CVE-2011-1814
Google Chrome before 12.0.742.91 attempts to read data from an uninitialized pointer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Date published :...
Google Chrome before 12.0.742.91 attempts to read data from an uninitialized pointer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Date published :...
Google Chrome before 12.0.742.91 does not properly implement the framework for extensions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to...
Google Chrome before 12.0.742.91 allows remote attackers to bypass intended access restrictions via vectors related to extensions. Date published : 2011-06-09 http://www.securityfocus.com/bid/48129 http://code.google.com/p/chromium/issues/detail?id=77026
Google Chrome before 12.0.742.91 does not properly handle a large number of form submissions, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. Date published : 2011-06-09 http://www.securityfocus.com/bid/48129...
The Cascading Style Sheets (CSS) implementation in Google Chrome before 12.0.742.91 does not properly restrict access to the visit history, which allows remote attackers to obtain sensitive information via unspecified vectors. Date published :...
Use-after-free vulnerability in the accessibility feature in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Date published : 2011-06-09 http://www.securityfocus.com/bid/48129...
Use-after-free vulnerability in Google Chrome before 12.0.742.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to incorrect integer calculations during float handling. Date published...
utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument. Date published : 2011-06-09 http://www.securityfocus.com/bid/47652 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624212
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie. Date published : 2011-06-09 http://www.securityfocus.com/bid/48124 http://www.securityfocus.com/archive/1/518274/100/0/threaded
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs parameter in a printer-url. Date published : 2011-06-09 http://www.securityfocus.com/bid/48124 http://www.securityfocus.com/archive/1/518275/100/0/threaded
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url. Date published : 2011-06-09 http://www.securityfocus.com/bid/48124 http://www.securityfocus.com/archive/1/518273/100/0/threaded
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url. Date published : 2011-06-09 http://www.securityfocus.com/bid/48124 http://www.securityfocus.com/archive/1/518272/100/0/threaded
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url. Date published : 2011-06-09 http://www.securityfocus.com/bid/48124 http://www.securityfocus.com/archive/1/518268/100/0/threaded
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url. Date published : 2011-06-09 http://www.securityfocus.com/bid/48124 http://www.securityfocus.com/archive/1/518271/100/0/threaded