Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2010-5073
Disclosure Date: December 07, 2011 (last updated October 04, 2023)
The JavaScript implementation in Google Chrome 4 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method. NOTE: this may overlap CVE-2010-5070.
0
Attacker Value
Unknown
CVE-2010-5069
Disclosure Date: December 07, 2011 (last updated October 04, 2023)
The Cascading Style Sheets (CSS) implementation in Google Chrome 4 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document. NOTE: this may overlap CVE-2010-2264.
0
Attacker Value
Unknown
CVE-2010-1851
Disclosure Date: May 07, 2010 (last updated October 04, 2023)
Google Chrome, when the Invisible Hand extension is enabled, uses cookies during background HTTP requests in a possibly unexpected manner, which might allow remote web servers to identify specific persons and their product searches via HTTP request logging, related to a "cross-site data leakage" issue.
0
Attacker Value
Unknown
CVE-2010-1664
Disclosure Date: May 03, 2010 (last updated October 04, 2023)
Google Chrome before 4.1.249.1064 does not properly handle HTML5 media, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors.
0
Attacker Value
Unknown
CVE-2010-1663
Disclosure Date: May 03, 2010 (last updated October 04, 2023)
The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
0
Attacker Value
Unknown
CVE-2010-1665
Disclosure Date: May 03, 2010 (last updated October 04, 2023)
Google Chrome before 4.1.249.1064 does not properly handle fonts, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors.
0