8)content/renderer/media/webrtc_audio_renderer.cc in Google Chrome before 24.0.1312.56 on Mac OS X does not use an appropriate buffer size for the 96 kHz sampling rate, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a web site that provides WebRTC audio.00NETWORK
CVE‑2013‑08422013‑01‑24 21:55:06HIGH (10)Google Chrome before 24.0.1312.56 does not properly handle %00 characters in pathnames, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑08412013‑01‑24 21:55:06HIGH (8)Array index error in the content-blocking functionality in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2013‑08402013‑01‑24 21:55:02HIGH (10)Google Chrome before 24.0.1312.56 does not validate URLs during the opening of new windows, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2013‑08392013‑01‑24 21:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of fonts in CANVAS elements.00NETWORK
CVE‑2013‑08382013‑01‑15 21:55:02HIGH (8)Google Chrome before 24.0.1312.52 on Linux uses weak permissions for shared memory segments, which has unspecified impact and attack vectors.00NETWORK
CVE‑2013‑08372013‑01‑15 21:55:02HIGH (8)Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs.00NETWORK
CVE‑2013‑08362013‑01‑15 21:55:02MEDIUM (7)Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2013‑08352013‑01‑15 21:55:02MEDIUM (5)Unspecified vulnerability in the Geolocation implementation in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (application crash) via unknown vectors.00NETWORK
CVE‑2013‑08342013‑01‑15 21:55:02MEDIUM (5)Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving glyphs.00NETWORK
CVE‑2013‑08332013‑01‑15 21:55:02MEDIUM (5)Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to printing.00NETWORK
CVE‑2013‑08322013‑01‑15 21:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.00NETWORK
CVE‑2013‑08312013‑01‑15 21:55:02HIGH (8)Directory traversal vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to have an unspecified impact by leveraging access to an extension process.00NETWORK
CVE‑2013‑08302013‑01‑15 21:55:02HIGH (8)The IPC layer in Google Chrome before 24.0.1312.52 on Windows omits a NUL character required for termination of an unspecified data structure, which has unknown impact and attack vectors.00NETWORK
CVE‑2013‑08292013‑01‑15 21:55:02MEDIUM (6)Google Chrome before 24.0.1312.52 does not properly maintain database metadata, which allows remote attackers to bypass intended file-access restrictions via unspecified vectors.00NETWORK
CVE‑2013‑08282013‑01‑15 21:55:02MEDIUM (7)The PDF functionality in Google Chrome before 24.0.1312.52 does not properly perform a cast of an unspecified variable during processing of the root of the structure tree, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2012‑58512012‑11‑15 11:58:40MEDIUM (4)html/parser/XSSAuditor.cpp in WebCore in WebKit, as used in Google Chrome through 22 and Safari 5.1.7, does not consider all possible output contexts of reflected data, which makes it easier for remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string, aka rdar problem 12019108.00NETWORK
CVE‑2012‑53762012‑10‑11 10:51:57CRITICAL (10)The Inter-process Communication (IPC) implementation in Google Chrome before 22.0.1229.94 allows remote attackers to bypass intended sandbox restrictions and write to arbitrary files by leveraging access to a renderer process, a different vulnerability than CVE-2012-5112.36NETWORK
CVE‑2012‑51572013‑01‑15 21:55:02MEDIUM (4)Google Chrome before 24.0.1312.52 does not properly handle image data in PDF documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.00NETWORK
CVE‑2012‑51562013‑01‑15 21:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving PDF fields.00NETWORK
CVE‑2012‑51552013‑01‑15 21:55:02MEDIUM (5)Google Chrome before 24.0.1312.52 on Mac OS X does not use an appropriate sandboxing approach for worker processes, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors.00NETWORK
CVE‑2012‑51542013‑01‑15 21:55:02HIGH (8)Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory.00NETWORK
CVE‑2012‑51532013‑01‑15 21:55:02HIGH (8)Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to stack memory.00NETWORK
CVE‑2012‑51522013‑01‑15 21:55:02MEDIUM (5)Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving seek operations on video data.00NETWORK
CVE‑2012‑51512013‑01‑15 21:55:02MEDIUM (7)Integer overflow in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code in a PDF document.00NETWORK
CVE‑2012‑51502013‑01‑15 21:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving seek operations on video data.00NETWORK
CVE‑2012‑51492013‑01‑15 21:55:01HIGH (8)Integer overflow in the audio IPC layer in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑51482013‑01‑15 21:55:01HIGH (8)The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors.00NETWORK
CVE‑2012‑51472013‑01‑15 21:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling.00NETWORK
CVE‑2012‑51462013‑01‑15 21:55:01MEDIUM (5)Google Chrome before 24.0.1312.52 allows remote attackers to bypass the Same Origin Policy via a malformed URL.00NETWORK
CVE‑2012‑51452013‑01‑15 21:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG layout.00NETWORK
CVE‑2012‑51442012‑12‑12 11:38:45HIGH (10)Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to "an off-by-one overwrite when switching to LTP profile from MAIN."00NETWORK
CVE‑2012‑51432012‑12‑12 11:38:45HIGH (10)Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers.00NETWORK
CVE‑2012‑51422012‑12‑12 11:38:45HIGH (10)Google Chrome before 23.0.1271.97 does not properly handle history navigation, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2012‑51412012‑12‑12 11:38:45HIGH (10)Google Chrome before 23.0.1271.97 does not properly restrict instantiation of the Chromoting client plug-in, which has unspecified impact and attack vectors.00NETWORK
CVE‑2012‑51402012‑12‑12 11:38:45HIGH (10)Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the URL loader.00NETWORK
CVE‑2012‑51392012‑12‑12 11:38:45HIGH (10)Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to visibility events.00NETWORK
CVE‑2012‑51382012‑12‑04 06:05:56HIGH (10)Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact and attack vectors.00NETWORK
CVE‑2012‑51372012‑12‑04 06:05:55HIGH (10)Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Media Source API.00NETWORK
CVE‑2012‑51362012‑11‑28 01:55:01MEDIUM (7)Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during handling of the INPUT element, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted HTML document.00NETWORK
CVE‑2012‑51352012‑11‑28 01:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.00NETWORK
CVE‑2012‑51342012‑11‑28 01:55:01MEDIUM (7)Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.00NETWORK
CVE‑2012‑51332012‑11‑28 01:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.00NETWORK
CVE‑2012‑51322012‑11‑28 01:55:01MEDIUM (5)Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service (application crash) via a response with chunked transfer coding.00NETWORK
CVE‑2012‑51312012‑11‑28 01:55:01HIGH (8)Google Chrome before 23.0.1271.91 on Mac OS X does not properly mitigate improper rendering behavior in the Intel GPU driver, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑51302012‑11‑28 01:55:01MEDIUM (5)Skia, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑51292012‑12‑04 06:05:55HIGH (8)Heap-based buffer overflow in the WebGL subsystem in Google Chrome OS before 23.0.1271.94 allows remote attackers to cause a denial of service (GPU process crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑51282012‑11‑07 11:43:16HIGH (8)Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, does not properly perform write operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑51272012‑11‑07 11:43:16HIGH (8)Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted WebP image.00NETWORK
CVE‑2012‑51262012‑11‑07 11:43:16HIGH (8)Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of plug-in placeholders.00NETWORK
CVE‑2012‑51252012‑11‑07 11:43:16HIGH (8)Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs.00NETWORK
CVE‑2012‑51242012‑11‑07 11:43:16HIGH (8)Google Chrome before 23.0.1271.64 does not properly handle textures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑51232012‑11‑07 11:43:16MEDIUM (5)Skia, as used in Google Chrome before 23.0.1271.64, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑51222012‑11‑07 11:43:16HIGH (8)Google Chrome before 23.0.1271.64 does not properly perform a cast of an unspecified variable during handling of input, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.00NETWORK
CVE‑2012‑51212012‑11‑07 11:43:16HIGH (8)Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to video layout.00NETWORK
CVE‑2012‑51202012‑11‑07 11:43:15HIGH (8)Google V8 before 3.13.7.5, as used in Google Chrome before 23.0.1271.64, on 64-bit Linux platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to an array.00NETWORK
CVE‑2012‑51192012‑11‑07 11:43:15MEDIUM (7)Race condition in Pepper, as used in Google Chrome before 23.0.1271.64, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to buffers.00NETWORK
CVE‑2012‑51182012‑11‑07 11:43:15HIGH (8)Google Chrome before 23.0.1271.64 on Mac OS X does not properly validate an integer value during the handling of GPU command buffers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑51172012‑11‑07 11:43:15HIGH (8)Google Chrome before 23.0.1271.64 does not properly restrict the loading of an SVG subresource in the context of an IMG element, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2012‑51162012‑11‑07 11:43:15HIGH (8)Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG filters.00NETWORK
CVE‑2012‑51152012‑11‑07 11:43:15HIGH (8)Google Chrome before 23.0.1271.64 on Mac OS X does not properly mitigate improper write behavior in graphics drivers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger "wild writes."00NETWORK
CVE‑2012‑51122012‑10‑11 10:51:57HIGH (10)Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.00NETWORK
CVE‑2012‑51112012‑10‑09 11:13:10HIGH (8)Google Chrome before 22.0.1229.92 does not monitor for crashes of Pepper plug-ins, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2012‑51102012‑10‑09 11:13:10MEDIUM (5)The compositor in Google Chrome before 22.0.1229.92 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑51092012‑10‑09 11:13:10MEDIUM (5)The International Components for Unicode (ICU) functionality in Google Chrome before 22.0.1229.92 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a regular expression.00NETWORK
CVE‑2012‑51082012‑10‑09 11:13:10HIGH (9)Race condition in Google Chrome before 22.0.1229.92 allows remote attackers to execute arbitrary code via vectors related to audio devices.00NETWORK
CVE‑2012‑49302012‑09‑15 18:55:03LOW (3)The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.00NETWORK
CVE‑2012‑49292012‑09‑15 18:55:03LOW (3)The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.00NETWORK
CVE‑2012‑49092012‑09‑13 20:55:02MEDIUM (4)Google Chrome before 18.0.1025308 on Android allows remote attackers to obtain cookie information via a crafted application.00NETWORK
CVE‑2012‑49082012‑09‑13 20:55:02HIGH (8)Google Chrome before 18.0.1025308 on Android allows remote attackers to bypass the Same Origin Policy and obtain access to local files via vectors involving a symlink.00NETWORK
CVE‑2012‑49072012‑09‑13 20:55:02HIGH (9)Google Chrome before 18.0.1025308 on Android does not properly restrict access from JavaScript code to Android APIs, which allows remote attackers to have an unspecified impact via a crafted web page.00NETWORK
CVE‑2012‑49062012‑09‑13 20:55:02MEDIUM (5)Google Chrome before 18.0.1025308 on Android does not properly restrict access to file: URLs, which allows remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining credential data, a different vulnerability than CVE-2012-4903.00NETWORK
CVE‑2012‑49052012‑09‑13 20:55:02MEDIUM (4)Cross-site scripting (XSS) vulnerability in Google Chrome before 18.0.1025308 on Android allows remote attackers to inject arbitrary web script or HTML via an extra in an Intent object, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2012‑49042012‑09‑13 20:55:02MEDIUM (4)Cross-application scripting vulnerability in Google Chrome before 18.0.1025308 on Android allows remote attackers to inject arbitrary web script via unspecified vectors, as demonstrated by "Universal XSS (UXSS)" attacks against the current tab.00NETWORK
CVE‑2012‑49032012‑09‑13 20:55:02MEDIUM (5)Google Chrome before 18.0.1025308 on Android does not properly restrict access to file: URLs, which allows remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining credential data, a different vulnerability than CVE-2012-4906.00NETWORK
CVE‑2012‑29002012‑10‑09 11:13:05HIGH (8)Skia, as used in Google Chrome before 22.0.1229.92, does not properly render text, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28992014‑01‑05 20:55:04MEDIUM (4)Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method.00NETWORK
CVE‑2012‑28982014‑01‑05 20:55:04MEDIUM (5)Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674.00NETWORK
CVE‑2012‑28972012‑09‑26 10:56:05HIGH (10)The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka "Windows Font Parsing Vulnerability" or "TrueType Font Parsing Vulnerability."00NETWORK
CVE‑2012‑28962012‑09‑26 10:56:05HIGH (8)Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28952012‑09‑26 10:56:05MEDIUM (7)The PDF functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations.00NETWORK
CVE‑2012‑28942012‑09‑26 10:56:05MEDIUM (7)Google Chrome before 22.0.1229.79 does not properly handle graphics-context data structures, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28932012‑09‑26 10:56:05MEDIUM (7)Double free vulnerability in libxslt, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms.00NETWORK
CVE‑2012‑28922012‑09‑26 10:56:05MEDIUM (5)Unspecified vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to bypass the pop-up blocker via unknown vectors.00NETWORK
CVE‑2012‑28912012‑09‑26 10:56:05MEDIUM (5)The IPC implementation in Google Chrome before 22.0.1229.79 allows attackers to obtain potentially sensitive information about memory addresses via unspecified vectors.00NETWORK
CVE‑2012‑28902012‑09‑26 10:56:05MEDIUM (7)Use-after-free vulnerability in the PDF functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28892012‑09‑26 10:56:05MEDIUM (4)Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2012‑28882012‑09‑26 10:56:05HIGH (8)Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG text references.00NETWORK
CVE‑2012‑28872012‑09‑26 10:56:05HIGH (8)Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving onclick events.00NETWORK
CVE‑2012‑28862012‑09‑26 10:56:05MEDIUM (4)Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors related to the Google V8 bindings, aka "Universal XSS (UXSS)."00NETWORK
CVE‑2012‑28852012‑09‑26 10:56:05HIGH (8)Double free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to application exit.00NETWORK
CVE‑2012‑28842012‑09‑26 10:56:05MEDIUM (5)Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑28832012‑09‑26 10:56:05HIGH (8)Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2874.00NETWORK
CVE‑2012‑28822012‑09‑26 10:56:05MEDIUM (7)FFmpeg, as used in Google Chrome before 22.0.1229.79, does not properly handle OGG containers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "wild pointer" issue.00NETWORK
CVE‑2012‑28812012‑09‑26 10:56:04HIGH (8)Google Chrome before 22.0.1229.79 does not properly handle plug-ins, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28802012‑09‑26 10:56:04HIGH (8)Race condition in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the plug-in paint buffer.00NETWORK
CVE‑2012‑28792012‑09‑26 10:56:04MEDIUM (4)Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service (DOM topology corruption) via a crafted document.00NETWORK
CVE‑2012‑28782012‑09‑26 10:56:04HIGH (8)Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.00NETWORK
CVE‑2012‑28772012‑09‑26 10:56:04MEDIUM (5)The extension system in Google Chrome before 22.0.1229.79 does not properly handle modal dialogs, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2012‑28762012‑09‑26 10:56:04HIGH (8)Buffer overflow in the SSE2 optimization functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28752012‑09‑26 10:56:04MEDIUM (7)Multiple unspecified vulnerabilities in the PDF functionality in Google Chrome before 22.0.1229.79 allow remote attackers to have an unknown impact via a crafted document.00NETWORK
CVE‑2012‑28742012‑09‑26 10:56:04HIGH (8)Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2883.00NETWORK
CVE‑2012‑28722012‑08‑31 19:55:01MEDIUM (4)Cross-site scripting (XSS) vulnerability in an SSL interstitial page in Google Chrome before 21.0.1180.89 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.00NETWORK
CVE‑2012‑28712012‑08‑31 19:55:01MEDIUM (7)libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h.00NETWORK
CVE‑2012‑28702012‑08‑31 19:55:01MEDIUM (4)libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c.00NETWORK
CVE‑2012‑28692012‑08‑31 19:55:01HIGH (8)Google Chrome before 21.0.1180.89 does not properly load URLs, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a "stale buffer."00NETWORK
CVE‑2012‑28682012‑08‑31 19:55:01MEDIUM (7)Race condition in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving improper interaction between worker processes and an XMLHttpRequest (aka XHR) object.00NETWORK
CVE‑2012‑28672012‑08‑31 19:55:01MEDIUM (5)The SPDY implementation in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2012‑28662012‑08‑31 19:55:01HIGH (8)Google Chrome before 21.0.1180.89 does not properly perform a cast of an unspecified variable during handling of run-in elements, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2012‑28652012‑08‑31 19:55:01MEDIUM (4)Google Chrome before 21.0.1180.89 does not properly perform line breaking, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.00NETWORK
CVE‑2012‑28632012‑08‑09 10:29:47HIGH (8)The PDF functionality in Google Chrome before 21.0.1180.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations.00NETWORK
CVE‑2012‑28622012‑08‑09 10:29:47MEDIUM (7)Use-after-free vulnerability in the PDF functionality in Google Chrome before 21.0.1180.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28602012‑08‑06 15:55:02MEDIUM (7)The date-picker implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2012‑28592012‑08‑06 15:55:02HIGH (8)Google Chrome before 21.0.1180.57 on Linux does not properly handle tabs, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2012‑28582012‑08‑06 15:55:02MEDIUM (7)Buffer overflow in the WebP decoder in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted WebP image.00NETWORK
CVE‑2012‑28572012‑08‑06 15:55:02MEDIUM (7)Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28562012‑08‑06 15:55:02HIGH (8)The PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations.00NETWORK
CVE‑2012‑28552012‑08‑06 15:55:02MEDIUM (7)Use-after-free vulnerability in the PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28542012‑08‑06 15:55:02MEDIUM (5)Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to obtain potentially sensitive information about pointer values by leveraging access to a WebUI renderer process.00NETWORK
CVE‑2012‑28532012‑08‑06 15:55:02MEDIUM (7)The webRequest API in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, does not properly interact with the Chrome Web Store, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2012‑28522012‑08‑06 15:55:02MEDIUM (7)The PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, does not properly handle object linkage, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28512012‑08‑06 15:55:02MEDIUM (7)Multiple integer overflows in the PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28502012‑08‑06 15:55:02MEDIUM (7)Multiple unspecified vulnerabilities in the PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allow remote attackers to have an unknown impact via a crafted document.00NETWORK
CVE‑2012‑28492012‑08‑06 15:55:02MEDIUM (4)Off-by-one error in the GIF decoder in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image.00NETWORK
CVE‑2012‑28482012‑08‑06 15:55:01MEDIUM (4)The drag-and-drop implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows user-assisted remote attackers to bypass intended file access restrictions via a crafted web site.00NETWORK
CVE‑2012‑28472012‑08‑06 15:55:01MEDIUM (4)Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, does not request user confirmation before continuing a large series of downloads, which allows user-assisted remote attackers to cause a denial of service (resource consumption) via a crafted web site.00NETWORK
CVE‑2012‑28462012‑08‑06 15:55:01MEDIUM (5)Google Chrome before 21.0.1180.57 on Linux does not properly isolate renderer processes, which allows remote attackers to cause a denial of service (cross-process interference) via unspecified vectors.00NETWORK
CVE‑2012‑28442012‑07‑12 21:55:06HIGH (9)The PDF functionality in Google Chrome before 20.0.1132.57 does not properly handle JavaScript code, which allows remote attackers to cause a denial of service (incorrect object access) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28432012‑07‑12 21:55:06HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to layout height tracking.00NETWORK
CVE‑2012‑28422012‑07‑12 21:55:06HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to counter handling.00NETWORK
CVE‑2012‑28342012‑06‑27 10:18:39HIGH (9)Integer overflow in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted data in the Matroska container format.00NETWORK
CVE‑2012‑28332012‑06‑27 10:18:39HIGH (8)Buffer overflow in the JS API in the PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28322012‑06‑27 10:18:39MEDIUM (7)The image-codec implementation in the PDF functionality in Google Chrome before 20.0.1132.43 does not initialize an unspecified pointer, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2012‑28312012‑06‑27 10:18:39HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG references.00NETWORK
CVE‑2012‑28302012‑06‑27 10:18:39HIGH (8)Google Chrome before 20.0.1132.43 does not properly set array values, which allows remote attackers to cause a denial of service (incorrect pointer use) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28292012‑06‑27 10:18:39HIGH (8)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.00NETWORK
CVE‑2012‑28282012‑06‑27 10:18:39MEDIUM (7)Multiple integer overflows in the PDF functionality in Google Chrome before 20.0.1132.43 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2012‑28272012‑06‑27 10:18:39HIGH (8)Use-after-free vulnerability in the UI in Google Chrome before 20.0.1132.43 on Mac OS X allows attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑28262012‑06‑27 10:18:39MEDIUM (5)Google Chrome before 20.0.1132.43 does not properly implement texture conversion, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑28252012‑06‑27 10:18:39MEDIUM (5)The XSL implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.00NETWORK
CVE‑2012‑28242012‑06‑27 10:18:39HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG painting.00NETWORK
CVE‑2012‑28232012‑06‑27 10:18:39HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG resources.00NETWORK
CVE‑2012‑28222012‑06‑27 10:18:39MEDIUM (5)The PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑28212012‑06‑27 10:18:39HIGH (8)The autofill implementation in Google Chrome before 20.0.1132.43 does not properly display text, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2012‑28202012‑06‑27 10:18:39MEDIUM (5)Google Chrome before 20.0.1132.43 does not properly implement SVG filters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2012‑28192012‑06‑27 10:18:39MEDIUM (7)The texSubImage2D implementation in the WebGL subsystem in Google Chrome before 20.0.1132.43 does not properly handle uploads to floating-point textures, which allows remote attackers to cause a denial of service (assertion failure and application crash) or possibly have unspecified other impact via a crafted web page, as demonstrated by certain WebGL performance tests, aka rdar problem 11520387.00NETWORK
CVE‑2012‑28182012‑06‑27 10:18:39HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the layout of documents that use the Cascading Style Sheets (CSS) counters feature.00NETWORK
CVE‑2012‑28172012‑06‑27 10:18:38HIGH (8)Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to tables that have sections.00NETWORK
CVE‑2012‑28162012‑06‑27 10:18:38HIGH (8)Google Chrome before 20.0.1132.43 on Windows does not properly isolate sandboxed processes, which might allow remote attackers to cause a denial of service (process interference) via unspecified vectors.00NETWORK
CVE‑2012‑28152012‑06‑27 10:18:38MEDIUM (5)Google Chrome before 20.0.1132.43 allows remote attackers to obtain potentially sensitive information from a fragment identifier by leveraging access to an IFRAME element associated with a different domain.00NETWORK
CVE‑2012‑28072012‑06‑27 10:18:38MEDIUM (7)Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑27642012‑06‑27 10:18:38HIGH (7)Untrusted search path vulnerability in Google Chrome before 20.0.1132.43 on Windows might allow local users to gain privileges via a Trojan horse Metro DLL in the current working directory.00LOCAL
CVE‑2012‑18462012‑03‑22 16:55:02HIGH (10)Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a sandboxed process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code."00NETWORK
CVE‑2012‑18452012‑03‑22 16:55:02HIGH (9)Use-after-free vulnerability in Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the DEP and ASLR protection mechanisms, and execute arbitrary code, via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code."00NETWORK
CVE‑2012‑15212012‑05‑01 10:12:04MEDIUM (7)Use-after-free vulnerability in the XML parser in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2012‑07252012‑04‑06 20:55:01HIGH (9)Adobe Flash Player before 11.2.202.229 in Google Chrome before 18.0.1025.151 allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2012-0724.00NETWORK
CVE‑2012‑07242012‑04‑06 20:55:01HIGH (9)Adobe Flash Player before 11.2.202.229 in Google Chrome before 18.0.1025.151 allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2012-0725.00NETWORK
CVE‑2011‑53192015‑03‑09 00:59:00MEDIUM (5)content/renderer/device_sensors/device_motion_event_pump.cc in Google Chrome before 41.0.2272.76 does not properly restrict access to high-rate accelerometer data, which makes it easier for remote attackers to capture keystrokes via a crafted web site that listens for ondevicemotion events, a different vulnerability than CVE-2015-1231.00NETWORK
CVE‑2011‑46922011‑12‑07 19:55:03MEDIUM (5)WebKit, as used in Apple Safari 5.1.1 and earlier and Google Chrome 15 and earlier, does not prevent capture of data about the time required for image loading, which makes it easier for remote attackers to determine whether an image exists in the browser cache via crafted JavaScript code, as demonstrated by visipisi.00NETWORK
CVE‑2011‑46912011‑12‑07 19:55:03MEDIUM (5)Google Chrome 15.0.874.121 and earlier does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts, which makes it easier for remote attackers to determine whether a document exists in the browser cache via crafted JavaScript code.00NETWORK
CVE‑2011‑39722012‑02‑09 04:10:29MEDIUM (5)The shader translator implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39712012‑02‑09 04:10:29MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to mousemove events.00NETWORK
CVE‑2011‑39702012‑02‑09 04:10:29MEDIUM (4)libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39692012‑02‑09 04:10:29MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to layout of SVG documents.00NETWORK
CVE‑2011‑39682012‑02‑09 04:10:29MEDIUM (4)Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving Cascading Style Sheets (CSS) token sequences.00NETWORK
CVE‑2011‑39672012‑02‑09 04:10:29MEDIUM (5)Unspecified vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via a crafted certificate.00NETWORK
CVE‑2011‑39662012‑02‑09 04:10:29HIGH (8)Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to error handling for Cascading Style Sheets (CSS) token-sequence data.00NETWORK
CVE‑2011‑39652012‑02‑09 04:10:29MEDIUM (5)Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2011‑39642012‑02‑09 04:10:29MEDIUM (6)Google Chrome before 17.0.963.46 does not properly implement the drag-and-drop feature, which makes it easier for remote attackers to spoof the URL bar via unspecified vectors.00NETWORK
CVE‑2011‑39632012‑02‑09 04:10:29MEDIUM (5)Google Chrome before 17.0.963.46 does not properly handle PDF FAX images, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39622012‑02‑09 04:10:29MEDIUM (4)Google Chrome before 17.0.963.46 does not properly perform path clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39612012‑02‑09 04:10:29HIGH (9)Race condition in Google Chrome before 17.0.963.46 allows remote attackers to execute arbitrary code via vectors that trigger a crash of a utility process.00NETWORK
CVE‑2011‑39602012‑02‑09 04:10:29MEDIUM (4)Google Chrome before 17.0.963.46 does not properly decode audio data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39592012‑02‑09 04:10:29HIGH (8)Buffer overflow in the locale implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑39582012‑02‑09 04:10:29MEDIUM (7)Google Chrome before 17.0.963.46 does not properly perform casts of variables during handling of a column span, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2011‑39572012‑02‑09 04:10:29HIGH (8)Use-after-free vulnerability in the garbage-collection functionality in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving PDF documents.00NETWORK
CVE‑2011‑39562012‑02‑09 04:10:29MEDIUM (7)The extension implementation in Google Chrome before 17.0.963.46 does not properly handle sandboxed origins, which might allow remote attackers to bypass the Same Origin Policy via a crafted extension.00NETWORK
CVE‑2011‑39552012‑02‑09 04:10:29HIGH (8)Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors that trigger the aborting of an IndexedDB transaction.00NETWORK
CVE‑2011‑39542012‑02‑09 04:10:29MEDIUM (5)Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via vectors that trigger a large amount of database usage.00NETWORK
CVE‑2011‑39532012‑02‑09 04:10:28HIGH (8)Google Chrome before 17.0.963.46 does not prevent monitoring of the clipboard after a paste event, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑39282012‑01‑24 04:03:37HIGH (8)Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling.00NETWORK
CVE‑2011‑39272012‑01‑24 04:03:36HIGH (8)Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑39262012‑01‑24 04:03:36HIGH (8)Heap-based buffer overflow in the tree builder in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑39252012‑01‑24 04:03:36HIGH (8)Use-after-free vulnerability in the Safe Browsing feature in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors related to a navigation entry and an interstitial page.00NETWORK
CVE‑2011‑39242012‑01‑24 04:03:36HIGH (8)Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM selections.00NETWORK
CVE‑2011‑39222012‑01‑07 11:55:15HIGH (8)Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.00NETWORK
CVE‑2011‑39212012‑01‑07 11:55:15HIGH (8)Use-after-free vulnerability in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving animation frames.00NETWORK
CVE‑2011‑39192012‑01‑07 11:55:13HIGH (8)Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑39172011‑12‑13 21:55:02HIGH (8)Stack-based buffer overflow in FileWatcher in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑39162011‑12‑13 21:55:02MEDIUM (5)Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39152011‑12‑13 21:55:02HIGH (8)Buffer overflow in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PDF fonts.00NETWORK
CVE‑2011‑39142011‑12‑13 21:55:02HIGH (8)The internationalization (aka i18n) functionality in Google V8, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.00NETWORK
CVE‑2011‑39132011‑12‑13 21:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to Range handling.00NETWORK
CVE‑2011‑39122011‑12‑13 21:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.00NETWORK
CVE‑2011‑39112011‑12‑13 21:55:01MEDIUM (5)Google Chrome before 16.0.912.63 does not properly handle PDF documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39102011‑12‑13 21:55:01MEDIUM (5)Google Chrome before 16.0.912.63 does not properly handle YUV video frames, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39092011‑12‑13 21:55:01MEDIUM (5)The Cascading Style Sheets (CSS) implementation in Google Chrome before 16.0.912.63 on 64-bit platforms does not properly manage property arrays, which allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2011‑39082011‑12‑13 21:55:01MEDIUM (5)Google Chrome before 16.0.912.63 does not properly parse SVG documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39072011‑12‑13 21:55:01MEDIUM (4)The view-source feature in Google Chrome before 16.0.912.63 allows remote attackers to spoof the URL bar via unspecified vectors.00NETWORK
CVE‑2011‑39062011‑12‑13 21:55:01MEDIUM (5)The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39052011‑12‑13 21:55:01MEDIUM (5)libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39042011‑12‑13 21:55:01HIGH (8)Use-after-free vulnerability in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to bidirectional text (aka bidi) handling.00NETWORK
CVE‑2011‑39032011‑12‑13 21:55:01MEDIUM (5)Google Chrome before 16.0.912.63 does not properly perform regex matching, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑39002011‑11‑17 23:55:01HIGH (8)Google V8, as used in Google Chrome before 15.0.874.121, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write operation.00NETWORK
CVE‑2011‑38982011‑11‑11 11:55:03HIGH (8)Google Chrome before 15.0.874.120, when Java Runtime Environment (JRE) 7 is used, does not request user confirmation before applet execution begins, which allows remote attackers to have an unspecified impact via a crafted applet.00NETWORK
CVE‑2011‑38972011‑11‑11 11:55:03MEDIUM (7)Use-after-free vulnerability in Google Chrome before 15.0.874.120 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to editing.00NETWORK
CVE‑2011‑38962011‑11‑11 11:55:03HIGH (8)Buffer overflow in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to shader variable mapping.00NETWORK
CVE‑2011‑38952011‑11‑11 11:55:03HIGH (8)Heap-based buffer overflow in the Vorbis decoder in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream.00NETWORK
CVE‑2011‑38942011‑11‑11 11:55:03HIGH (8)Google Chrome before 15.0.874.120 does not properly perform VP8 decoding, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted stream.00NETWORK
CVE‑2011‑38932011‑11‑11 11:55:02MEDIUM (5)Google Chrome before 15.0.874.120 does not properly implement the MKV and Vorbis media handlers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑38922011‑11‑11 11:55:02HIGH (8)Double free vulnerability in the Theora decoder in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream.00NETWORK
CVE‑2011‑38912011‑10‑25 19:55:02HIGH (8)Google Chrome before 15.0.874.102 does not properly restrict access to internal Google V8 functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑38902011‑10‑25 19:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to video source handling.00NETWORK
CVE‑2011‑38892011‑10‑25 19:55:02HIGH (8)Heap-based buffer overflow in the Web Audio implementation in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑38882011‑10‑25 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to editing operations in conjunction with an unknown plug-in.00NETWORK
CVE‑2011‑38872011‑10‑25 19:55:02MEDIUM (5)Google Chrome before 15.0.874.102 does not properly handle javascript: URLs, which allows remote attackers to bypass intended access restrictions and read cookies via unspecified vectors.00NETWORK
CVE‑2011‑38862011‑10‑25 19:55:02MEDIUM (7)Google V8, as used in Google Chrome before 15.0.874.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers out-of-bounds write operations.00NETWORK
CVE‑2011‑38852011‑10‑25 19:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to stale Cascading Style Sheets (CSS) token-sequence data.00NETWORK
CVE‑2011‑38842011‑10‑25 19:55:02MEDIUM (7)Google Chrome before 15.0.874.102 does not properly address timing issues during DOM traversal, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2011‑38832011‑10‑25 19:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to counters.00NETWORK
CVE‑2011‑38822011‑10‑25 19:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media buffers.00NETWORK
CVE‑2011‑38812011‑10‑25 19:55:02MEDIUM (4)WebKit, as used in Google Chrome before 15.0.874.102 and Android before 4.4, allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors related to (1) the DOMWindow::clear function and use of a selection object, (2) the Object::GetRealNamedPropertyInPrototypeChain function and use of an __proto__ property, (3) the HTMLPlugInImageElement::allowedToLoadFrameURL function and use of a javascript: URL, (4) incorrect origins for XSLT-generated documents in the XSLTProcessor::createDocumentFromSource function, and (5) improper handling of synchronous frame loads in the ScriptController::executeIfJavaScriptURL function.00NETWORK
CVE‑2011‑38802011‑10‑25 19:55:01HIGH (8)Google Chrome before 15.0.874.102 does not prevent use of an unspecified special character as a delimiter in HTTP headers, which has unknown impact and remote attack vectors.00NETWORK
CVE‑2011‑38792011‑10‑25 19:55:01HIGH (8)Google Chrome before 15.0.874.102 does not prevent redirects to chrome: URLs, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑38782011‑10‑25 19:55:01MEDIUM (7)Race condition in Google Chrome before 15.0.874.102 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker process initialization.00NETWORK
CVE‑2011‑38772011‑10‑25 19:55:01MEDIUM (4)Cross-site scripting (XSS) vulnerability in the appcache internals page in Google Chrome before 15.0.874.102 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.00NETWORK
CVE‑2011‑38762011‑10‑25 19:55:01MEDIUM (7)Google Chrome before 15.0.874.102 does not properly handle downloading files that have whitespace characters at the end of a filename, which has unspecified impact and user-assisted remote attack vectors.00NETWORK
CVE‑2011‑38752011‑10‑25 19:55:01MEDIUM (4)Google Chrome before 15.0.874.102 does not properly handle drag and drop operations on URL strings, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors.00NETWORK
CVE‑2011‑38732011‑10‑04 20:55:02MEDIUM (7)Google Chrome before 14.0.835.202 does not properly implement shader translation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2011‑36402011‑10‑28 02:49:53HIGH (7)Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory. NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."00NETWORK
CVE‑2011‑33892011‑09‑06 19:55:03MEDIUM (4)The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.00NETWORK
CVE‑2011‑32342011‑09‑19 12:02:57MEDIUM (5)Google Chrome before 14.0.835.163 does not properly handle boxes, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑31152012‑05‑24 18:55:02HIGH (8)Google V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger "type corruption."00NETWORK
CVE‑2011‑31142012‑05‑24 18:55:02HIGH (8)Multiple buffer overflows in the PDF functionality in Google Chrome before 19.0.1084.52 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unknown function calls.00NETWORK
CVE‑2011‑31132012‑05‑24 18:55:01HIGH (8)The PDF functionality in Google Chrome before 19.0.1084.52 does not properly perform a cast of an unspecified variable during handling of color spaces, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2011‑31122012‑05‑24 18:55:01MEDIUM (5)Use-after-free vulnerability in the PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via an invalid encrypted document.00NETWORK
CVE‑2011‑31112012‑05‑24 18:55:01MEDIUM (5)Google V8, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service (invalid read operation) via unspecified vectors.00NETWORK
CVE‑2011‑31102012‑05‑24 18:55:01HIGH (8)The PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations.00NETWORK
CVE‑2011‑31092012‑05‑24 18:55:01HIGH (8)Google Chrome before 19.0.1084.52 on Linux does not properly perform a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact by leveraging an error in the GTK implementation of the UI.00NETWORK
CVE‑2011‑31082012‑05‑24 18:55:01HIGH (10)Use-after-free vulnerability in Google Chrome before 19.0.1084.52 allows remote attackers to execute arbitrary code via vectors related to the browser cache.00NETWORK
CVE‑2011‑31072012‑05‑24 18:55:01HIGH (8)Google Chrome before 19.0.1084.52 does not properly implement JavaScript bindings for plug-ins, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑31062012‑05‑24 18:55:01HIGH (10)The WebSockets implementation in Google Chrome before 19.0.1084.52 does not properly handle use of SSL, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2011‑31052012‑05‑24 18:55:01HIGH (8)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.00NETWORK
CVE‑2011‑31042012‑05‑24 18:55:01MEDIUM (5)Skia, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑31032012‑05‑24 18:55:01HIGH (8)Google V8, as used in Google Chrome before 19.0.1084.52, does not properly perform garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2011‑31022012‑05‑16 00:55:04MEDIUM (7)Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑31012012‑05‑16 00:55:04HIGH (10)Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors. NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.00NETWORK
CVE‑2011‑31002012‑05‑16 00:55:03MEDIUM (5)Google Chrome before 19.0.1084.46 does not properly draw dash paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30992012‑05‑16 00:55:03HIGH (10)Use-after-free vulnerability in the PDF functionality in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a malformed name for the font encoding.00NETWORK
CVE‑2011‑30982012‑05‑16 00:55:03HIGH (7)Google Chrome before 19.0.1084.46 on Windows uses an incorrect search path for the Windows Media Player plug-in, which might allow local users to gain privileges via a Trojan horse plug-in in an unspecified directory.00LOCAL
CVE‑2011‑30972012‑05‑16 00:55:03HIGH (10)The PDF functionality in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an out-of-bounds write error in the implementation of sampled functions.00NETWORK
CVE‑2011‑30962012‑05‑16 00:55:03HIGH (8)Use-after-free vulnerability in Google Chrome before 19.0.1084.46 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an error in the GTK implementation of the omnibox.00NETWORK
CVE‑2011‑30952012‑05‑16 00:55:03HIGH (10)The OGG container in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.00NETWORK
CVE‑2011‑30942012‑05‑16 00:55:03MEDIUM (5)Google Chrome before 19.0.1084.46 does not properly handle Tibetan text, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30932012‑05‑16 00:55:03MEDIUM (5)Google Chrome before 19.0.1084.46 does not properly handle glyphs, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30922012‑05‑16 00:55:03HIGH (10)The regex implementation in Google V8, as used in Google Chrome before 19.0.1084.46, allows remote attackers to cause a denial of service (invalid write operation) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30912012‑05‑16 00:55:02HIGH (10)Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30902012‑05‑16 00:55:02HIGH (8)Race condition in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker processes.00NETWORK
CVE‑2011‑30892012‑05‑16 00:55:02HIGH (10)Use-after-free vulnerability in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving tables.00NETWORK
CVE‑2011‑30882012‑05‑16 00:55:02MEDIUM (5)Google Chrome before 19.0.1084.46 does not properly draw hairlines, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30872012‑05‑16 00:55:02HIGH (10)Google Chrome before 19.0.1084.46 does not properly perform window navigation, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑30862012‑05‑16 00:55:02HIGH (10)Use-after-free vulnerability in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a STYLE element.00NETWORK
CVE‑2011‑30852012‑05‑16 00:55:02MEDIUM (5)The Autofill feature in Google Chrome before 19.0.1084.46 does not properly restrict field values, which allows remote attackers to cause a denial of service (UI corruption) and possibly conduct spoofing attacks via vectors involving long values.00NETWORK
CVE‑2011‑30842012‑05‑16 00:55:01HIGH (8)Google Chrome before 19.0.1084.46 does not use a dedicated process for the loading of links found on an internal page, which might allow attackers to bypass intended sandbox restrictions via a crafted page.00NETWORK
CVE‑2011‑30832012‑05‑16 00:55:01MEDIUM (5)browser/profiles/profile_impl_io_data.cc in Google Chrome before 19.0.1084.46 does not properly handle a malformed ftp URL in the SRC attribute of a VIDEO element, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted web page.00NETWORK
CVE‑2011‑30812012‑05‑01 10:12:04HIGH (9)Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078.00NETWORK
CVE‑2011‑30802012‑05‑01 10:12:04HIGH (8)Race condition in the Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 allows attackers to bypass intended sandbox restrictions via unspecified vectors.00NETWORK
CVE‑2011‑30792012‑05‑01 10:12:04HIGH (10)The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.00NETWORK
CVE‑2011‑30782012‑05‑01 10:12:04MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3081.00NETWORK
CVE‑2011‑30772012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the script bindings, related to a "read-after-free" issue.00NETWORK
CVE‑2011‑30762012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to focus handling.00NETWORK
CVE‑2011‑30752012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to style-application commands.00NETWORK
CVE‑2011‑30742012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media.00NETWORK
CVE‑2011‑30732012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG resources.00NETWORK
CVE‑2011‑30722012‑04‑05 22:02:08MEDIUM (7)Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to pop-up windows.00NETWORK
CVE‑2011‑30712012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in the HTMLMediaElement implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30702012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Google V8 bindings.00NETWORK
CVE‑2011‑30692012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to line boxes.00NETWORK
CVE‑2011‑30682012‑04‑05 22:02:08MEDIUM (7)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to run-in boxes.00NETWORK
CVE‑2011‑30672012‑04‑05 22:02:08MEDIUM (7)Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.00NETWORK
CVE‑2011‑30662012‑04‑05 22:02:08MEDIUM (7)Skia, as used in Google Chrome before 18.0.1025.151, does not properly perform clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30652012‑03‑30 22:55:02MEDIUM (7)Skia, as used in Google Chrome before 18.0.1025.142, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30642012‑03‑30 22:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG clipping.00NETWORK
CVE‑2011‑30632012‑03‑30 22:55:02MEDIUM (4)Google Chrome before 18.0.1025.142 does not properly validate the renderer's navigation requests, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑30622012‑03‑30 22:55:02MEDIUM (7)Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.00NETWORK
CVE‑2011‑30612012‑03‑30 22:55:02MEDIUM (6)Google Chrome before 18.0.1025.142 does not properly check X.509 certificates before use of a SPDY proxy, which might allow man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.00NETWORK
CVE‑2011‑30602012‑03‑30 22:55:02MEDIUM (7)Google Chrome before 18.0.1025.142 does not properly handle text fragments, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30592012‑03‑30 22:55:01MEDIUM (7)Google Chrome before 18.0.1025.142 does not properly handle SVG text elements, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30582012‑03‑30 22:55:01MEDIUM (4)Google Chrome before 18.0.1025.142 does not properly handle the EUC-JP encoding system, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.00NETWORK
CVE‑2011‑30572012‑03‑22 16:55:02MEDIUM (4)Google V8, as used in Google Chrome before 17.0.963.83, allows remote attackers to cause a denial of service via vectors that trigger an invalid read operation.00NETWORK
CVE‑2011‑30562012‑03‑22 16:55:01MEDIUM (7)Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe."00NETWORK
CVE‑2011‑30552012‑03‑22 16:55:01MEDIUM (4)The browser native UI in Google Chrome before 17.0.963.83 does not require user confirmation before an unpacked extension installation, which allows user-assisted remote attackers to have an unspecified impact via a crafted extension.00NETWORK
CVE‑2011‑30542012‑03‑22 16:55:01MEDIUM (4)The WebUI privilege implementation in Google Chrome before 17.0.963.83 does not properly perform isolation, which allows remote attackers to bypass intended access restrictions via unspecified vectors.00NETWORK
CVE‑2011‑30532012‑03‑22 16:55:01MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to block splitting.00NETWORK
CVE‑2011‑30522012‑03‑22 16:55:01MEDIUM (7)The WebGL implementation in Google Chrome before 17.0.963.83 does not properly handle CANVAS elements, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30512012‑03‑22 16:55:01MEDIUM (7)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the cross-fade function.00NETWORK
CVE‑2011‑30502012‑03‑22 16:55:01MEDIUM (7)Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.00NETWORK
CVE‑2011‑30492012‑03‑23 10:55:01MEDIUM (5)Google Chrome before 17.0.963.83 does not properly restrict the extension web request API, which allows remote attackers to cause a denial of service (disrupted system requests) via a crafted extension.00NETWORK
CVE‑2011‑30472012‑03‑10 19:55:01HIGH (9)The GPU process in Google Chrome before 17.0.963.79 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) by leveraging an error in the plug-in loading mechanism.00NETWORK
CVE‑2011‑30462012‑03‑09 00:55:01HIGH (10)The extension subsystem in Google Chrome before 17.0.963.78 does not properly handle history navigation, which allows remote attackers to execute arbitrary code by leveraging a "Universal XSS (UXSS)" issue.00NETWORK
CVE‑2011‑30452012‑03‑22 16:55:01MEDIUM (7)Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.00NETWORK
CVE‑2011‑30442012‑03‑05 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG animation elements.00NETWORK
CVE‑2011‑30432012‑03‑05 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a flexbox (aka flexible box) in conjunction with the floating of elements.00NETWORK
CVE‑2011‑30422012‑03‑05 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of table sections.00NETWORK
CVE‑2011‑30412012‑03‑05 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of class attributes.00NETWORK
CVE‑2011‑30402012‑03‑05 19:55:02MEDIUM (4)Google Chrome before 17.0.963.65 does not properly handle text, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.00NETWORK
CVE‑2011‑30392012‑03‑05 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to quote handling.00NETWORK
CVE‑2011‑30382012‑03‑05 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to multi-column handling.00NETWORK
CVE‑2011‑30372012‑03‑05 19:55:02MEDIUM (7)Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables during the splitting of anonymous blocks, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2011‑30362012‑03‑05 19:55:02MEDIUM (7)Google Chrome before 17.0.963.65 does not properly perform a cast of an unspecified variable during handling of line boxes, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2011‑30352012‑03‑05 19:55:01MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG use elements.00NETWORK
CVE‑2011‑30342012‑03‑05 19:55:01MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an SVG document.00NETWORK
CVE‑2011‑30332012‑03‑05 19:55:01HIGH (8)Buffer overflow in Skia, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30322012‑03‑05 19:55:01MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG values.00NETWORK
CVE‑2011‑30312012‑03‑05 19:55:01MEDIUM (7)Use-after-free vulnerability in the element wrapper in Google V8, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑30272012‑02‑16 20:55:04MEDIUM (4)Google Chrome before 17.0.963.56 does not properly perform a cast of an unspecified variable during handling of columns, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2011‑30262012‑02‑16 20:55:04MEDIUM (7)Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.00NETWORK
CVE‑2011‑30252012‑02‑16 20:55:04MEDIUM (4)Google Chrome before 17.0.963.56 does not properly parse H.264 data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑30242012‑02‑16 20:55:04MEDIUM (4)Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service (application crash) via an empty X.509 certificate.00NETWORK
CVE‑2011‑30232012‑02‑16 20:55:04MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to drag-and-drop operations.00NETWORK
CVE‑2011‑30222012‑02‑16 20:55:04MEDIUM (5)translate/translate_manager.cc in Google Chrome before 17.0.963.56 and 19.x before 19.0.1036.7 uses an HTTP session to exchange data for translation, which allows remote attackers to obtain sensitive information by sniffing the network.00NETWORK
CVE‑2011‑30212012‑02‑16 20:55:04HIGH (8)Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to subframe loading.00NETWORK
CVE‑2011‑30202012‑02‑16 20:55:04MEDIUM (7)Unspecified vulnerability in the Native Client validator implementation in Google Chrome before 17.0.963.56 has unknown impact and remote attack vectors.00NETWORK
CVE‑2011‑30192012‑02‑16 20:55:04MEDIUM (7)Heap-based buffer overflow in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska video (aka MKV) file.00NETWORK
CVE‑2011‑30182012‑02‑16 20:55:04HIGH (8)Heap-based buffer overflow in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to path rendering.00NETWORK
CVE‑2011‑30172012‑02‑16 20:55:03MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to database handling.00NETWORK
CVE‑2011‑30162012‑02‑16 20:55:03MEDIUM (7)Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving counter nodes, related to a "read-after-free" issue.00NETWORK
CVE‑2011‑30152012‑02‑16 20:55:03MEDIUM (7)Multiple integer overflows in the PDF codecs in Google Chrome before 17.0.963.56 allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑28812011‑10‑04 20:55:02MEDIUM (7)Google Chrome before 14.0.835.202 does not properly handle Google V8 hidden objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.00NETWORK
CVE‑2011‑28802011‑10‑04 20:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 14.0.835.202 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Google V8 bindings.00NETWORK
CVE‑2011‑28792011‑10‑04 20:55:02MEDIUM (7)Google Chrome before 14.0.835.202 does not properly consider object lifetimes and thread safety during the handling of audio nodes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑28782011‑10‑04 20:55:02HIGH (8)Google Chrome before 14.0.835.202 does not properly restrict access to the window prototype, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2011‑28772011‑10‑04 20:55:02MEDIUM (7)Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font."00NETWORK
CVE‑2011‑28762011‑10‑04 20:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 14.0.835.202 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a text line box.00NETWORK
CVE‑2011‑28752011‑09‑19 12:02:57MEDIUM (7)Google V8, as used in Google Chrome before 14.0.835.163, does not properly perform object sealing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."00NETWORK
CVE‑2011‑28742011‑09‑19 12:02:56MEDIUM (7)Google Chrome before 14.0.835.163 does not perform an expected pin operation for a self-signed certificate during a session, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑28642011‑09‑19 12:02:56MEDIUM (5)Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28632020‑06‑03 23:15:11MEDIUM (7)Insufficient policy enforcement in V8 in Google Chrome prior to 14.0.0.0 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.34NETWORK
CVE‑2011‑28622011‑09‑19 12:02:56HIGH (8)Google V8, as used in Google Chrome before 14.0.835.163, does not properly restrict access to built-in objects, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑28612011‑09‑19 12:02:56MEDIUM (7)Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation.00NETWORK
CVE‑2011‑28602011‑09‑19 12:02:56HIGH (8)Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles.00NETWORK
CVE‑2011‑28592011‑09‑19 12:02:56MEDIUM (7)Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors.00NETWORK
CVE‑2011‑28582011‑09‑19 12:02:56MEDIUM (5)Google Chrome before 14.0.835.163 does not properly handle triangle arrays, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28572011‑09‑19 12:02:56MEDIUM (7)Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the focus controller.00NETWORK
CVE‑2011‑28562011‑09‑19 12:02:56HIGH (8)Google V8, as used in Google Chrome before 14.0.835.163, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2011‑28552011‑09‑19 12:02:56MEDIUM (7)Google Chrome before 14.0.835.163 does not properly handle Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."00NETWORK
CVE‑2011‑28542011‑09‑19 12:02:56MEDIUM (7)Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing."00NETWORK
CVE‑2011‑28532011‑09‑19 12:02:56HIGH (8)Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.00NETWORK
CVE‑2011‑28522011‑09‑19 12:02:56MEDIUM (7)Off-by-one error in Google V8, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑28512011‑09‑19 12:02:56MEDIUM (5)Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28502011‑09‑19 12:02:56MEDIUM (5)Google Chrome before 14.0.835.163 does not properly handle Khmer characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28492011‑09‑19 12:02:56MEDIUM (4)The WebSockets implementation in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.00NETWORK
CVE‑2011‑28482011‑09‑19 12:02:56MEDIUM (4)Google Chrome before 14.0.835.163 allows user-assisted remote attackers to spoof the URL bar via vectors related to the forward button.00NETWORK
CVE‑2011‑28472011‑09‑19 12:02:56MEDIUM (7)Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2011‑28462011‑09‑19 12:02:56MEDIUM (7)Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to unload event handling.00NETWORK
CVE‑2011‑28452011‑10‑25 19:55:01MEDIUM (4)Google Chrome before 15.0.874.102 does not properly handle history data, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors.00NETWORK
CVE‑2011‑28442011‑09‑19 12:02:56MEDIUM (5)Google Chrome before 14.0.835.163 does not properly process MP3 files, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28432011‑09‑19 12:02:56MEDIUM (5)Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28422011‑09‑19 12:02:56HIGH (8)The installer in Google Chrome before 14.0.835.163 on Mac OS X does not properly handle lock files, which has unspecified impact and attack vectors.00NETWORK
CVE‑2011‑28412011‑09‑19 12:02:56MEDIUM (7)Google Chrome before 14.0.835.163 does not properly perform garbage collection during the processing of PDF documents, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2011‑28402011‑09‑19 12:02:56MEDIUM (4)Google Chrome before 14.0.835.163 allows user-assisted remote attackers to spoof the URL bar via vectors related to "unusual user interaction."00NETWORK
CVE‑2011‑28392011‑08‑29 15:55:02HIGH (8)The PDF implementation in Google Chrome before 13.0.782.215 on Linux does not properly use the memset library function, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑28382011‑09‑19 12:02:56HIGH (8)Google Chrome before 14.0.835.163 does not properly consider the MIME type during the loading of a plug-in, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑28372011‑09‑19 12:02:56HIGH (8)Google Chrome before 14.0.835.163 on Linux does not use the PIC and PIE compiler options for position-independent code, which has unspecified impact and attack vectors.00NETWORK
CVE‑2011‑28362011‑09‑19 12:02:56HIGH (8)Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content.00NETWORK
CVE‑2011‑28352011‑09‑19 12:02:56MEDIUM (7)Race condition in Google Chrome before 14.0.835.163 allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the certificate cache.00NETWORK
CVE‑2011‑28342011‑09‑19 12:02:56MEDIUM (7)Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.00NETWORK
CVE‑2011‑28302011‑10‑28 02:49:53HIGH (8)Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑28292011‑08‑29 15:55:02HIGH (8)Integer overflow in Google Chrome before 13.0.782.215 on 32-bit platforms allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving uniform arrays.00NETWORK
CVE‑2011‑28282011‑08‑29 15:55:02HIGH (8)Google V8, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.00NETWORK
CVE‑2011‑28272011‑08‑29 15:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to text searching.00NETWORK
CVE‑2011‑28262011‑08‑29 15:55:02HIGH (8)Google Chrome before 13.0.782.215 allows remote attackers to bypass the Same Origin Policy via vectors related to empty origins.00NETWORK
CVE‑2011‑28252011‑08‑29 15:55:02HIGH (9)Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving custom fonts.00NETWORK
CVE‑2011‑28242011‑08‑29 15:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving counter nodes.00NETWORK
CVE‑2011‑28232011‑08‑29 15:55:02HIGH (8)Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a line box.00NETWORK
CVE‑2011‑28222011‑08‑29 15:55:02HIGH (10)Google Chrome before 13.0.782.215 on Windows does not properly parse URLs located on the command line, which has unspecified impact and attack vectors.00NETWORK
CVE‑2011‑28212011‑08‑29 15:55:02HIGH (8)Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.00NETWORK
CVE‑2011‑28192011‑08‑03 00:55:03MEDIUM (7)Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy via vectors related to handling of the base URI.00NETWORK
CVE‑2011‑28182011‑08‑03 00:55:03MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to display box rendering.00NETWORK
CVE‑2011‑28062011‑08‑29 15:55:02HIGH (10)Google Chrome before 13.0.782.215 on Windows does not properly handle vertex data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2011‑28052011‑08‑03 00:55:03MEDIUM (7)Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy and conduct script injection attacks via unspecified vectors.00NETWORK
CVE‑2011‑28042011‑08‑03 00:55:02MEDIUM (4)Google Chrome before 13.0.782.107 does not properly handle nested functions in PDF documents, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2011‑28032011‑08‑03 00:55:02MEDIUM (7)Google Chrome before 13.0.782.107 does not properly handle Skia paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑28022011‑08‑03 00:55:02MEDIUM (7)Google V8, as used in Google Chrome before 13.0.782.107, does not properly perform const lookups, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted web site.00NETWORK
CVE‑2011‑28012011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the frame loader.00NETWORK
CVE‑2011‑28002011‑08‑03 00:55:02MEDIUM (4)Google Chrome before 13.0.782.107 allows remote attackers to obtain potentially sensitive information about client-side redirect targets via a crafted web site.00NETWORK
CVE‑2011‑27992011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to HTML range handling.00NETWORK
CVE‑2011‑27982011‑08‑03 00:55:02MEDIUM (7)Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site.00NETWORK
CVE‑2011‑27972011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to resource caching.00NETWORK
CVE‑2011‑27962011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Skia, as used in Google Chrome before 13.0.782.107, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑27952011‑08‑03 00:55:02MEDIUM (4)Google Chrome before 13.0.782.107 does not prevent calls to functions in other frames, which allows remote attackers to bypass intended access restrictions via a crafted web site, related to a "cross-frame function leak."00NETWORK
CVE‑2011‑27942011‑08‑03 00:55:02MEDIUM (7)Google Chrome before 13.0.782.107 does not properly perform text iteration, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑27932011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media selectors.00NETWORK
CVE‑2011‑27922011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to float removal.00NETWORK
CVE‑2011‑27912011‑08‑03 00:55:02MEDIUM (7)The International Components for Unicode (ICU) functionality in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.00NETWORK
CVE‑2011‑27902011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving floating styles.00NETWORK
CVE‑2011‑27892011‑08‑03 00:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to instantiation of the Pepper plug-in.00NETWORK
CVE‑2011‑27882011‑08‑03 00:55:02MEDIUM (7)Buffer overflow in the inspector serialization functionality in Google Chrome before 13.0.782.107 allows user-assisted remote attackers to have an unspecified impact via unknown vectors.00NETWORK
CVE‑2011‑27872011‑08‑03 00:55:02MEDIUM (4)Google Chrome before 13.0.782.107 does not properly address re-entrancy issues associated with the GPU lock, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2011‑27862011‑08‑03 00:55:02MEDIUM (4)Google Chrome before 13.0.782.107 does not ensure that the speech-input bubble is shown on the product's screen, which might make it easier for remote attackers to make audio recordings via a crafted web page containing an INPUT element.00NETWORK
CVE‑2011‑27852011‑08‑03 00:55:02MEDIUM (4)The extensions implementation in Google Chrome before 13.0.782.107 does not properly validate the URL for the home page, which allows remote attackers to have an unspecified impact via a crafted extension.00NETWORK
CVE‑2011‑27842011‑08‑03 00:55:02LOW (2)Google Chrome before 13.0.782.107 allows remote attackers to obtain sensitive information via a request for the GL program log, which reveals a local path in an unspecified log entry.00LOCAL
CVE‑2011‑27832011‑08‑03 00:55:02MEDIUM (7)Google Chrome before 13.0.782.107 does not ensure that developer-mode NPAPI extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.00NETWORK
CVE‑2011‑27822011‑08‑03 00:55:02MEDIUM (4)The drag-and-drop implementation in Google Chrome before 13.0.782.107 on Linux does not properly enforce permissions for files, which allows user-assisted remote attackers to bypass intended access restrictions via unspecified vectors.00NETWORK
CVE‑2011‑27612011‑07‑18 22:55:01MEDIUM (4)Google Chrome 14.0.794.0 does not properly handle a reload of a page generated in response to a POST, which allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted web site, related to GetWidget methods.00NETWORK
CVE‑2011‑25992011‑06‑30 15:55:05MEDIUM (4)Google Chrome 11 does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader.00NETWORK
CVE‑2011‑23612011‑08‑03 00:55:01MEDIUM (4)The Basic Authentication dialog implementation in Google Chrome before 13.0.782.107 does not properly handle strings, which might make it easier for remote attackers to capture credentials via a crafted web site.00NETWORK
CVE‑2011‑23602011‑08‑03 00:55:01MEDIUM (4)Google Chrome before 13.0.782.107 does not ensure that the user is prompted before download of a dangerous file, which makes it easier for remote attackers to bypass intended content restrictions via a crafted web site.00NETWORK
CVE‑2011‑23592011‑08‑03 00:55:01MEDIUM (7)Google Chrome before 13.0.782.107 does not properly track line boxes during rendering, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑23582011‑08‑03 00:55:01MEDIUM (7)Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.00NETWORK
CVE‑2011‑23512011‑06‑29 17:55:04MEDIUM (7)Use-after-free vulnerability in Google Chrome before 12.0.742.112 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG use elements.00NETWORK
CVE‑2011‑23502011‑06‑29 17:55:04MEDIUM (7)The HTML parser in Google Chrome before 12.0.742.112 does not properly address "lifetime and re-entrancy issues," which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑23492011‑06‑29 17:55:04MEDIUM (7)Use-after-free vulnerability in Google Chrome before 12.0.742.112 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to text selection.00NETWORK
CVE‑2011‑23482011‑06‑29 17:55:04MEDIUM (7)Google V8, as used in Google Chrome before 12.0.742.112, performs an incorrect bounds check, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑23472011‑06‑29 17:55:04MEDIUM (7)Google Chrome before 12.0.742.112 does not properly handle Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑23462011‑06‑29 17:55:04MEDIUM (7)Use-after-free vulnerability in Google Chrome before 12.0.742.112 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG fonts.00NETWORK
CVE‑2011‑23452011‑06‑29 17:55:04MEDIUM (4)The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑23422011‑06‑09 19:55:03MEDIUM (4)The DOM implementation in Google Chrome before 12.0.742.91 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2011‑23322011‑06‑09 19:55:03HIGH (8)Google V8, as used in Google Chrome before 12.0.742.91, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2011‑20752011‑05‑10 18:55:03HIGH (9)Unspecified vulnerability in Google Chrome 11.0.696.65 on Windows 7 SP1 allows remote attackers to execute arbitrary code via unknown vectors. NOTE: as of 20110510, the only disclosure is a vague advisory that possibly relates to multiple vulnerabilities or multiple products. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.00NETWORK
CVE‑2011‑18192011‑06‑09 19:55:03MEDIUM (4)Google Chrome before 12.0.742.91 allows remote attackers to perform unspecified injection into a chrome:// page via vectors related to extensions.00NETWORK
CVE‑2011‑18182011‑06‑09 19:55:03MEDIUM (7)Use-after-free vulnerability in the image loader in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑18172011‑06‑09 19:55:03MEDIUM (7)Google Chrome before 12.0.742.91 does not properly implement history deletion, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑18162011‑06‑09 19:55:03MEDIUM (7)Use-after-free vulnerability in the developer tools in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑18152011‑06‑09 19:55:03MEDIUM (4)Google Chrome before 12.0.742.91 allows remote attackers to inject script into a tab page via vectors related to extensions.00NETWORK
CVE‑2011‑18142011‑06‑09 19:55:03MEDIUM (6)Google Chrome before 12.0.742.91 attempts to read data from an uninitialized pointer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑18132011‑06‑09 19:55:03MEDIUM (7)Google Chrome before 12.0.742.91 does not properly implement the framework for extensions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑18122011‑06‑09 19:55:03HIGH (8)Google Chrome before 12.0.742.91 allows remote attackers to bypass intended access restrictions via vectors related to extensions.00NETWORK
CVE‑2011‑18112011‑06‑09 19:55:03MEDIUM (4)Google Chrome before 12.0.742.91 does not properly handle a large number of form submissions, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2011‑18102011‑06‑09 19:55:03MEDIUM (4)The Cascading Style Sheets (CSS) implementation in Google Chrome before 12.0.742.91 does not properly restrict access to the visit history, which allows remote attackers to obtain sensitive information via unspecified vectors.00NETWORK
CVE‑2011‑18092011‑06‑09 19:55:02MEDIUM (7)Use-after-free vulnerability in the accessibility feature in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑18082011‑06‑09 19:55:02MEDIUM (7)Use-after-free vulnerability in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to incorrect integer calculations during float handling.00NETWORK
CVE‑2011‑18072011‑05‑26 16:55:05HIGH (10)Google Chrome before 11.0.696.71 does not properly handle blobs, which allows remote attackers to execute arbitrary code via unspecified vectors that trigger an out-of-bounds write.00NETWORK
CVE‑2011‑18062011‑05‑26 16:55:05HIGH (10)Google Chrome before 11.0.696.71 does not properly implement the GPU command buffer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.00NETWORK
CVE‑2011‑18052020‑06‑03 23:15:11HIGH (9)Bad cast in CSS in Google Chrome prior to 11.0.0.0 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.36NETWORK
CVE‑2011‑18042011‑05‑26 16:55:05HIGH (8)rendering/RenderBox.cpp in WebCore in WebKit before r86862, as used in Google Chrome before 11.0.696.71, does not properly render floats, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑18012011‑05‑26 16:55:05MEDIUM (5)Unspecified vulnerability in Google Chrome before 11.0.696.71 allows remote attackers to bypass the pop-up blocker via unknown vectors.00NETWORK
CVE‑2011‑18002011‑05‑16 17:55:04HIGH (8)Multiple integer overflows in the SVG Filters implementation in WebCore in WebKit in Google Chrome before 11.0.696.68 allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑17992011‑05‑16 17:55:04MEDIUM (7)Google Chrome before 11.0.696.68 does not properly perform casts of variables during interaction with the WebKit engine, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑17982014‑12‑26 02:59:04HIGH (8)rendering/svg/RenderSVGText.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 does not properly perform a cast of an unspecified variable during an attempt to handle a block child, which allows remote attackers to cause a denial of service (application crash) or possibly have unknown other impact via a crafted text element in an SVG document.00NETWORK
CVE‑2011‑17962014‑12‑26 02:59:03HIGH (8)Use-after-free vulnerability in the FrameView::calculateScrollbarModesForLayout function in page/FrameView.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that calls the removeChild method during interaction with a FRAME element.00NETWORK
CVE‑2011‑17952014‑12‑26 02:59:03HIGH (8)Integer underflow in the HTMLFormElement::removeFormElement function in html/HTMLFormElement.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document containing a FORM element.00NETWORK
CVE‑2011‑17942014‑12‑26 02:59:02HIGH (8)Integer overflow in the FilterEffect::copyImageBytes function in platform/graphics/filters/FilterEffect.cpp in the SVG filter implementation in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted dimensions.00NETWORK
CVE‑2011‑17932014‑12‑26 02:59:00HIGH (8)rendering/svg/RenderSVGResourceFilter.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted SVG document that leads to a "stale pointer."00NETWORK
CVE‑2011‑16912011‑04‑15 00:55:02MEDIUM (5)The counterToCSSValue function in CSSComputedStyleDeclaration.cpp in the Cascading Style Sheets (CSS) implementation in WebCore in WebKit before r82222, as used in Google Chrome before 11.0.696.43 and other products, does not properly handle access to the (1) counterIncrement and (2) counterReset attributes of CSSStyleDeclaration data provided by a getComputedStyle method call, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted JavaScript code.00NETWORK
CVE‑2011‑14652011‑03‑20 02:00:04MEDIUM (5)The SPDY implementation in net/http/http_network_transaction.cc in Google Chrome before 11.0.696.14 drains the bodies from SPDY responses, which might allow remote SPDY servers to cause a denial of service (application exit) by canceling a stream.00NETWORK
CVE‑2011‑14562011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly handle PDF forms, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."00NETWORK
CVE‑2011‑14552011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly handle PDF documents with multipart encoding, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.00NETWORK
CVE‑2011‑14542011‑05‑03 22:55:02MEDIUM (7)Use-after-free vulnerability in the DOM id handling functionality in Google Chrome before 11.0.696.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2011‑14522011‑05‑03 22:55:02MEDIUM (6)Google Chrome before 11.0.696.57 allows user-assisted remote attackers to spoof the URL bar via vectors involving a redirect and a manual reload.00NETWORK
CVE‑2011‑14512011‑05‑03 22:55:02HIGH (8)Google Chrome before 11.0.696.57 does not properly handle DOM id maps, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "dangling pointers."00NETWORK
CVE‑2011‑14502011‑05‑03 22:55:02MEDIUM (5)Google Chrome before 11.0.696.57 does not properly present file dialogs, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "dangling pointers."00NETWORK
CVE‑2011‑14492011‑05‑03 22:55:02MEDIUM (7)Use-after-free vulnerability in the WebSockets implementation in Google Chrome before 11.0.696.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑14482011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly perform height calculations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑14472011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly handle drop-down lists, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑14462011‑05‑03 22:55:02MEDIUM (6)Google Chrome before 11.0.696.57 allows remote attackers to spoof the URL bar via vectors involving (1) a navigation error or (2) an interrupted load.00NETWORK
CVE‑2011‑14452011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly handle SVG documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑14442011‑05‑03 22:55:02MEDIUM (7)Race condition in the sandbox launcher implementation in Google Chrome before 11.0.696.57 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑14432011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly implement layering, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."00NETWORK
CVE‑2011‑14422011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly handle mutation events, which allows remote attackers to cause a denial of service (node tree corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑14412011‑05‑03 22:55:02MEDIUM (7)Google Chrome before 11.0.696.57 does not properly perform a cast of an unspecified variable during handling of floating select lists, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted HTML document.00NETWORK
CVE‑2011‑14402011‑05‑03 22:55:01MEDIUM (7)Use-after-free vulnerability in Google Chrome before 11.0.696.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the ruby element and Cascading Style Sheets (CSS) token sequences.00NETWORK
CVE‑2011‑14392011‑05‑03 22:55:01MEDIUM (7)Google Chrome before 11.0.696.57 on Linux does not properly isolate renderer processes, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑14382011‑05‑03 22:55:01HIGH (8)Google Chrome before 11.0.696.57 allows remote attackers to bypass the Same Origin Policy via vectors involving blobs.00NETWORK
CVE‑2011‑14372011‑05‑03 22:55:01MEDIUM (7)Multiple integer overflows in Google Chrome before 11.0.696.57 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to float rendering.00NETWORK
CVE‑2011‑14362011‑05‑03 22:55:01MEDIUM (5)Google Chrome before 11.0.696.57 on Linux does not properly interact with the X Window System, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2011‑14352011‑05‑03 22:55:01MEDIUM (5)Google Chrome before 11.0.696.57 does not properly implement the tabs permission for extensions, which allows remote attackers to read local files via a crafted extension.00NETWORK
CVE‑2011‑14342011‑05‑03 22:55:01MEDIUM (7)Google Chrome before 11.0.696.57 does not ensure thread safety during handling of MIME data, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑14132011‑03‑11 02:01:21MEDIUM (5)Google Chrome before 10.0.648.127 on Linux does not properly mitigate an unspecified flaw in an X server, which allows remote attackers to cause a denial of service (application crash) via vectors involving long messages.00NETWORK
CVE‑2011‑13052011‑05‑03 22:55:01MEDIUM (7)Race condition in Google Chrome before 11.0.696.57 on Linux and Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to linked lists and a database.00NETWORK
CVE‑2011‑13042011‑05‑03 22:55:01MEDIUM (5)Unspecified vulnerability in Google Chrome before 11.0.696.57 allows remote attackers to bypass the pop-up blocker via vectors related to plug-ins.00NETWORK
CVE‑2011‑13032011‑05‑03 22:55:01HIGH (8)Google Chrome before 11.0.696.57 does not properly handle floating objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑13022011‑04‑15 19:55:01HIGH (9)Heap-based buffer overflow in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors.00NETWORK
CVE‑2011‑13012011‑04‑15 19:55:01HIGH (9)Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors.00NETWORK
CVE‑2011‑13002011‑04‑15 19:55:01HIGH (10)The Program::getActiveUniformMaxLength function in libGLESv2/Program.cpp in libGLESv2.dll in the WebGLES library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox 4.x before 4.0.1 on Windows and in the GPU process in Google Chrome before 10.0.648.205 on Windows, allows remote attackers to execute arbitrary code via unspecified vectors, related to an "off-by-three" error.00NETWORK
CVE‑2011‑12962011‑03‑25 19:55:01HIGH (8)Google Chrome before 10.0.648.204 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑12952011‑03‑25 19:55:01HIGH (8)WebKit, as used in Google Chrome before 10.0.648.204 and Apple Safari before 5.0.6, does not properly handle node parentage, which allows remote attackers to cause a denial of service (DOM tree corruption), conduct cross-site scripting (XSS) attacks, or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑12942011‑03‑25 19:55:01HIGH (8)Google Chrome before 10.0.648.204 does not properly handle Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑12932011‑03‑25 19:55:01HIGH (8)Use-after-free vulnerability in the HTMLCollection implementation in Google Chrome before 10.0.648.204 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑12922011‑03‑25 19:55:01HIGH (8)Use-after-free vulnerability in the frame-loader implementation in Google Chrome before 10.0.648.204 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑12912011‑03‑25 19:55:01HIGH (8)Google Chrome before 10.0.648.204 does not properly handle base strings, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "buffer error."00NETWORK
CVE‑2011‑12862011‑03‑11 02:01:21HIGH (8)Google V8, as used in Google Chrome before 10.0.648.127, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger incorrect access to memory.00NETWORK
CVE‑2011‑12852011‑03‑11 02:01:20HIGH (8)The regular-expression functionality in Google Chrome before 10.0.648.127 does not properly implement reentrancy, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑12042011‑03‑11 02:01:20MEDIUM (7)Google Chrome before 10.0.648.127 does not properly handle attributes, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via a crafted document.00NETWORK
CVE‑2011‑12032011‑03‑11 02:01:20HIGH (8)Google Chrome before 10.0.648.127 does not properly handle SVG cursors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑12022011‑03‑11 02:01:20MEDIUM (4)The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.00NETWORK
CVE‑2011‑12012011‑03‑11 02:01:20HIGH (8)The context implementation in WebKit, as used in Google Chrome before 10.0.648.127, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑12002011‑03‑11 02:01:20MEDIUM (7)Google Chrome before 10.0.648.127 does not properly perform a cast of an unspecified variable during text rendering, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.00NETWORK
CVE‑2011‑11992011‑03‑11 02:01:20HIGH (8)Google Chrome before 10.0.648.127 does not properly handle DataView objects, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑11982011‑03‑11 02:01:20HIGH (8)The video functionality in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger use of a malformed "out-of-bounds structure."00NETWORK
CVE‑2011‑11972011‑03‑11 02:01:20HIGH (8)Google Chrome before 10.0.648.127 does not properly perform table painting, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11962011‑03‑11 02:01:20HIGH (8)The OGG container implementation in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.00NETWORK
CVE‑2011‑11952011‑03‑11 02:01:20HIGH (8)Use-after-free vulnerability in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "document script lifetime handling."00NETWORK
CVE‑2011‑11942011‑03‑11 02:01:19MEDIUM (5)Multiple unspecified vulnerabilities in Google Chrome before 10.0.648.127 allow remote attackers to bypass the pop-up blocker via unknown vectors.00NETWORK
CVE‑2011‑11932011‑03‑11 02:01:19HIGH (8)Google V8, as used in Google Chrome before 10.0.648.127, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2011‑11922011‑03‑11 02:01:19MEDIUM (5)Google Chrome before 10.0.648.127 on Linux does not properly handle Unicode ranges, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑11912011‑03‑11 02:01:19HIGH (8)Use-after-free vulnerability in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of DOM URLs.00NETWORK
CVE‑2011‑11902011‑03‑11 02:01:19MEDIUM (5)The Web Workers implementation in Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."00NETWORK
CVE‑2011‑11892011‑03‑11 02:01:19HIGH (8)Google Chrome before 10.0.648.127 does not properly perform box layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."00NETWORK
CVE‑2011‑11882011‑03‑11 02:01:19HIGH (8)Google Chrome before 10.0.648.127 does not properly handle counter nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑11872011‑03‑11 02:01:19MEDIUM (5)Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."00NETWORK
CVE‑2011‑11862011‑03‑11 02:01:19MEDIUM (5)Google Chrome before 10.0.648.127 on Linux does not properly handle parallel execution of calls to the print method, which might allow remote attackers to cause a denial of service (application crash) via crafted JavaScript code.00NETWORK
CVE‑2011‑11852011‑03‑11 02:01:18HIGH (8)Google Chrome before 10.0.648.127 does not prevent (1) navigation and (2) close operations on the top location of a sandboxed frame, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑11252011‑03‑01 23:00:04HIGH (8)Google Chrome before 9.0.597.107 does not properly perform layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11242011‑03‑01 23:00:04HIGH (8)Use-after-free vulnerability in Google Chrome before 9.0.597.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to blocked plug-ins.00NETWORK
CVE‑2011‑11232011‑03‑01 23:00:04HIGH (8)Google Chrome before 9.0.597.107 does not properly restrict access to internal extension functions, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑11222011‑03‑01 23:00:04MEDIUM (5)The WebGL implementation in Google Chrome before 9.0.597.107 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, aka Issue 71960.00NETWORK
CVE‑2011‑11212011‑03‑01 23:00:04HIGH (8)Integer overflow in Google Chrome before 9.0.597.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a TEXTAREA element.00NETWORK
CVE‑2011‑11202011‑03‑01 23:00:04MEDIUM (5)The WebGL implementation in Google Chrome before 9.0.597.107 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, aka Issue 71717.00NETWORK
CVE‑2011‑11192011‑03‑01 23:00:04HIGH (8)Google Chrome before 9.0.597.107 does not properly determine device orientation, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11182011‑03‑01 23:00:03MEDIUM (7)Google Chrome before 9.0.597.107 does not properly handle TEXTAREA elements, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2011‑11172011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly handle XHTML documents, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale nodes."00NETWORK
CVE‑2011‑11162011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly handle SVG animations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11152011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly render tables, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11142011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly handle tables, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."00NETWORK
CVE‑2011‑11132011‑03‑01 23:00:03MEDIUM (5)Google Chrome before 9.0.597.107 on 64-bit Linux platforms does not properly perform pickle deserialization, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑11122011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly perform SVG rendering, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑11112011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly implement forms controls, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑11102011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly implement key frame rules, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11092011‑03‑01 23:00:03HIGH (8)Google Chrome before 9.0.597.107 does not properly process nodes in Cascading Style Sheets (CSS) stylesheets, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑11082011‑03‑01 23:00:03MEDIUM (7)Google Chrome before 9.0.597.107 does not properly implement JavaScript dialogs, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2011‑11072011‑03‑01 23:00:03MEDIUM (4)Unspecified vulnerability in Google Chrome before 9.0.597.107 allows remote attackers to spoof the URL bar via unknown vectors.00NETWORK
CVE‑2011‑10592011‑02‑22 19:00:03MEDIUM (4)Use-after-free vulnerability in WebCore in WebKit before r77705, as used in Google Chrome before 11.0.672.2 and other products, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors that entice a user to resubmit a form, related to improper handling of provisional items by the HistoryController component, aka rdar problem 8938557.00NETWORK
CVE‑2011‑09852011‑02‑10 19:00:02HIGH (8)Google Chrome before 9.0.597.94 does not properly perform process termination upon memory exhaustion, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑09842011‑02‑10 19:00:02MEDIUM (5)Google Chrome before 9.0.597.94 does not properly handle plug-ins, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.00NETWORK
CVE‑2011‑09832011‑02‑10 19:00:02HIGH (8)Google Chrome before 9.0.597.94 does not properly handle anonymous blocks, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑09822011‑02‑10 19:00:02HIGH (10)Use-after-free vulnerability in Google Chrome before 9.0.597.94 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG font faces.00NETWORK
CVE‑2011‑09812011‑02‑10 19:00:02HIGH (8)Google Chrome before 9.0.597.94 does not properly perform event handling for animations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑07842011‑02‑04 18:00:04MEDIUM (7)Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.00NETWORK
CVE‑2011‑07832011‑02‑04 18:00:03MEDIUM (4)Unspecified vulnerability in Google Chrome before 9.0.597.84 allows user-assisted remote attackers to cause a denial of service (application crash) via vectors involving a "bad volume setting."00NETWORK
CVE‑2011‑07822011‑02‑04 18:00:03MEDIUM (5)Google Chrome before 9.0.597.84 on Mac OS X does not properly mitigate an unspecified flaw in the Mac OS X 10.5 SSL libraries, which allows remote attackers to cause a denial of service (application crash) via unknown vectors.00NETWORK
CVE‑2011‑07812011‑02‑04 18:00:03HIGH (8)Google Chrome before 9.0.597.84 does not properly handle autofill profile merging, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2011‑07802011‑02‑04 18:00:03MEDIUM (7)The PDF event handler in Google Chrome before 9.0.597.84 does not properly interact with print operations, which allows user-assisted remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑07792011‑02‑04 18:00:03MEDIUM (5)Google Chrome before 9.0.597.84 does not properly handle a missing key in an extension, which allows remote attackers to cause a denial of service (application crash) via a crafted extension.00NETWORK
CVE‑2011‑07782011‑02‑04 18:00:03HIGH (8)Google Chrome before 9.0.597.84 does not properly restrict drag and drop operations, which might allow remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2011‑07772011‑02‑04 18:00:03HIGH (8)Use-after-free vulnerability in Google Chrome before 9.0.597.84 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to image loading.00NETWORK
CVE‑2011‑07762011‑02‑04 18:00:03MEDIUM (5)The sandbox implementation in Google Chrome before 9.0.597.84 on Mac OS X might allow remote attackers to obtain potentially sensitive information about local files via vectors related to the stat system call.00NETWORK
CVE‑2011‑06112011‑04‑13 14:55:01HIGH (9)Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.36NETWORK
CVE‑2011‑06092011‑03‑15 17:55:04HIGH (8)Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.26LOCAL
CVE‑2011‑04852011‑01‑14 17:00:03HIGH (10)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle speech data, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑04842011‑01‑14 17:00:03HIGH (8)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly perform DOM node removal, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale rendering node."00NETWORK
CVE‑2011‑04832011‑01‑14 17:00:03MEDIUM (5)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly perform a cast of an unspecified variable during handling of video, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑04822011‑01‑14 17:00:03MEDIUM (4)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly perform a cast of an unspecified variable during handling of anchors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2011‑04812011‑01‑14 17:00:03HIGH (9)Buffer overflow in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PDF shading.00NETWORK
CVE‑2011‑04802011‑01‑14 17:00:03HIGH (9)Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue.00NETWORK
CVE‑2011‑04792011‑01‑14 17:00:03HIGH (8)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly interact with extensions, which allows remote attackers to cause a denial of service via a crafted extension that triggers an uninitialized pointer.00NETWORK
CVE‑2011‑04782011‑01‑14 17:00:03HIGH (10)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle SVG use elements, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑04772011‑01‑14 17:00:03HIGH (10)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle a mismatch in video frame sizes, which allows remote attackers to cause a denial of service (incorrect memory access) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑04762011‑01‑14 17:00:03HIGH (10)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 allow remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a PDF document that triggers an out-of-memory error.00NETWORK
CVE‑2011‑04752011‑01‑14 17:00:03HIGH (9)Use-after-free vulnerability in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a PDF document.00NETWORK
CVE‑2011‑04742011‑01‑14 17:00:03HIGH (10)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle Cascading Style Sheets (CSS) token sequences in conjunction with cursors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑04732011‑01‑14 17:00:03HIGH (10)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle Cascading Style Sheets (CSS) token sequences in conjunction with CANVAS elements, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."00NETWORK
CVE‑2011‑04722011‑01‑14 17:00:03HIGH (9)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle the printing of PDF documents, which allows user-assisted remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a multi-page document.00NETWORK
CVE‑2011‑04712011‑01‑14 17:00:03HIGH (10)The node-iteration implementation in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 does not properly handle pointers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2011‑04702011‑01‑14 17:00:03MEDIUM (5)Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle extensions notification, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2010‑50732011‑12‑07 19:55:02MEDIUM (5)The JavaScript implementation in Google Chrome 4 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method. NOTE: this may overlap CVE-2010-5070.00NETWORK
CVE‑2010‑50692011‑12‑07 19:55:01MEDIUM (4)The Cascading Style Sheets (CSS) implementation in Google Chrome 4 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document. NOTE: this may overlap CVE-2010-2264.00NETWORK
CVE‑2010‑45782010‑12‑22 01:00:03HIGH (8)Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 do not properly perform cursor handling, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."00NETWORK
CVE‑2010‑45772010‑12‑22 01:00:03HIGH (8)The CSSParser::parseFontFaceSrc function in WebCore/css/CSSParser.cpp in WebKit, as used in Google Chrome before 8.0.552.224, Chrome OS before 8.0.552.343, webkitgtk before 1.2.6, and other products does not properly parse Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted local font, related to "Type Confusion."44NETWORK
CVE‑2010‑45762010‑12‑22 01:00:03MEDIUM (5)browser/worker_host/message_port_dispatcher.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 does not properly handle certain postMessage calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted JavaScript code that creates a web worker.00NETWORK
CVE‑2010‑45752010‑12‑22 01:00:03MEDIUM (4)The ThemeInstalledInfoBarDelegate::Observe function in browser/extensions/theme_installed_infobar_delegate.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 does not properly handle incorrect tab interaction by an extension, which allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted extension.00NETWORK
CVE‑2010‑45742010‑12‑22 01:00:03HIGH (8)The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data.00NETWORK
CVE‑2010‑44942010‑12‑07 21:00:10HIGH (8)Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.00NETWORK
CVE‑2010‑44932010‑12‑07 21:00:10MEDIUM (4)Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service via vectors related to the handling of mouse dragging events.00NETWORK
CVE‑2010‑44922010‑12‑07 21:00:10HIGH (8)Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG animations.00NETWORK
CVE‑2010‑44912010‑12‑07 21:00:10MEDIUM (4)Google Chrome before 8.0.552.215 does not properly restrict privileged extensions, which allows remote attackers to cause a denial of service (memory corruption) via a crafted extension.00NETWORK
CVE‑2010‑44902010‑12‑07 21:00:09HIGH (9)Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via malformed video content that triggers an indexing error.00NETWORK
CVE‑2010‑44892010‑12‑07 21:00:09MEDIUM (4)libvpx, as used in Google Chrome before 8.0.552.215 and possibly other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebM video. NOTE: this vulnerability exists because of a regression.00NETWORK
CVE‑2010‑44882010‑12‑07 21:00:09MEDIUM (5)Google Chrome before 8.0.552.215 does not properly handle HTTP proxy authentication, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2010‑44872010‑12‑07 21:00:09HIGH (8)Incomplete blacklist vulnerability in Google Chrome before 8.0.552.215 on Linux and Mac OS X allows remote attackers to have an unspecified impact via a "dangerous file."00NETWORK
CVE‑2010‑44862010‑12‑07 21:00:09HIGH (9)Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to history handling.00NETWORK
CVE‑2010‑44852010‑12‑07 21:00:09MEDIUM (4)Google Chrome before 8.0.552.215 does not properly restrict the generation of file dialogs, which allows remote attackers to cause a denial of service (reduced usability and possible application crash) via a crafted web site.00NETWORK
CVE‑2010‑44842010‑12‑07 21:00:09MEDIUM (5)Google Chrome before 8.0.552.215 does not properly handle HTML5 databases, which allows attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2010‑44832010‑12‑07 21:00:09MEDIUM (4)Google Chrome before 8.0.552.215 does not properly restrict read access to videos derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via a crafted web site.00NETWORK
CVE‑2010‑44822010‑12‑07 21:00:02MEDIUM (5)Unspecified vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to bypass the pop-up blocker via unknown vectors.00NETWORK
CVE‑2010‑42062010‑11‑06 00:00:03HIGH (9)Array index error in the FEBlend::apply function in WebCore/platform/graphics/filters/FEBlend.cpp in WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted SVG document, related to effects in the application of filters.36NETWORK
CVE‑2010‑42052010‑11‑06 00:00:03CRITICAL (10)Google Chrome before 7.0.517.44 does not properly handle the data types of event objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.46NETWORK
CVE‑2010‑42042010‑11‑06 00:00:03CRITICAL (10)WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, accesses a frame object after this object has been destroyed, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.46NETWORK
CVE‑2010‑42032010‑11‑06 00:00:03CRITICAL (10)WebM libvpx (aka the VP8 Codec SDK) before 0.9.5, as used in Google Chrome before 7.0.517.44, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via invalid frames.46NETWORK
CVE‑2010‑42022010‑11‑06 00:00:03CRITICAL (10)Multiple integer overflows in Google Chrome before 7.0.517.44 on Linux allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted font.46NETWORK
CVE‑2010‑42012010‑11‑06 00:00:03CRITICAL (10)Use-after-free vulnerability in Google Chrome before 7.0.517.44 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving text control selections.46NETWORK
CVE‑2010‑41992010‑11‑06 00:00:03HIGH (9)Google Chrome before 7.0.517.44 does not properly perform a cast of an unspecified variable during processing of an SVG use element, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SVG document.36NETWORK
CVE‑2010‑41982010‑11‑06 00:00:03HIGH (9)WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, does not properly handle large text areas, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted HTML document.36NETWORK
CVE‑2010‑41972010‑11‑06 00:00:03CRITICAL (10)Use-after-free vulnerability in WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving text editing.46NETWORK
CVE‑2010‑40422010‑10‑21 19:00:05CRITICAL (10)Google Chrome before 7.0.517.41 does not properly handle element maps, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "stale elements."46NETWORK
CVE‑2010‑40412010‑10‑21 19:00:05CRITICAL (10)The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.46NETWORK
CVE‑2010‑40402010‑10‑21 19:00:05HIGH (8)Google Chrome before 7.0.517.41 does not properly handle animated GIF images, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted image.26LOCAL
CVE‑2010‑40392010‑10‑21 19:00:05CRITICAL (10)Google Chrome before 7.0.517.41 on Linux does not properly set the PATH environment variable, which has unspecified impact and attack vectors.46NETWORK
CVE‑2010‑40382010‑10‑21 19:00:05HIGH (8)The Web Sockets implementation in Google Chrome before 7.0.517.41 does not properly handle a shutdown action, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.44NETWORK
CVE‑2010‑40372010‑10‑21 19:00:05MEDIUM (4)Unspecified vulnerability in Google Chrome before 7.0.517.41 allows remote attackers to bypass the pop-up blocker via unknown vectors.00NETWORK
CVE‑2010‑40362010‑10‑21 19:00:05MEDIUM (7)Google Chrome before 7.0.517.41 does not properly handle the unloading of a page, which allows remote attackers to spoof URLs via unspecified vectors.00NETWORK
CVE‑2010‑40352010‑10‑21 19:00:05HIGH (9)Google Chrome before 7.0.517.41 does not properly perform autofill operations for forms, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2010‑40342010‑10‑21 19:00:05HIGH (9)Google Chrome before 7.0.517.41 does not properly handle forms, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document.00NETWORK
CVE‑2010‑40332010‑10‑21 19:00:05MEDIUM (5)Google Chrome before 7.0.517.41 does not properly implement the autofill and autocomplete functionality, which allows remote attackers to conduct "profile spamming" attacks via unspecified vectors.00NETWORK
CVE‑2010‑40082010‑11‑17 01:00:03MEDIUM (4)libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.00NETWORK
CVE‑2010‑39172020‑02‑06 13:15:11MEDIUM (7)Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.34NETWORK
CVE‑2010‑37302010‑10‑05 18:00:32HIGH (9)Google Chrome before 6.0.472.62 does not properly use information about the origin of a document to manage properties, which allows remote attackers to have an unspecified impact via a crafted web site, related to a "property pollution" issue.36NETWORK
CVE‑2010‑37292010‑10‑05 18:00:32CRITICAL (10)The SPDY protocol implementation in Google Chrome before 6.0.472.62 does not properly manage buffers, which might allow remote attackers to execute arbitrary code via unspecified vectors.46NETWORK
CVE‑2010‑34172010‑09‑16 21:00:03MEDIUM (5)Google Chrome before 6.0.472.59 does not prompt the user before granting access to the extension history, which allows attackers to obtain potentially sensitive information via unspecified vectors.00NETWORK
CVE‑2010‑34162010‑09‑16 21:00:03CRITICAL (10)Google Chrome before 6.0.472.59 on Linux does not properly implement the Khmer locale, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.46NETWORK
CVE‑2010‑34152010‑09‑16 21:00:03HIGH (10)Google Chrome before 6.0.472.59 does not properly implement Geolocation, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑34142010‑09‑16 21:00:03HIGH (10)Google Chrome before 6.0.472.59 on Mac OS X does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. NOTE: this issue exists because of an incorrect fix for CVE-2010-3112 on Mac OS X.00NETWORK
CVE‑2010‑34132010‑09‑16 21:00:03MEDIUM (5)Unspecified vulnerability in the pop-up blocking functionality in Google Chrome before 6.0.472.59 allows remote attackers to cause a denial of service (application crash) via unknown vectors.00NETWORK
CVE‑2010‑34122010‑09‑16 21:00:03HIGH (9)Race condition in the console implementation in Google Chrome before 6.0.472.59 has unspecified impact and attack vectors.00NETWORK
CVE‑2010‑34112010‑09‑16 21:00:03MEDIUM (5)Google Chrome before 6.0.472.59 on Linux does not properly handle cursors, which might allow attackers to cause a denial of service (assertion failure) via unspecified vectors.00NETWORK
CVE‑2010‑32592010‑09‑07 18:00:03MEDIUM (4)WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, does not properly restrict read access to images derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive image data via a crafted web site.00NETWORK
CVE‑2010‑32582010‑09‑07 18:00:03HIGH (9)The sandbox implementation in Google Chrome before 6.0.472.53 does not properly deserialize parameters, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2010‑32572010‑09‑07 18:00:03HIGH (9)Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element focus.00NETWORK
CVE‑2010‑32562010‑09‑07 18:00:03MEDIUM (4)Google Chrome before 6.0.472.53 does not properly limit the number of stored autocomplete entries, which has unspecified impact and attack vectors.00NETWORK
CVE‑2010‑32552010‑09‑07 18:00:03HIGH (9)Google Chrome before 6.0.472.53 and webkitgtk before 1.2.6 do not properly handle counter nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑32542010‑09‑07 18:00:03HIGH (10)The WebSockets implementation in Google Chrome before 6.0.472.53 does not properly handle integer values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑32532010‑09‑07 18:00:03HIGH (10)The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑32522010‑09‑07 18:00:03HIGH (10)Use-after-free vulnerability in the Notifications presenter in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑32512010‑09‑07 18:00:03MEDIUM (4)The WebSockets implementation in Google Chrome before 6.0.472.53 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.00NETWORK
CVE‑2010‑32502010‑09‑07 18:00:03MEDIUM (5)Unspecified vulnerability in Google Chrome before 6.0.472.53 allows remote attackers to enumerate the set of installed extensions via unknown vectors.00NETWORK
CVE‑2010‑32492010‑09‑07 18:00:03HIGH (9)Google Chrome before 6.0.472.53 does not properly implement SVG filters, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "stale pointer" issue.00NETWORK
CVE‑2010‑32482010‑09‑07 18:00:03MEDIUM (5)Google Chrome before 6.0.472.53 does not properly restrict copying to the clipboard, which has unspecified impact and attack vectors.00NETWORK
CVE‑2010‑32472010‑09‑07 18:00:03MEDIUM (4)Google Chrome before 6.0.472.53 does not properly restrict the characters in URLs, which allows remote attackers to spoof the appearance of the URL bar via homographic sequences.00NETWORK
CVE‑2010‑32462010‑09‑07 18:00:02MEDIUM (4)Google Chrome before 6.0.472.53 does not properly handle the _blank value for the target attribute of unspecified elements, which allows remote attackers to bypass the pop-up blocker via unknown vectors.00NETWORK
CVE‑2010‑31202010‑08‑24 20:00:03HIGH (10)Google Chrome before 5.0.375.127 does not properly implement the Geolocation feature, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑31192010‑08‑24 20:00:03HIGH (10)Google Chrome before 5.0.375.127 and webkitgtk before 1.2.6 do not properly support the Ruby language, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑31182010‑08‑24 20:00:03MEDIUM (5)The autosuggest feature in the Omnibox implementation in Google Chrome before 5.0.375.127 does not anticipate entry of passwords, which might allow remote attackers to obtain sensitive information by reading the network traffic generated by this feature.00NETWORK
CVE‑2010‑31172010‑08‑24 20:00:03HIGH (10)Google Chrome before 5.0.375.127 does not properly implement the notifications feature, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑31162010‑08‑24 20:00:02HIGH (10)Multiple use-after-free vulnerabilities in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to improper handling of MIME types by plug-ins.00NETWORK
CVE‑2010‑31152010‑08‑24 20:00:02MEDIUM (5)Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, does not properly implement the history feature, which might allow remote attackers to spoof the address bar via unspecified vectors.00NETWORK
CVE‑2010‑31142010‑08‑24 20:00:02HIGH (10)The text-editing implementation in Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, does not check a node type before performing a cast, which has unspecified impact and attack vectors related to (1) DeleteSelectionCommand.cpp, (2) InsertLineBreakCommand.cpp, or (3) InsertParagraphSeparatorCommand.cpp in WebCore/editing/.00NETWORK
CVE‑2010‑31132010‑08‑24 20:00:02HIGH (10)Google Chrome before 5.0.375.127, and webkitgtk before 1.2.5, does not properly handle SVG documents, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors related to state changes when using DeleteButtonController.00NETWORK
CVE‑2010‑31122010‑08‑24 20:00:02HIGH (10)Google Chrome before 5.0.375.127 does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑31112010‑08‑24 20:00:02HIGH (10)Google Chrome before 6.0.472.53 does not properly mitigate an unspecified flaw in the Windows kernel, which has unknown impact and attack vectors, a different vulnerability than CVE-2010-2897.00NETWORK
CVE‑2010‑29032010‑07‑28 20:00:10HIGH (8)Google Chrome before 5.0.375.125 performs unexpected truncation and improper eliding of hostnames, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2010‑29022010‑07‑28 20:00:10HIGH (10)The SVG implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑29012010‑07‑28 20:00:10HIGH (10)The rendering implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑29002010‑07‑28 20:00:10HIGH (10)Google Chrome before 5.0.375.125 does not properly handle a large canvas, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2010‑28992010‑07‑28 20:00:10MEDIUM (5)Unspecified vulnerability in the layout implementation in Google Chrome before 5.0.375.125 allows remote attackers to obtain sensitive information from process memory via unknown vectors.00NETWORK
CVE‑2010‑28982010‑07‑28 20:00:10HIGH (10)Google Chrome before 5.0.375.125 does not properly mitigate an unspecified flaw in the GNU C Library, which has unknown impact and attack vectors.00NETWORK
CVE‑2010‑28972010‑07‑28 20:00:10HIGH (10)Google Chrome before 5.0.375.125 does not properly mitigate an unspecified flaw in the Windows kernel, which has unknown impact and attack vectors.00NETWORK
CVE‑2010‑26522010‑07‑06 17:17:15MEDIUM (5)Google Chrome before 5.0.375.99 does not properly implement modal dialogs, which allows attackers to cause a denial of service (application crash) via unspecified vectors.00NETWORK
CVE‑2010‑26512010‑07‑06 17:17:15HIGH (9)The Cascading Style Sheets (CSS) implementation in Google Chrome before 5.0.375.99 does not properly perform style rendering, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑26502010‑07‑06 17:17:15HIGH (9)Unspecified vulnerability in Google Chrome before 5.0.375.99 has unknown impact and attack vectors, related to an "annoyance with print dialogs."00NETWORK
CVE‑2010‑26492010‑07‑06 17:17:15MEDIUM (4)Unspecified vulnerability in Google Chrome before 5.0.375.99 allows remote attackers to cause a denial of service (application crash) via an invalid image.00NETWORK
CVE‑2010‑26482010‑07‑06 17:17:15HIGH (9)The implementation of the Unicode Bidirectional Algorithm (aka Bidi algorithm or UBA) in Google Chrome before 5.0.375.99 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑26472010‑07‑06 17:17:15HIGH (9)Google Chrome before 5.0.375.99 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an invalid SVG document.00NETWORK
CVE‑2010‑26462010‑07‑06 17:17:15HIGH (9)Google Chrome before 5.0.375.99 does not properly isolate sandboxed IFRAME elements, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2010‑26452010‑07‑06 17:17:15MEDIUM (7)Unspecified vulnerability in Google Chrome before 5.0.375.99, when WebGL is used, allows remote attackers to cause a denial of service (out-of-bounds read) via unknown vectors.00NETWORK
CVE‑2010‑23022010‑06‑15 18:00:02HIGH (10)Use-after-free vulnerability in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving remote fonts in conjunction with shadow DOM trees, aka rdar problem 8007953. NOTE: this might overlap CVE-2010-1771.00NETWORK
CVE‑2010‑23012010‑06‑15 18:00:02MEDIUM (4)Cross-site scripting (XSS) vulnerability in editing/markup.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to inject arbitrary web script or HTML via vectors related to the node.innerHTML property of a TEXTAREA element. NOTE: this might overlap CVE-2010-1762.00NETWORK
CVE‑2010‑23002010‑06‑15 18:00:02HIGH (10)Use-after-free vulnerability in the Element::normalizeAttributes function in dom/Element.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to handlers for DOM mutation events, aka rdar problem 7948784. NOTE: this might overlap CVE-2010-1759.00NETWORK
CVE‑2010‑22992010‑06‑15 18:00:02HIGH (10)The Clipboard::DispatchObject function in app/clipboard/clipboard.cc in Google Chrome before 5.0.375.70 does not properly handle CBF_SMBITMAP objects in a ViewHostMsg_ClipboardWriteObjectsAsync message, which might allow remote attackers to execute arbitrary code via vectors involving crafted data from the renderer process, related to a "Type Confusion" issue.00NETWORK
CVE‑2010‑22982010‑06‑15 18:00:02HIGH (10)browser/renderer_host/database_dispatcher_host.cc in Google Chrome before 5.0.375.70 on Linux does not properly handle ViewHostMsg_DatabaseOpenFile messages in chroot-based sandboxing, which allows remote attackers to bypass intended sandbox restrictions via vectors involving fchdir and chdir calls.00NETWORK
CVE‑2010‑22972010‑06‑15 18:00:02HIGH (9)rendering/FixedTableLayout.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an HTML document that has a large colspan attribute within a table.00NETWORK
CVE‑2010‑22962010‑06‑15 18:00:02HIGH (9)The implementation of unspecified DOM methods in Google Chrome before 5.0.375.70 allows remote attackers to bypass the Same Origin Policy via unknown vectors.00NETWORK
CVE‑2010‑22952010‑06‑15 18:00:02MEDIUM (4)page/EventHandler.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 does not properly handle a change of the focused frame during the dispatching of keydown, which allows user-assisted remote attackers to redirect keystrokes via a crafted HTML document, aka rdar problem 7018610. NOTE: this might overlap CVE-2010-1422.00NETWORK
CVE‑2010‑21792010‑06‑15 18:00:02MEDIUM (4)Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing.00NETWORK
CVE‑2010‑21202010‑06‑01 20:30:03MEDIUM (4)Google Chrome 1.0.154.48 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid news:// URIs.00NETWORK
CVE‑2010‑21102010‑05‑28 18:30:02HIGH (8)Google Chrome before 5.0.375.55 does not properly execute JavaScript code in the extension context, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2010‑21092010‑05‑28 18:30:02HIGH (8)Unspecified vulnerability in Google Chrome before 5.0.375.55 allows user-assisted remote attackers to cause a denial of service (memory error) or possibly have unspecified other impact via vectors related to the "drag + drop" functionality.00NETWORK
CVE‑2010‑21082010‑05‑28 18:30:02HIGH (8)Unspecified vulnerability in Google Chrome before 5.0.375.55 allows remote attackers to bypass the whitelist-mode plugin blocker via unknown vectors.00NETWORK
CVE‑2010‑21072010‑05‑28 18:30:02HIGH (10)Unspecified vulnerability in Google Chrome before 5.0.375.55 allows attackers to cause a denial of service (memory error) or possibly have unspecified other impact via vectors related to the Safe Browsing functionality.00NETWORK
CVE‑2010‑21062010‑05‑28 18:30:02MEDIUM (4)Unspecified vulnerability in Google Chrome before 5.0.375.55 might allow remote attackers to spoof the URL bar via vectors involving unload event handlers.00NETWORK
CVE‑2010‑21052010‑05‑28 18:30:02HIGH (10)Google Chrome before 5.0.375.55 does not properly follow the Safe Browsing specification's requirements for canonicalization of URLs, which has unspecified impact and remote attack vectors.00NETWORK
CVE‑2010‑19922010‑05‑20 17:30:02MEDIUM (5)Google Chrome 1.0.154.48 executes a mail application in situations where an IFRAME element has a mailto: URL in its SRC attribute, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many IFRAME elements.00NETWORK
CVE‑2010‑18512010‑05‑07 18:24:16MEDIUM (4)Google Chrome, when the Invisible Hand extension is enabled, uses cookies during background HTTP requests in a possibly unexpected manner, which might allow remote web servers to identify specific persons and their product searches via HTTP request logging, related to a "cross-site data leakage" issue.00NETWORK
CVE‑2010‑18252010‑09‑24 19:00:04HIGH (9)Use-after-free vulnerability in WebKit, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to nested SVG elements.00NETWORK
CVE‑2010‑18242010‑09‑24 19:00:04HIGH (9)Use-after-free vulnerability in WebKit, as used in Apple iTunes before 10.2 on Windows, Apple Safari, and Google Chrome before 6.0.472.59, allows remote attackers to execute arbitrary code or cause a denial of service via vectors related to SVG styles, the DOM tree, and error messages.00NETWORK
CVE‑2010‑18232010‑09‑24 19:00:04HIGH (9)Use-after-free vulnerability in WebKit before r65958, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger use of document APIs such as document.close during parsing, as demonstrated by a Cascading Style Sheets (CSS) file referencing an invalid SVG font, aka rdar problem 8442098.00NETWORK
CVE‑2010‑18222010‑10‑04 21:00:04HIGH (9)WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3 and Google Chrome before 6.0.472.62, does not properly perform a cast of an unspecified variable, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG element in a non-SVG document.36NETWORK
CVE‑2010‑17732010‑09‑24 19:00:04HIGH (9)Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit before r59950, as used in Google Chrome before 5.0.375.70, allows remote attackers to obtain sensitive information, cause a denial of service (memory corruption and application crash), or possibly execute arbitrary code via vectors related to list markers for HTML lists, aka rdar problem 8009118.36NETWORK
CVE‑2010‑17722010‑09‑24 19:00:04HIGH (9)Use-after-free vulnerability in page/Geolocation.cpp in WebCore in WebKit before r59859, as used in Google Chrome before 5.0.375.70, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site, related to failure to stop timers associated with geolocation upon deletion of a document.36NETWORK
CVE‑2010‑17702010‑06‑11 19:30:20HIGH (9)WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue."00NETWORK
CVE‑2010‑17672010‑09‑24 19:00:04MEDIUM (7)Cross-site request forgery (CSRF) vulnerability in loader/DocumentThreadableLoader.cpp in WebCore in WebKit before r57041, as used in Google Chrome before 4.1.249.1059, allows remote attackers to hijack the authentication of unspecified victims via a crafted synchronous preflight XMLHttpRequest operation.00NETWORK
CVE‑2010‑17312010‑05‑06 14:53:02MEDIUM (4)Google Chrome on the HTC Hero allows remote attackers to cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop.00NETWORK
CVE‑2010‑16652010‑05‑03 13:51:53HIGH (8)Google Chrome before 4.1.249.1064 does not properly handle fonts, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑16642010‑05‑03 13:51:53MEDIUM (5)Google Chrome before 4.1.249.1064 does not properly handle HTML5 media, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors.00NETWORK
CVE‑2010‑16632010‑05‑03 13:51:53HIGH (10)The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.00NETWORK
CVE‑2010‑15062010‑04‑23 14:30:02HIGH (8)The Google V8 bindings in Google Chrome before 4.1.249.1059 allow attackers to cause a denial of service (memory corruption) via unknown vectors.00NETWORK
CVE‑2010‑15052010‑04‑23 14:30:02HIGH (10)Google Chrome before 4.1.249.1059 does not prevent pages from loading with the New Tab page's privileges, which has unknown impact and attack vectors.00NETWORK
CVE‑2010‑15042010‑04‑23 14:30:02MEDIUM (4)Cross-site scripting (XSS) vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to inject arbitrary web script or HTML via vectors related to a chrome://downloads URI.00NETWORK
CVE‑2010‑15032010‑04‑23 14:30:02MEDIUM (4)Cross-site scripting (XSS) vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to inject arbitrary web script or HTML via vectors related to a chrome://net-internals URI.00NETWORK
CVE‑2010‑15022010‑04‑23 14:30:02HIGH (9)Unspecified vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to access local files via vectors related to "developer tools."00NETWORK
CVE‑2010‑15002010‑04‑23 14:30:02HIGH (8)Google Chrome before 4.1.249.1059 does not properly support forms, which has unknown impact and attack vectors, related to a "type confusion error."00NETWORK
CVE‑2010‑12372010‑04‑01 22:30:01HIGH (8)Google Chrome 4.1 BETA before 4.1.249.1036 allows remote attackers to cause a denial of service (memory error) or possibly have unspecified other impact via an empty SVG element.00NETWORK
CVE‑2010‑12362010‑04‑01 22:30:01MEDIUM (4)The protocolIs function in platform/KURLGoogle.cpp in WebCore in WebKit before r55822, as used in Google Chrome before 4.1.249.1036 and Flock Browser 3.x before 3.0.0.4112, does not properly handle whitespace at the beginning of a URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted javascript: URL, as demonstrated by a \x00javascript:alert sequence.00NETWORK
CVE‑2010‑12352010‑04‑01 22:30:01MEDIUM (4)Unspecified vulnerability in Google Chrome before 4.1.249.1036 allows remote attackers to trigger the omission of a download warning dialog via unknown vectors.00NETWORK
CVE‑2010‑12342010‑04‑01 22:30:01HIGH (8)Unspecified vulnerability in Google Chrome before 4.1.249.1036 allows remote attackers to truncate the URL shown in the HTTP Basic Authentication dialog via unknown vectors.00NETWORK
CVE‑2010‑12332010‑04‑01 22:30:01HIGH (10)Multiple integer overflows in Google Chrome before 4.1.249.1036 allow remote attackers to have an unspecified impact via vectors involving WebKit JavaScript objects.00NETWORK
CVE‑2010‑12322010‑04‑01 22:30:01MEDIUM (5)Google Chrome before 4.1.249.1036 allows remote attackers to cause a denial of service (memory error) or possibly have unspecified other impact via a malformed SVG document.00NETWORK
CVE‑2010‑12312010‑04‑01 22:30:01HIGH (8)Google Chrome before 4.1.249.1036 processes HTTP headers before invoking the SafeBrowsing feature, which allows remote attackers to have an unspecified impact via crafted headers.00NETWORK
CVE‑2010‑12302010‑04‑01 22:30:01HIGH (10)Google Chrome before 4.1.249.1036 does not have the expected behavior for attempts to delete Web SQL Databases and clear the Strict Transport Security (STS) state, which has unspecified impact and attack vectors.00NETWORK
CVE‑2010‑12292010‑04‑01 22:30:01HIGH (10)The sandbox infrastructure in Google Chrome before 4.1.249.1036 does not properly use pointers, which has unspecified impact and attack vectors.00NETWORK
CVE‑2010‑12282010‑04‑01 22:30:00HIGH (10)Multiple race conditions in the sandbox infrastructure in Google Chrome before 4.1.249.1036 have unspecified impact and attack vectors.00NETWORK
CVE‑2010‑10292010‑03‑19 21:30:00MEDIUM (5)Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *> sequences.00NETWORK
CVE‑2010‑06642010‑02‑18 18:00:01MEDIUM (5)Stack consumption vulnerability in the ChildProcessSecurityPolicy::CanRequestURL function in browser/child_process_security_policy.cc in Google Chrome before 4.0.249.78 allows remote attackers to cause a denial of service (memory consumption and application crash) via a URL that specifies multiple protocols, as demonstrated by a URL that begins with many repetitions of the view-source: substring.00NETWORK
CVE‑2010‑06632010‑02‑18 18:00:01MEDIUM (5)The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not initialize the memory locations that will hold bitmap data, which might allow remote attackers to obtain potentially sensitive information from process memory by providing insufficient data, related to use of a (1) thumbnail database or (2) HTML canvas.00NETWORK
CVE‑2010‑06622010‑02‑18 18:00:01MEDIUM (5)The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not use the correct variables in calculations designed to prevent integer overflows, which allows attackers to leverage renderer access to cause a denial of service or possibly have unspecified other impact via bitmap data, related to deserialization.00NETWORK
CVE‑2010‑06612010‑02‑18 18:00:01MEDIUM (7)WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome before 4.0.249.78, allows remote attackers to bypass the Same Origin Policy via vectors involving the window.open method.00NETWORK
CVE‑2010‑06602010‑02‑18 18:00:01MEDIUM (5)Google Chrome before 4.0.249.78 sends an https URL in the Referer header of an http request in certain circumstances involving https to http redirection, which allows remote HTTP servers to obtain potentially sensitive information via standard HTTP logging.00NETWORK
CVE‑2010‑06592010‑02‑18 18:00:01HIGH (9)The image decoder in WebKit before r52833, as used in Google Chrome before 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large size.00NETWORK
CVE‑2010‑06582010‑02‑18 18:00:01HIGH (9)Multiple integer overflows in Skia, as used in Google Chrome before 4.0.249.78, allow remote attackers to execute arbitrary code in the Chrome sandbox or cause a denial of service (memory corruption and application crash) via vectors involving CANVAS elements.00NETWORK
CVE‑2010‑06572010‑02‑18 18:00:01HIGH (9)Google Chrome before 4.0.249.78 on Windows does not perform the expected encoding, escaping, and quoting for the URL in the --app argument in a desktop shortcut, which allows user-assisted remote attackers to execute arbitrary programs or obtain sensitive information by tricking a user into creating a crafted shortcut.00NETWORK
CVE‑2010‑06562010‑02‑18 18:00:01MEDIUM (4)WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document.00NETWORK
CVE‑2010‑06552010‑02‑18 18:00:01HIGH (9)Use-after-free vulnerability in Google Chrome before 4.0.249.78 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving the display of a blocked popup window during navigation to a different web site.00NETWORK
CVE‑2010‑06512010‑02‑18 18:00:01MEDIUM (4)WebKit before r52784, as used in Google Chrome before 4.0.249.78 and Apple Safari before 4.0.5, permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.00NETWORK
CVE‑2010‑06502010‑02‑18 18:00:01LOW (3)WebKit, as used in Google Chrome before 4.0.249.78 and Apple Safari, allows remote attackers to bypass intended restrictions on popup windows via crafted use of a mouse click event.00NETWORK
CVE‑2010‑06492010‑02‑18 18:00:01HIGH (9)Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome before 4.0.249.89 allows attackers to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a malformed message, related to deserializing of sandbox messages.00NETWORK
CVE‑2010‑06472010‑02‑18 18:00:01HIGH (9)WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.00NETWORK
CVE‑2010‑06462010‑02‑18 18:00:00HIGH (10)Multiple integer signedness errors in factory.cc in Google V8 before r3560, as used in Google Chrome before 4.0.249.89, allow remote attackers to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.00NETWORK
CVE‑2010‑06452010‑02‑18 18:00:00HIGH (9)Multiple integer overflows in factory.cc in Google V8 before r3560, as used in Google Chrome before 4.0.249.89, allow remote attackers to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.00NETWORK
CVE‑2010‑06442010‑02‑18 18:00:00MEDIUM (4)Google Chrome before 4.0.249.89, when a SOCKS 5 proxy server is configured, sends DNS queries directly, which allows remote DNS servers to obtain potentially sensitive information about the identity of a client user via request logging, as demonstrated by a proxy server that was configured for the purpose of anonymity.00NETWORK
CVE‑2010‑06432010‑02‑18 18:00:00MEDIUM (4)Google Chrome before 4.0.249.89 attempts to make direct connections to web sites when all configured proxy servers are unavailable, which allows remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging, as demonstrated by a proxy server that was configured for the purpose of anonymity.00NETWORK
CVE‑2010‑05562010‑02‑18 17:30:01MEDIUM (4)browser/login/login_prompt.cc in Google Chrome before 4.0.249.89 populates an authentication dialog with credentials that were stored by Password Manager for a different web site, which allows user-assisted remote HTTP servers to obtain sensitive information via a URL that requires authentication, as demonstrated by a URL in the SRC attribute of an IMG element.00NETWORK
CVE‑2010‑03152010‑01‑14 19:30:01MEDIUM (5)WebKit before r53607, as used in Google Chrome before 4.0.249.89, allows remote attackers to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and then reading the document.styleSheets[0].href property value, related to an IFRAME element.00NETWORK

Get the IT stuff done that nobody wants to do.

Patch more applications, achieve compliance, and prevent problems while reducing stress with Lavawall®.

Security First

A security tool by security auditors. From Passkeys and Argon2i to source validation and MVSP principles, Lavawall® has you covered.

Constant Improvement

More features and more security added nearly every day.

More patchable programs added every week

While Ninite and other patching tools have had the same patch offerings for decades, we're monitoring stats to keep adding the most useful prorgams.

Details matter

From wrapping TLS communications in extra encryption and uninstalling remote support tools when they aren't used to detailed statistical analysis of system and network performance, Lavawall® goes in-depth.

Chromium extensions and Notification Validation

Lavawall® goes beyond patches and breach detection. We also monitor for risky Chromium extensions and allowed notifications that might be part of a phishing or ransomware attack.

Extended Cloud Security

Extend the security features of Cloudflare, Microsoft, Google, Sophos, and other cloud providers to create a Lavawall® of protection

Secure Remote Management

Even if you used breached remote management tools like ScreenConnect through Lavawall® when it was vulnerable, your computers stayed safe because we only install the agent when it needs to be used.

Integrations and automation

Easily deploy, monitor, and analyze security tools like Huntress, AutoElevate, and Sophos. Magically gain details from ZenDesk, ConnectWise, Datto, Panorama9, Microsoft, and Google.

Human and automated support

Get immediate fixes, user notifications, admin notifications -- and even security-certified human level 3 support when our advanced statistical analysis confirms a problem or anomaly.

We are constantly improving the Lavawall® tools to add more value. Some of our most recent changes include:
2024‑09‑050.11.106.164Phased deployment enhancements
2024‑09‑040.11.103.161
2024‑09‑020.11.102.160CPU Optimizations and Packages reliability improvements
2024‑08‑300.11.99.157CPU Optimizations and Packages reliability improvements
2024‑08‑290.11.98.156CPU utilization and console event optimization
2024‑08‑280.11.97.155Reliability to detect unusual updates like redistributables.
2024‑08‑270.11.96.154
2024‑08‑260.11.95.153Faster response for reboot requests
2024‑08‑200.11.92.150Additional package upgrade pre-requisites
2024‑08‑150.11.89.147
2024‑08‑060.11.87.145
2024‑07‑260.11.83.141Add resiliency for MAC duplicates and uptime
2024‑07‑250.11.82.140Changes to facilitate cross-platform use. Bitlocker and Windows key refinements
2024‑07‑150.11.80.138Antivirus and temperature added to configuration checks
2024‑07‑150.11.79.137Add configuration checks for execution policy and secure boot
2024‑07‑110.11.77.135load balancing refinements
2024‑07‑100.11.76.134Add additional load balancing and data residency capabilities, add randomness to recurring task timings to decrease server load
2024‑07‑050.11.74.132changes to graph and residual work on user imporsonation
2024‑07‑040.11.73.131Add configuration checks for execution policy and secure boot.
2024‑07‑030.11.72.130Enhanced event log monitoring
2024‑07‑020.11.71.129Add details to Windows updates, enhanced risk metrics for application patches
2024‑06‑190.11.65.123Update resiliancy and garbage collection
2024‑06‑130.11.60.118Enhanced logging
2024‑06‑120.11.55.113Include the primary drive serial number; MAC addresses for built-in wireless, Bluetooth, and ethernet into the device hash to restore uninstalled and reinstalled devices in cases where the motherboard serial is not unique
2024‑06‑070.11.54.112Patch and package uninstall data addition
2024‑06‑050.11.47.105refine per-user registry application listing
2024‑06‑020.11.45.103uninstall and reinstall refinements, refine local logging, refine self-update and uninstall timing
2024‑05‑300.11.21.79various bug fixes and improvements
2024‑05‑280.11.16.74Error logging, registration, and uninstall improvements.
2024‑05‑240.11.14.72applied changes for devices and login commands, changes for registration as well
2024‑05‑220.11.13.71Add Windows computer model, improve Operating System parsing
2024‑05‑210.11.11.69Added additional states for Windows update, flexibility for non-standard program file configurations, support for network diagrams at the switch level, details for Windows editions
2024‑05‑210.11.10.68Add specific cases for Defender patterns and Composer versions.
2024‑05‑170.11.3.61Change Log storage location to c:\program files\Lavawall
2024‑05‑170.11.1.59self-update improvements.
2024‑05‑160.8.0.55 error log reporting and management.
2024‑05‑150.7.0.54Websocket resiliency improvements
2024‑05‑090.6.0.53 Error log reporting and management.
2024‑05‑010.5.44.52Even more improvements to scheduler
2024‑04‑240.5.41.49Install compatibility with Sandbox
2024‑04‑220.5.21.29Project property changes to enable automated compilation with new features.
2024‑04‑200.5.20.28Add motherboard serial number and company reassignment
2024‑04‑110.5.4.12Automate release notes as part of build process
2024‑04‑030.5.3.11Websocket and service enhancements
2024‑03‑210.5.2.10Enhance zip file validation
2024‑03‑200.5.1.9Self-update enhancements
2024‑03‑200.5.0.8Enhance installer capabilities
2024‑03‑080.4.2.7Add details to available updates
2024‑03‑080.4.1.6Add additional architecture and source information to application inventory
2024‑02‑220.4.0.5Change compilation approach. The executable signed with an EV code signing certificate includes the company information so it is no longer required as an argument.

Although the Linux agent code base is mature, dating back to 2006, we're still constantly improving it to add value and compatibility for new distributions. Some of our most recent changes include:
2024‑05‑20253Added cleanup of old .json files during a re-install
2024‑05‑13252Added apt-get update to install
2024‑05‑06248Allow restart to use /var/run/reboot-required if needrestart is not installed
2024‑04‑22239Improve internal update and version tracking
2024‑04‑15235Add support for Yum packages
2024‑04‑08233Align patching with Windows patch reporting
2024‑04‑02228Add support for needrestart
2024‑03‑04224Schedule restarts
2024‑03‑25221Add support for apt packages
2024‑03‑18212Implement release management
2024‑03‑11202Add user login monitoring
2024‑03‑04189Enhance installation reliability
2024‑02‑26187Exapand triggers to identify if the instance needs to be restarted
2024‑02‑19146Improve compatibility for non-AWS instances
2024‑02‑14138Add self-uninstall capabilities
2024‑02‑12135Enhance scheduling flexibility
2024‑02‑07132Add kernel version tracking
2024‑02‑05124Add device hash to cryptographic self-update script validation
2024‑01‑29107Enhance encryption of patch data
2024‑01‑2298Improve how available storage is calculated
2024‑01‑1597Move initial tasks from installation file to sub scripts
2024‑05‑2191Improve multi-distribution compatibility
2024‑05‑2179Improve encryption reliability
2023‑12‑1168Enhance cryptographic validation of new scripts before updating
2023‑11‑2062Add inner layer of AES encryption in case TLS inspection doesn't allow for a secure connection
2023‑11‑2756Additional base cases for resiliancy
2023‑11‑2054Additional headers added to authentication process during installation.
2023‑11‑2053Enhanced key management
2023‑11‑1551Add insecure installation parameter to allow installation in environments with TLS inspection or other machine-in-the-middle situations.
2023‑11‑0642Enhance redundant encryption during installation.
2023‑10‑3033Improve install-over compatibility
2023‑10‑2318Add reboot configuration and scheduling
2023‑10‑2317Add self-updating functionality.
2023‑10‑1615Add Linux patching information for apt
2023‑10‑0914Collect system information
2023‑10‑0913Add Linux distribution information
2023‑09‑3012Add memory monitoring
2023‑09‑3010Add hardware information
2023‑09‑239Add AWS information
2023‑09‑238Add customized schedule capability for configuration updates
2023‑09‑237Add support for package monitoring using package and dpkg logs
2023‑09‑166Add storage data configuration gathering
2023‑09‑165Add CPU information

Lavawall®'s data gathering approach started with Government and Fortune 50 information security audits. When our founder transitioned from audit and assurance work to a Managed IT Service Provider (MSP), he was shocked that basics like Multi-Factor Authentication were painful to implement in some RMMs like ConnectWise and it was impossible to turn off remote access services in others like Datto RMM and SuperOps.

Lavawall® was built from the ground up with these concerns and the Minimum Viable Secure Product requirements in mind.

Some of the controls we implemented include:
  • PassKeys as the preferred primary authentication at no additional cost
  • Single Sign-on using modern, maintained, and industry-standard protocols for all customers at no additional cost
  • Multi-Factor Authentication as a non-negotiable default
  • Encrypting communications the same way as TLS again within the TLS tunnel, so we can allow TLS inspection without breaking like Huntress or disclosing security vulnerabilities to eavesdroppers.
  • Encouraging external vulnerability reports and customer testing
  • Passwords checked against popular disclosed passwords, hashed before they leave your computer, and then stored using Argon2id
  • Not requiring the use of passwords at all. We consider them a temporary backup authentication in case you can't use passkeys or SSO.

Lavawall® scanning computers are on dedicated servers in Calgary, Alberta, Canada.
Lavawall® databases and front-end systems are hosted with AWS in Montréal, Québec, Canada.
We send emails through AWS in Ireland and dedicated servers in Calgary, Alberta, Canada.
We send text messages for additional identity verification through Twilio in the United States.
We store executables and pass requests through Cloudflare at your nearest edge location.
We use Cloudflare for risk management, turnstile, and web application firewall services.
We use LeadPages for landing pages.
We use Google and Facebook for analytics on our public-facing pages, but they do not have access to the console.
We integrate with third-party tools, such as Microsoft, Google, Huntress, Screen Connect, Axcient, and Datto in their respective locations. However, you must initiate these integrations through single sign-on or by enabling them in your Lavawall® console.

Active security by design

Lavawall® is under active development with the latest release on

5+

Interfaces

150+

Monitored Applications

7+

System Metrics

Actively manage your IT with Lavawall®

Patching

Updates Beyond Windows

Lavawall® prevents the 80% of breaches and failed audits due to missing patches and updates.
You can reduce application patching delays from 67 days to nearly immediate with the 150+ applications that Lavawall® monitors and patches.

Patch release monitoring
Monitor everything without having to select packages or “managed applications”
Patch impact classification
Standard and optional Windows patches
Lavawall patch grid
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.


Learn More
Flexible Term; Flexible Service

Flexibility for your dynamic business

You need to get your arms around compliance and security and don't want to get locked into “high watermark” monthly invoices or multi-year contracts.

Pay-as-you-need monthly pricing

DIY, full management, and coaching options

CMMI, PCI, SOC2, Canadian Cybersecurity, Minimum Viable Secure Product, and other compliance support

Choose the plan that's right for you

Simple pricing. No hidden fees. Advanced features for you business.

Month
Annual

Get 2 months free with Annual!
DIY

Security-focused RMM

C$3.25 /computer/Month

C$32.50 /computer/Year

  • 1 computer
    or 1 of the following cloud integrations:
    AWS, Axcient, Connectwise, Datto, Google, Huntress, M365, Sophos Central integrations
    (each integration counts as 1 computer)
  • 150+ application patches
  • 30-day Logs
  • Security configuration monitoring
  • Anomaly detection
  • CMMI, MVSP, CyberCanda compliance
  • Lavawall® support
  • Sophos MDR: C$13.50/desktop
    Sophos MDR: C$162/desktop
  • Huntress: C$5.40/device
    Huntress: C$64.80/device
  • Available white-label support for end users
  • Level 3+ IT support for IT
  • Weekly IT coaching sessions
Popular
Managed Security & Support

Unlimited end-user support

C$160 /user/Month

C$1,600 /user/Year

  • 1 computer/user
    Additional devices charged at DIY prices
  • AWS, Axcient, Connectwise, Datto, Google, Huntress, M365, Sophos Central integrations
  • 150+ application patches
  • 90-day Logs
  • Security configuration monitoring
  • Anomaly detection
  • CMMI, MVSP, CyberCanda compliance
  • Lavawall® support
  • Sophos MDR Essentials
  • Huntress
  • White-label email and phone support for end users
  • Level 3+ IT support for IT
  • Weekly IT coaching sessions
  • Automatic discount and upgrade to Support & Coaching after 15 users
Support & Coaching

Improve your IT performance

$2,250 /Month

$22,500 /Year

  • 25 computers included
    Additional computers charged at DIY prices
  • AWS, Axcient, Connectwise, Datto, Google, Huntress, M365, Sophos Central integrations
  • 150+ application patches
  • 90-day Logs
  • Security configuration monitoring
  • Anomaly detection
  • CMMI, MVSP, CyberCanda compliance
  • Lavawall®-only support
  • Sophos MDR Essentials
  • Huntress
  • White-label email and phone support for 15 users included Additional: C$150/user Additional: C$1,500/user
  • L3 IT support for IT
  • Weekly IT coaching sessions

Frequently Asked Questions

If you can not find answer to your question in our FAQ, you can always contact us or email us. We will answer you shortly!

General Questions

The three big catalysts for Lavawall® were:
  1. Two years after a missing Plex Media Server led to the LastPass breach, the Remote Monitorign and Management (RMM) tools availabel for Manged IT Service Providers (MSPs) still didn't monitor for it.
    Going through industry-specific applications, we noticed many were missing from the big RMM and patching providers. MSPs, insurance providers, and organizations that put their cleints at risk need to know about these risks, which lead to the largest number of critical audit findings and breaches
  2. After 20 years of writing the same audit findings about system configurations, Payment Card Industry (PCI) compliance, and missing patches, our technical co-founder wanted to make it easier fo avoid these findings
  3. The existing risk visibility tools for insurance underwriters took a shallow look at Internet-facing risks. They -- along with all businesses -- need a deeper view of the threats that could actually lead to breaches.

Lavawall® breaks vulnerabilities into the following groups:
  • Domain risks
  • Operating System (OS) patches
  • Application patches
  • Network vulnerabilities
  • Cloud vulnerabilities
  • OS configurations

We are currently building more third-party interfaces. Current interfaces include:
  • Axcient*
  • Cloudflare
  • Connectwise Screen Connect
  • Datto RMM
  • FreshDesk*
  • Huntress
  • Microsoft 365
  • Panorama9
  • ZenDesk
*In limited release/development

Yes!
You can use your own logo for the console and notifications. You can also use a CNAME to automatically brand your console.
Note: you cannot currently re-proxy the CNAME to Lavawall® through Cloudflare.
Privacy & Security

We encourage primary authentication for Lavawall® through Passkeys or Single Sign On (SSO).
However, we do allow passwords and use passwords as part of the zero-knowledge encryption for your clients' sensitive data, such as Bitlocker keys and Personally-Identifiable Information (PII).
These passwords use Argon2id slow hashes with individual salts and peppers.

Yes! Lavawall communicates with its endpoints through TLS. However, given that many of our clients want to be as secure as possible and have TLS inspection enabled, we allow for "insecure" connections with invalid certificates, which result from such configurations.
We have added an additional secure tunnel that mimics the TLS process within the public TLS tunnel. This extra tunnel provides authentication and privacy for the workstations and the Lavawall® servers to prevent attacks such as the one that took down Solar Winds.

We do not enable remote access tools like ScreenConnect unless you authorize them and are logged in. Lavawall® was not vulnerable to the ScreenConnect vulnerability because we install and uninstall it right before it's used. In addition, we give the option of linking to Access.

Remote access is not enabled for read-only and audit situations.

Lavawall®'s designer holds a CISSP and CISA. In addition, we have external and internal security reviews.

Get In Touch

Have a quick question and don't want to talk? Send us a quick note with the form below and we'll reply within one business day.

NW Calgary:
(By Appointment Only)
ThreeShield Information Security Corporation
600 Crowfoot Crescent N.W., Suite 340
Calgary, Alberta
T3G 0B4
SE Calgary:
(By Appointment Only)
ThreeShield Information Security Corporation
105, 11500 - 29th St. SE
Calgary, Alberta
T2Z 3W9
Canada
Sales Hours:
9:00am to 5:00pm Mountain Time
Support Hours:
7:00am to 7:00pm Mountain Time
On-Call Support Hours:
24/7

Monitor the real security risks with Lavawall®