Max CVSS | 7.5 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2012-5146 | 5.0 |
Google Chrome before 24.0.1312.52 allows remote attackers to bypass the Same Origin Policy via a malformed URL.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5150 | 7.5 |
Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving seek operations on video data.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5147 | 7.5 |
Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5152 | 5.0 |
Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving seek operations on video data.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5149 | 7.5 |
Integer overflow in the audio IPC layer in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5148 | 7.5 |
The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5154 | 7.5 |
Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5153 | 7.5 |
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to stack memory.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5145 | 7.5 |
Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG layout.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0836 | 6.8 |
Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via craf
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0835 | 5.0 |
Unspecified vulnerability in the Geolocation implementation in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0831 | 7.5 |
Directory traversal vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to have an unspecified impact by leveraging access to an extension process.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0833 | 5.0 |
Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to printing.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0837 | 7.5 |
Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0830 | 7.5 |
The IPC layer in Google Chrome before 24.0.1312.52 on Windows omits a NUL character required for termination of an unspecified data structure, which has unknown impact and attack vectors.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0832 | 7.5 |
Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2013-0834 | 5.0 |
Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving glyphs.
|
30-10-2018 - 16:27 | 15-01-2013 - 21:55 | |
CVE-2012-5157 | 4.3 |
Google Chrome before 24.0.1312.52 does not properly handle image data in PDF documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.
|
19-09-2017 - 01:35 | 15-01-2013 - 21:55 | |
CVE-2012-5151 | 6.8 |
Integer overflow in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code in a PDF document.
|
19-09-2017 - 01:35 | 15-01-2013 - 21:55 | |
CVE-2012-5156 | 6.8 |
Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving PDF fields.
|
19-09-2017 - 01:35 | 15-01-2013 - 21:55 | |
CVE-2013-0829 | 6.4 |
Google Chrome before 24.0.1312.52 does not properly maintain database metadata, which allows remote attackers to bypass intended file-access restrictions via unspecified vectors.
|
19-09-2017 - 01:35 | 15-01-2013 - 21:55 | |
CVE-2013-0828 | 6.8 |
The PDF functionality in Google Chrome before 24.0.1312.52 does not properly perform a cast of an unspecified variable during processing of the root of the structure tree, which allows remote attackers to cause a denial of service or possibly have un
|
19-09-2017 - 01:35 | 15-01-2013 - 21:55 | |
CVE-2013-0838 | 7.5 |
Google Chrome before 24.0.1312.52 on Linux uses weak permissions for shared memory segments, which has unspecified impact and attack vectors.
|
07-02-2013 - 05:03 | 15-01-2013 - 21:55 | |
CVE-2012-5155 | 5.0 |
Google Chrome before 24.0.1312.52 on Mac OS X does not use an appropriate sandboxing approach for worker processes, which makes it easier for remote attackers to bypass intended access restrictions via unspecified vectors.
|
16-01-2013 - 05:00 | 15-01-2013 - 21:55 |