Max CVSS | 9.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2011-1440 | 6.8 |
Use-after-free vulnerability in Google Chrome before 11.0.696.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the ruby element and Cascading Style Sheets (CSS) token sequences.
|
22-05-2020 - 18:24 | 03-05-2011 - 22:55 | |
CVE-2011-2351 | 6.8 |
Use-after-free vulnerability in Google Chrome before 12.0.742.112 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG use elements.
|
21-05-2020 - 20:33 | 29-06-2011 - 17:55 | |
CVE-2011-2818 | 6.8 |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to display box rendering.
|
21-05-2020 - 12:54 | 03-08-2011 - 00:55 | |
CVE-2011-2797 | 6.8 |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to resource caching.
|
21-05-2020 - 01:12 | 03-08-2011 - 00:55 | |
CVE-2011-2359 | 6.8 |
Google Chrome before 13.0.782.107 does not properly track line boxes during rendering, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
|
21-05-2020 - 00:59 | 03-08-2011 - 00:55 | |
CVE-2011-2805 | 6.8 |
Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy and conduct script injection attacks via unspecified vectors.
|
20-05-2020 - 15:40 | 03-08-2011 - 00:55 | |
CVE-2011-2799 | 6.8 |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to HTML range handling.
|
20-05-2020 - 15:26 | 03-08-2011 - 00:55 | |
CVE-2011-2800 | 4.3 |
Google Chrome before 13.0.782.107 allows remote attackers to obtain potentially sensitive information about client-side redirect targets via a crafted web site.
|
20-05-2020 - 15:23 | 03-08-2011 - 00:55 | |
CVE-2011-2790 | 6.8 |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving floating styles.
|
20-05-2020 - 01:49 | 03-08-2011 - 00:55 | |
CVE-2011-2792 | 6.8 |
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to float removal.
|
20-05-2020 - 01:49 | 03-08-2011 - 00:55 | |
CVE-2011-2819 | 6.8 |
Google Chrome before 13.0.782.107 allows remote attackers to bypass the Same Origin Policy via vectors related to handling of the base URI.
|
19-05-2020 - 16:52 | 03-08-2011 - 00:55 | |
CVE-2011-2788 | 6.8 |
Buffer overflow in the inspector serialization functionality in Google Chrome before 13.0.782.107 allows user-assisted remote attackers to have an unspecified impact via unknown vectors.
|
19-05-2020 - 15:25 | 03-08-2011 - 00:55 | |
CVE-2011-2827 | 7.5 |
Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to text searching.
|
19-05-2020 - 13:27 | 29-08-2011 - 15:55 | |
CVE-2011-2823 | 7.5 |
Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a line box.
|
19-05-2020 - 13:21 | 29-08-2011 - 15:55 | |
CVE-2011-3234 | 5.0 |
Google Chrome before 14.0.835.163 does not properly handle boxes, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
|
08-05-2020 - 19:29 | 19-09-2011 - 12:02 | |
CVE-2011-3238 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3241 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3239 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3237 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3236 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3233 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3235 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-3232 | 9.3 |
YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
|
19-09-2017 - 01:33 | 29-09-2011 - 00:55 | |
CVE-2011-2815 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2811 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2814 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2816 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2813 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2820 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2809 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2831 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2817 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:33 | 12-10-2011 - 18:55 | |
CVE-2011-2339 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:32 | 12-10-2011 - 18:55 | |
CVE-2011-2356 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:32 | 12-10-2011 - 18:55 | |
CVE-2011-2341 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:32 | 12-10-2011 - 18:55 | |
CVE-2011-2354 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:32 | 12-10-2011 - 18:55 | |
CVE-2011-2338 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:32 | 12-10-2011 - 18:55 | |
CVE-2011-2352 | 7.6 |
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability t
|
19-09-2017 - 01:32 | 12-10-2011 - 18:55 | |
CVE-2011-3243 | 4.3 |
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple iOS before 5 and Safari before 5.1.1, allows remote attackers to inject arbitrary web script or HTML via vectors involving inactive DOM windows.
|
29-08-2017 - 01:30 | 14-10-2011 - 10:55 | |
CVE-2011-3230 | 6.8 |
Apple Safari before 5.1.1 on Mac OS X does not enforce an intended policy for file: URLs, which allows remote attackers to execute arbitrary code via a crafted web site.
|
29-08-2017 - 01:30 | 14-10-2011 - 10:55 | |
CVE-2011-3229 | 6.8 |
Directory traversal vulnerability in Apple Safari before 5.1.1 allows remote attackers to execute arbitrary JavaScript code, in a Safari Extensions context, via a crafted safari-extension: URL.
|
29-08-2017 - 01:30 | 14-10-2011 - 10:55 | |
CVE-2011-3231 | 6.8 |
The SSL implementation in Apple Safari before 5.1.1 on Mac OS X before 10.7 accesses uninitialized memory during the processing of X.509 certificates, which allows remote web servers to execute arbitrary code via a crafted certificate.
|
29-08-2017 - 01:30 | 14-10-2011 - 10:55 | |
CVE-2011-3242 | 5.0 |
The Private Browsing feature in Apple Safari before 5.1.1 on Mac OS X does not properly recognize the Always value of the Block Cookies setting, which makes it easier for remote web servers to track users via a cookie.
|
29-08-2017 - 01:30 | 14-10-2011 - 10:55 |