Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google chrome 3.0.195.33 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-0657
Google Chrome prior to 4.0.249.78 on Windows does not perform the expected encoding, escaping, and quoting for the URL in the --app argument in a desktop shortcut, which allows user-assisted remote malicious users to execute arbitrary programs or obtain sensitive information by t...
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
10
CVSSv2
CVE-2010-1233
Multiple integer overflows in Google Chrome prior to 4.1.249.1036 allow remote malicious users to have an unspecified impact via vectors involving WebKit JavaScript objects.
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
10
CVSSv2
CVE-2010-0646
Multiple integer signedness errors in factory.cc in Google V8 before r3560, as used in Google Chrome prior to 4.0.249.89, allow remote malicious users to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
9.3
CVSSv2
CVE-2010-0647
WebKit before r53525, as used in Google Chrome prior to 4.0.249.89, allows remote malicious users to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
4.3
CVSSv2
CVE-2010-0656
WebKit before r51295, as used in Google Chrome prior to 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows malicious users to obtain sensitive information or possibly have unspecified oth...
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
9.3
CVSSv2
CVE-2010-0658
Multiple integer overflows in Skia, as used in Google Chrome prior to 4.0.249.78, allow remote malicious users to execute arbitrary code in the Chrome sandbox or cause a denial of service (memory corruption and application crash) via vectors involving CANVAS elements.
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
9.3
CVSSv2
CVE-2010-0659
The image decoder in WebKit before r52833, as used in Google Chrome prior to 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote malicious users to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large si...
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
6.8
CVSSv2
CVE-2010-0661
WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome prior to 4.0.249.78, allows remote malicious users to bypass the Same Origin Policy via vectors involving the window.open method.
Apple Webkit 52400
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
9.3
CVSSv2
CVE-2010-0655
Use-after-free vulnerability in Google Chrome prior to 4.0.249.78 allows user-assisted remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving the display of a blocked popup window during navigation to a dif...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
1 EDB exploit
4.3
CVSSv2
CVE-2010-0643
Google Chrome prior to 4.0.249.89 attempts to make direct connections to web sites when all configured proxy servers are unavailable, which allows remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging, as dem...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-21317
CVE-2025-23940
buffer overflow
CVE-2025-21335
CVE-2025-23860
CVE-2024-57704
SSTI
wireless
CVE-2019-3309
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »