Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google chrome 2.0.172 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2009-3264
The getSVGDocument method in Google Chrome prior to 3.0.195.21 omits an unspecified "access check," which allows remote web servers to bypass the Same Origin Policy and conduct cross-site scripting attacks via unknown vectors, related to a user's visit to a differe...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
9.3
CVSSv2
CVE-2010-0657
Google Chrome prior to 4.0.249.78 on Windows does not perform the expected encoding, escaping, and quoting for the URL in the --app argument in a desktop shortcut, which allows user-assisted remote malicious users to execute arbitrary programs or obtain sensitive information by t...
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
10
CVSSv2
CVE-2010-1233
Multiple integer overflows in Google Chrome prior to 4.1.249.1036 allow remote malicious users to have an unspecified impact via vectors involving WebKit JavaScript objects.
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Google Chrome 1.0.154.36
10
CVSSv2
CVE-2010-0646
Multiple integer signedness errors in factory.cc in Google V8 before r3560, as used in Google Chrome prior to 4.0.249.89, allow remote malicious users to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
4.3
CVSSv2
CVE-2010-0656
WebKit before r51295, as used in Google Chrome prior to 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows malicious users to obtain sensitive information or possibly have unspecified oth...
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
9.3
CVSSv2
CVE-2010-0658
Multiple integer overflows in Skia, as used in Google Chrome prior to 4.0.249.78, allow remote malicious users to execute arbitrary code in the Chrome sandbox or cause a denial of service (memory corruption and application crash) via vectors involving CANVAS elements.
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
9.3
CVSSv2
CVE-2010-0659
The image decoder in WebKit before r52833, as used in Google Chrome prior to 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote malicious users to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large si...
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
6.8
CVSSv2
CVE-2010-0661
WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome prior to 4.0.249.78, allows remote malicious users to bypass the Same Origin Policy via vectors involving the window.open method.
Apple Webkit 52400
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
9.3
CVSSv2
CVE-2010-0647
WebKit before r53525, as used in Google Chrome prior to 4.0.249.89, allows remote malicious users to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
4.3
CVSSv2
CVE-2010-0556
browser/login/login_prompt.cc in Google Chrome prior to 4.0.249.89 populates an authentication dialog with credentials that were stored by Password Manager for a different web site, which allows user-assisted remote HTTP servers to obtain sensitive information via a URL that requ...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-23629
CVE-2024-52331
CVE-2025-0693
precious metals charts and widgets for wordpress
neofix
simple downloads list
CVE-2025-23544
CVE-2025-21298
client side
memory leak
CVE-2019-5418
XSS
deebot x5 pro plus
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »