Filtered by vendor Google
Subscriptions
Filtered by product Chrome
Subscriptions
Total
3579 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2013-2873 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a 404 HTTP status code during the loading of resources. | ||||
CVE-2013-2872 | 2 Apple, Google | 2 Mac Os X, Chrome | 2024-11-21 | N/A |
Google Chrome before 28.0.1500.71 on Mac OS X does not ensure a sufficient source of entropy for renderer processes, which might make it easier for remote attackers to defeat cryptographic protection mechanisms in third-party components via unspecified vectors. | ||||
CVE-2013-2871 | 1 Google | 1 Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input. | ||||
CVE-2013-2870 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request. | ||||
CVE-2013-2869 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted JPEG2000 image. | ||||
CVE-2013-2868 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
common/extensions/sync_helper.cc in Google Chrome before 28.0.1500.71 proceeds with sync operations for NPAPI extensions without checking for a certain plugin permission setting, which might allow remote attackers to trigger unwanted extension changes via unspecified vectors. | ||||
CVE-2013-2867 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Google Chrome before 28.0.1500.71 does not properly prevent pop-under windows, which allows remote attackers to have an unspecified impact via a crafted web site. | ||||
CVE-2013-2866 | 1 Google | 2 Chrome, Chrome Os | 2024-11-21 | N/A |
The Flash plug-in in Google Chrome before 27.0.1453.116, as used on Google Chrome OS before 27.0.1453.116 and separately, does not properly determine whether a user wishes to permit camera or microphone access by a Flash application, which allows remote attackers to obtain sensitive information from a machine's physical environment via a clickjacking attack, as demonstrated by an attack using a crafted Cascading Style Sheets (CSS) opacity property. | ||||
CVE-2013-2865 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.110 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | ||||
CVE-2013-2864 | 1 Google | 1 Chrome | 2024-11-21 | N/A |
The PDF functionality in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via unknown vectors. | ||||
CVE-2013-2863 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Google Chrome before 27.0.1453.110 does not properly handle SSL sockets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | ||||
CVE-2013-2862 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Skia, as used in Google Chrome before 27.0.1453.110, does not properly handle GPU acceleration, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | ||||
CVE-2013-2861 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in the SVG implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | ||||
CVE-2013-2860 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving access to a database API by a worker process. | ||||
CVE-2013-2859 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Google Chrome before 27.0.1453.110 allows remote attackers to bypass the Same Origin Policy and trigger namespace pollution via unspecified vectors. | ||||
CVE-2013-2858 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in the HTML5 Audio implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | ||||
CVE-2013-2857 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of images. | ||||
CVE-2013-2856 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input. | ||||
CVE-2013-2855 | 2 Debian, Google | 2 Debian Linux, Chrome | 2024-11-21 | N/A |
The Developer Tools API in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | ||||
CVE-2013-2854 | 2 Google, Microsoft | 2 Chrome, Windows | 2024-11-21 | N/A |
Google Chrome before 27.0.1453.110 on Windows provides an incorrect handle to a renderer process in unspecified circumstances, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors. |