ID CVE-2010-1773
Summary Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit before r59950, as used in Google Chrome before 5.0.375.70, allows remote attackers to obtain sensitive information, cause a denial of service (memory corruption and application crash), or possibly execute arbitrary code via vectors related to list markers for HTML lists, aka rdar problem 8009118.
References
Vulnerable Configurations
  • Google Chrome 5.0.375.53
    cpe:2.3:a:google:chrome:5.0.375.53
  • Google Chrome 5.0.375.52
    cpe:2.3:a:google:chrome:5.0.375.52
  • cpe:2.3:a:google:chrome:5.0.375.51
  • cpe:2.3:a:google:chrome:5.0.375.50
  • cpe:2.3:a:google:chrome:5.0.375.49
  • Google Chrome 5.0.375.48
    cpe:2.3:a:google:chrome:5.0.375.48
  • cpe:2.3:a:google:chrome:5.0.375.47
  • Google Chrome 5.0.375.46
    cpe:2.3:a:google:chrome:5.0.375.46
  • cpe:2.3:a:google:chrome:5.0.375.45
  • Google Chrome 5.0.375.44
    cpe:2.3:a:google:chrome:5.0.375.44
  • Google Chrome 5.0.375.43
    cpe:2.3:a:google:chrome:5.0.375.43
  • Google Chrome 5.0.375.42
    cpe:2.3:a:google:chrome:5.0.375.42
  • Google Chrome 5.0.375.41
    cpe:2.3:a:google:chrome:5.0.375.41
  • cpe:2.3:a:google:chrome:5.0.375.40
  • Google Chrome 5.0.375.38
    cpe:2.3:a:google:chrome:5.0.375.38
  • Google Chrome 5.0.375.39
    cpe:2.3:a:google:chrome:5.0.375.39
  • Google Chrome 5.0.375.32
    cpe:2.3:a:google:chrome:5.0.375.32
  • Google Chrome 5.0.375.33
    cpe:2.3:a:google:chrome:5.0.375.33
  • Google Chrome 5.0.375.30
    cpe:2.3:a:google:chrome:5.0.375.30
  • Google Chrome 5.0.375.31
    cpe:2.3:a:google:chrome:5.0.375.31
  • Google Chrome 5.0.375.36
    cpe:2.3:a:google:chrome:5.0.375.36
  • cpe:2.3:a:google:chrome:5.0.375.37
  • cpe:2.3:a:google:chrome:5.0.375.34
  • Google Chrome 5.0.375.35
    cpe:2.3:a:google:chrome:5.0.375.35
  • Google Chrome 5.0.375.3
    cpe:2.3:a:google:chrome:5.0.375.3
  • cpe:2.3:a:google:chrome:5.0.375.8
  • cpe:2.3:a:google:chrome:5.0.375.7
  • cpe:2.3:a:google:chrome:5.0.375.6
  • Google Chrome 5.0.375.5
    cpe:2.3:a:google:chrome:5.0.375.5
  • Google Chrome 5.0.375.12
    cpe:2.3:a:google:chrome:5.0.375.12
  • cpe:2.3:a:google:chrome:5.0.375.11
  • cpe:2.3:a:google:chrome:5.0.375.10
  • cpe:2.3:a:google:chrome:5.0.375.9
  • Google Chrome 5.0.375.16
    cpe:2.3:a:google:chrome:5.0.375.16
  • Google Chrome 5.0.375.15
    cpe:2.3:a:google:chrome:5.0.375.15
  • Google Chrome 5.0.375.14
    cpe:2.3:a:google:chrome:5.0.375.14
  • Google Chrome 5.0.375.13
    cpe:2.3:a:google:chrome:5.0.375.13
  • Google Chrome 5.0.375.20
    cpe:2.3:a:google:chrome:5.0.375.20
  • Google Chrome 5.0.375.19
    cpe:2.3:a:google:chrome:5.0.375.19
  • cpe:2.3:a:google:chrome:5.0.375.18
  • cpe:2.3:a:google:chrome:5.0.375.17
  • cpe:2.3:a:google:chrome:5.0.375.23
  • cpe:2.3:a:google:chrome:5.0.375.25
  • Google Chrome 5.0.375.21
    cpe:2.3:a:google:chrome:5.0.375.21
  • Google Chrome 5.0.375.22
    cpe:2.3:a:google:chrome:5.0.375.22
  • Google Chrome 5.0.375.28
    cpe:2.3:a:google:chrome:5.0.375.28
  • cpe:2.3:a:google:chrome:5.0.375.29
  • Google Chrome 5.0.375.26
    cpe:2.3:a:google:chrome:5.0.375.26
  • Google Chrome 5.0.375.27
    cpe:2.3:a:google:chrome:5.0.375.27
  • cpe:2.3:a:google:chrome:5.0.375.0
  • cpe:2.3:a:google:chrome:5.0.375.1
  • cpe:2.3:a:google:chrome:5.0.375.2
  • Google Chrome 5.0.375.4
    cpe:2.3:a:google:chrome:5.0.375.4
  • Google Chrome 5.0.374.0
    cpe:2.3:a:google:chrome:5.0.374.0
  • Google Chrome 5.0.373.0
    cpe:2.3:a:google:chrome:5.0.373.0
  • Google Chrome 5.0.307.5
    cpe:2.3:a:google:chrome:5.0.307.5
  • cpe:2.3:a:google:chrome:5.0.307.4
  • Google Chrome 5.0.307.7
    cpe:2.3:a:google:chrome:5.0.307.7
  • Google Chrome 5.0.307.6
    cpe:2.3:a:google:chrome:5.0.307.6
  • Google Chrome 5.0.307.9
    cpe:2.3:a:google:chrome:5.0.307.9
  • Google Chrome 5.0.307.8
    cpe:2.3:a:google:chrome:5.0.307.8
  • cpe:2.3:a:google:chrome:5.0.309.0
  • cpe:2.3:a:google:chrome:5.0.308.0
  • cpe:2.3:a:google:chrome:5.0.306.1
  • cpe:2.3:a:google:chrome:5.0.306.0
  • Google Chrome 5.0.307.10
    cpe:2.3:a:google:chrome:5.0.307.10
  • Google Chrome 5.0.307.1
    cpe:2.3:a:google:chrome:5.0.307.1
  • Google Chrome 5.0.307.3
    cpe:2.3:a:google:chrome:5.0.307.3
  • Google Chrome 5.0.307.11
    cpe:2.3:a:google:chrome:5.0.307.11
  • cpe:2.3:a:google:chrome:5.0.356.0
  • cpe:2.3:a:google:chrome:5.0.355.0
  • cpe:2.3:a:google:chrome:5.0.356.2
  • Google Chrome 5.0.356.1
    cpe:2.3:a:google:chrome:5.0.356.1
  • Google Chrome 5.0.353.0
    cpe:2.3:a:google:chrome:5.0.353.0
  • cpe:2.3:a:google:chrome:5.0.351.0
  • Google Chrome 5.0.354.1
    cpe:2.3:a:google:chrome:5.0.354.1
  • cpe:2.3:a:google:chrome:5.0.354.0
  • cpe:2.3:a:google:chrome:5.0.349.0
  • Google Chrome 5.0.348.0
    cpe:2.3:a:google:chrome:5.0.348.0
  • cpe:2.3:a:google:chrome:5.0.350.1
  • Google Chrome 5.0.350.0
    cpe:2.3:a:google:chrome:5.0.350.0
  • cpe:2.3:a:google:chrome:5.0.345.0
  • cpe:2.3:a:google:chrome:5.0.344.0
  • cpe:2.3:a:google:chrome:5.0.347.0
  • Google Chrome 5.0.346.0
    cpe:2.3:a:google:chrome:5.0.346.0
  • Google Chrome 5.0.342.7
    cpe:2.3:a:google:chrome:5.0.342.7
  • Google Chrome 5.0.342.8
    cpe:2.3:a:google:chrome:5.0.342.8
  • cpe:2.3:a:google:chrome:5.0.342.9
  • cpe:2.3:a:google:chrome:5.0.343.0
  • Google Chrome 5.0.342.3
    cpe:2.3:a:google:chrome:5.0.342.3
  • Google Chrome 5.0.342.4
    cpe:2.3:a:google:chrome:5.0.342.4
  • Google Chrome 5.0.342.5
    cpe:2.3:a:google:chrome:5.0.342.5
  • Google Chrome 5.0.342.6
    cpe:2.3:a:google:chrome:5.0.342.6
  • cpe:2.3:a:google:chrome:5.0.341.0
  • Google Chrome 5.0.342.0
    cpe:2.3:a:google:chrome:5.0.342.0
  • Google Chrome 5.0.342.1
    cpe:2.3:a:google:chrome:5.0.342.1
  • cpe:2.3:a:google:chrome:5.0.342.2
  • cpe:2.3:a:google:chrome:5.0.337.0
  • Google Chrome 5.0.338.0
    cpe:2.3:a:google:chrome:5.0.338.0
  • cpe:2.3:a:google:chrome:5.0.339.0
  • Google Chrome 5.0.340.0
    cpe:2.3:a:google:chrome:5.0.340.0
  • Google Chrome 5.0.336.0
    cpe:2.3:a:google:chrome:5.0.336.0
  • Google Chrome 5.0.335.4
    cpe:2.3:a:google:chrome:5.0.335.4
  • cpe:2.3:a:google:chrome:5.0.335.3
  • cpe:2.3:a:google:chrome:5.0.335.2
  • cpe:2.3:a:google:chrome:5.0.335.1
  • Google Chrome 5.0.335.0
    cpe:2.3:a:google:chrome:5.0.335.0
  • Google Chrome 5.0.334.0
    cpe:2.3:a:google:chrome:5.0.334.0
  • Google Chrome 5.0.333.0
    cpe:2.3:a:google:chrome:5.0.333.0
  • Google Chrome 5.0.332.0
    cpe:2.3:a:google:chrome:5.0.332.0
  • Google Chrome 5.0.330.0
    cpe:2.3:a:google:chrome:5.0.330.0
  • Google Chrome 5.0.329.0
    cpe:2.3:a:google:chrome:5.0.329.0
  • cpe:2.3:a:google:chrome:5.0.342.7:beta:mac
    cpe:2.3:a:google:chrome:5.0.342.7:beta:mac
  • cpe:2.3:a:google:chrome:5.0.328.0
  • cpe:2.3:a:google:chrome:5.0.342.8:beta:windows
    cpe:2.3:a:google:chrome:5.0.342.8:beta:windows
  • Google Chrome 5.0.327.0
    cpe:2.3:a:google:chrome:5.0.327.0
  • cpe:2.3:a:google:chrome:5.0.326.0
  • Google Chrome 5.0.325.0
    cpe:2.3:a:google:chrome:5.0.325.0
  • cpe:2.3:a:google:chrome:5.0.324.0
  • Google Chrome 5.0.322.2
    cpe:2.3:a:google:chrome:5.0.322.2
  • cpe:2.3:a:google:chrome:5.0.323.0
  • cpe:2.3:a:google:chrome:5.0.322.0
  • cpe:2.3:a:google:chrome:5.0.322.1
  • Google Chrome 5.0.320.0
    cpe:2.3:a:google:chrome:5.0.320.0
  • Google Chrome 5.0.321.0
    cpe:2.3:a:google:chrome:5.0.321.0
  • Google Chrome 5.0.318.0
    cpe:2.3:a:google:chrome:5.0.318.0
  • Google Chrome 5.0.319.0
    cpe:2.3:a:google:chrome:5.0.319.0
  • cpe:2.3:a:google:chrome:5.0.317.1
  • Google Chrome 5.0.317.2
    cpe:2.3:a:google:chrome:5.0.317.2
  • cpe:2.3:a:google:chrome:5.0.316.0
  • cpe:2.3:a:google:chrome:5.0.317.0
  • Google Chrome 5.0.314.1
    cpe:2.3:a:google:chrome:5.0.314.1
  • cpe:2.3:a:google:chrome:5.0.315.0
  • cpe:2.3:a:google:chrome:5.0.313.0
  • cpe:2.3:a:google:chrome:5.0.314.0
  • cpe:2.3:a:google:chrome:5.0.358.0
  • Google Chrome 5.0.357.0
    cpe:2.3:a:google:chrome:5.0.357.0
  • cpe:2.3:a:google:chrome:5.0.360.0
  • cpe:2.3:a:google:chrome:5.0.359.0
  • Google Chrome 5.0.360.4
    cpe:2.3:a:google:chrome:5.0.360.4
  • cpe:2.3:a:google:chrome:5.0.360.3
  • Google Chrome 5.0.361.0
    cpe:2.3:a:google:chrome:5.0.361.0
  • Google Chrome 5.0.360.5
    cpe:2.3:a:google:chrome:5.0.360.5
  • cpe:2.3:a:google:chrome:5.0.363.0
  • Google Chrome 5.0.362.0
    cpe:2.3:a:google:chrome:5.0.362.0
  • Google Chrome 5.0.365.0
    cpe:2.3:a:google:chrome:5.0.365.0
  • Google Chrome 5.0.364.0
    cpe:2.3:a:google:chrome:5.0.364.0
  • cpe:2.3:a:google:chrome:5.0.366.1
  • cpe:2.3:a:google:chrome:5.0.366.0
  • Google Chrome 5.0.366.3
    cpe:2.3:a:google:chrome:5.0.366.3
  • cpe:2.3:a:google:chrome:5.0.366.2
  • cpe:2.3:a:google:chrome:5.0.366.4
  • cpe:2.3:a:google:chrome:5.0.367.0
  • Google Chrome 5.0.368.0
    cpe:2.3:a:google:chrome:5.0.368.0
  • Google Chrome 5.0.369.0
    cpe:2.3:a:google:chrome:5.0.369.0
  • cpe:2.3:a:google:chrome:4.1.249.1056
  • Google Chrome 4.1.249.1055
    cpe:2.3:a:google:chrome:4.1.249.1055
  • Google Chrome 4.1.249.1058
    cpe:2.3:a:google:chrome:4.1.249.1058
  • Google Chrome 4.1.249.1057
    cpe:2.3:a:google:chrome:4.1.249.1057
  • Google Chrome 4.1.249.1052
    cpe:2.3:a:google:chrome:4.1.249.1052
  • Google Chrome 4.1.249.1051
    cpe:2.3:a:google:chrome:4.1.249.1051
  • Google Chrome 4.1.249.1054
    cpe:2.3:a:google:chrome:4.1.249.1054
  • Google Chrome 4.1.249.1053
    cpe:2.3:a:google:chrome:4.1.249.1053
  • cpe:2.3:a:google:chrome:4.1.249.1044
  • Google Chrome 4.1.249.1064
    cpe:2.3:a:google:chrome:4.1.249.1064
  • Google Chrome 4.1.249.1043
    cpe:2.3:a:google:chrome:4.1.249.1043
  • cpe:2.3:a:google:chrome:4.1.249.1063
  • Google Chrome 4.1.249.1060
    cpe:2.3:a:google:chrome:4.1.249.1060
  • cpe:2.3:a:google:chrome:4.1.249.1059
  • cpe:2.3:a:google:chrome:4.1.249.1062
  • cpe:2.3:a:google:chrome:4.1.249.1061
  • cpe:2.3:a:google:chrome:4.1.249.1037
  • Google Chrome 4.1.249.1038
    cpe:2.3:a:google:chrome:4.1.249.1038
  • cpe:2.3:a:google:chrome:4.1.249.1039
  • Google Chrome 4.1.249.1040
    cpe:2.3:a:google:chrome:4.1.249.1040
  • cpe:2.3:a:google:chrome:4.1.249.1041
  • cpe:2.3:a:google:chrome:4.1.249.1047
  • cpe:2.3:a:google:chrome:4.1.249.1048
  • Google Chrome 4.1.249.1049
    cpe:2.3:a:google:chrome:4.1.249.1049
  • Google Chrome 4.1.249.1050
    cpe:2.3:a:google:chrome:4.1.249.1050
  • Google Chrome 4.1.249.1046
    cpe:2.3:a:google:chrome:4.1.249.1046
  • Google Chrome 4.1.249.1033
    cpe:2.3:a:google:chrome:4.1.249.1033
  • cpe:2.3:a:google:chrome:4.1.249.1034
  • cpe:2.3:a:google:chrome:4.1.249.1031
  • Google Chrome 4.1.249.1032
    cpe:2.3:a:google:chrome:4.1.249.1032
  • Google Chrome 4.1.249.1042
    cpe:2.3:a:google:chrome:4.1.249.1042
  • Google Chrome 4.1.249.1035
    cpe:2.3:a:google:chrome:4.1.249.1035
  • Google Chrome 4.1:beta
    cpe:2.3:a:google:chrome:4.1:beta
  • Google Chrome 4.1.249.1045
    cpe:2.3:a:google:chrome:4.1.249.1045
  • Google Chrome 4.1.249.1036
    cpe:2.3:a:google:chrome:4.1.249.1036
  • cpe:2.3:a:google:chrome:4.1.249.1012
  • cpe:2.3:a:google:chrome:4.1.249.1011
  • cpe:2.3:a:google:chrome:4.1.249.1014
  • cpe:2.3:a:google:chrome:4.1.249.1013
  • Google Chrome 4.1.249.1008
    cpe:2.3:a:google:chrome:4.1.249.1008
  • cpe:2.3:a:google:chrome:4.1.249.1007
  • cpe:2.3:a:google:chrome:4.1.249.1010
  • Google Chrome 4.1.249.1009
    cpe:2.3:a:google:chrome:4.1.249.1009
  • Google Chrome 4.1.249.1001
    cpe:2.3:a:google:chrome:4.1.249.1001
  • Google Chrome 4.1.249.0
    cpe:2.3:a:google:chrome:4.1.249.0
  • cpe:2.3:a:google:chrome:4.1.249.1006
  • cpe:2.3:a:google:chrome:4.1.249.1004
  • cpe:2.3:a:google:chrome:4.1.249.1027
  • Google Chrome 4.1.249.1028
    cpe:2.3:a:google:chrome:4.1.249.1028
  • cpe:2.3:a:google:chrome:4.1.249.1029
  • Google Chrome 4.1.249.1030
    cpe:2.3:a:google:chrome:4.1.249.1030
  • cpe:2.3:a:google:chrome:4.1.249.1023
  • Google Chrome 4.1.249.1024
    cpe:2.3:a:google:chrome:4.1.249.1024
  • Google Chrome 4.1.249.1025
    cpe:2.3:a:google:chrome:4.1.249.1025
  • cpe:2.3:a:google:chrome:4.1.249.1026
  • cpe:2.3:a:google:chrome:4.1.249.1019
  • Google Chrome 4.1.249.1020
    cpe:2.3:a:google:chrome:4.1.249.1020
  • Google Chrome 4.1.249.1021
    cpe:2.3:a:google:chrome:4.1.249.1021
  • Google Chrome 4.1.249.1022
    cpe:2.3:a:google:chrome:4.1.249.1022
  • cpe:2.3:a:google:chrome:4.1.249.1015
  • cpe:2.3:a:google:chrome:4.1.249.1016
  • Google Chrome 4.1.249.1017
    cpe:2.3:a:google:chrome:4.1.249.1017
  • Google Chrome 4.1.249.1018
    cpe:2.3:a:google:chrome:4.1.249.1018
  • Google Chrome 4.0.304.0
    cpe:2.3:a:google:chrome:4.0.304.0
  • Google Chrome 4.0.305.0
    cpe:2.3:a:google:chrome:4.0.305.0
  • cpe:2.3:a:google:chrome:4.0.249.78
  • Google Chrome 4.0.249.78:beta
    cpe:2.3:a:google:chrome:4.0.249.78:beta
  • Google Chrome 4.0.249.89
    cpe:2.3:a:google:chrome:4.0.249.89
  • Google Chrome 4.0.250.2
    cpe:2.3:a:google:chrome:4.0.250.2
  • Google Chrome 4.0.251.0
    cpe:2.3:a:google:chrome:4.0.251.0
  • cpe:2.3:a:google:chrome:4.0.252.0
  • Google Chrome 4.0.254.0
    cpe:2.3:a:google:chrome:4.0.254.0
  • cpe:2.3:a:google:chrome:4.0.249.80
  • Google Chrome 4.0.249.81
    cpe:2.3:a:google:chrome:4.0.249.81
  • Google Chrome 4.0.249.82
    cpe:2.3:a:google:chrome:4.0.249.82
  • cpe:2.3:a:google:chrome:4.0.250.0
  • Google Chrome 4.0.259.0
    cpe:2.3:a:google:chrome:4.0.259.0
  • cpe:2.3:a:google:chrome:4.0.260.0
  • Google Chrome 4.0.261.0
    cpe:2.3:a:google:chrome:4.0.261.0
  • Google Chrome 4.0.262.0
    cpe:2.3:a:google:chrome:4.0.262.0
  • cpe:2.3:a:google:chrome:4.0.255.0
  • Google Chrome 4.0.256.0
    cpe:2.3:a:google:chrome:4.0.256.0
  • cpe:2.3:a:google:chrome:4.0.257.0
  • Google Chrome 4.0.258.0
    cpe:2.3:a:google:chrome:4.0.258.0
  • Google Chrome 4.0.249.72
    cpe:2.3:a:google:chrome:4.0.249.72
  • cpe:2.3:a:google:chrome:4.0.249.79
  • cpe:2.3:a:google:chrome:4.0.249.77
  • Google Chrome 4.0.249.8
    cpe:2.3:a:google:chrome:4.0.249.8
  • cpe:2.3:a:google:chrome:4.0.249.9
  • Google Chrome 4.0.249.74
    cpe:2.3:a:google:chrome:4.0.249.74
  • Google Chrome 4.0.249.73
    cpe:2.3:a:google:chrome:4.0.249.73
  • cpe:2.3:a:google:chrome:4.0.249.76
  • cpe:2.3:a:google:chrome:4.0.249.75
  • Google Chrome 4.0.295.0
    cpe:2.3:a:google:chrome:4.0.295.0
  • cpe:2.3:a:google:chrome:4.0.296.0
  • Google Chrome 4.0.292.0
    cpe:2.3:a:google:chrome:4.0.292.0
  • cpe:2.3:a:google:chrome:4.0.294.0
  • Google Chrome 4.0.289.0
    cpe:2.3:a:google:chrome:4.0.289.0
  • Google Chrome 4.0.290.0
    cpe:2.3:a:google:chrome:4.0.290.0
  • Google Chrome 4.0.288.0
    cpe:2.3:a:google:chrome:4.0.288.0
  • cpe:2.3:a:google:chrome:4.0.288.1
  • Google Chrome 4.0.302.3
    cpe:2.3:a:google:chrome:4.0.302.3
  • cpe:2.3:a:google:chrome:4.0.303.0
  • Google Chrome 4.0.302.1
    cpe:2.3:a:google:chrome:4.0.302.1
  • cpe:2.3:a:google:chrome:4.0.302.2
  • cpe:2.3:a:google:chrome:4.0.301.0
  • cpe:2.3:a:google:chrome:4.0.302.0
  • Google Chrome 4.0.299.0
    cpe:2.3:a:google:chrome:4.0.299.0
  • cpe:2.3:a:google:chrome:4.0.300.0
  • Google Chrome 4.0.271.0
    cpe:2.3:a:google:chrome:4.0.271.0
  • cpe:2.3:a:google:chrome:4.0.269.0
  • Google Chrome 4.0.268.0
    cpe:2.3:a:google:chrome:4.0.268.0
  • Google Chrome 4.0.267.0
    cpe:2.3:a:google:chrome:4.0.267.0
  • cpe:2.3:a:google:chrome:4.0.266.0
  • cpe:2.3:a:google:chrome:4.0.265.0
  • cpe:2.3:a:google:chrome:4.0.264.0
  • cpe:2.3:a:google:chrome:4.0.263.0
  • Google Chrome 4.0.287.0
    cpe:2.3:a:google:chrome:4.0.287.0
  • Google Chrome 4.0.286.0
    cpe:2.3:a:google:chrome:4.0.286.0
  • cpe:2.3:a:google:chrome:4.0.278.0
  • cpe:2.3:a:google:chrome:4.0.277.0
  • cpe:2.3:a:google:chrome:4.0.276.0
  • Google Chrome 4.0.275.1
    cpe:2.3:a:google:chrome:4.0.275.1
  • Google Chrome 4.0.275.0
    cpe:2.3:a:google:chrome:4.0.275.0
  • Google Chrome 4.0.272.0
    cpe:2.3:a:google:chrome:4.0.272.0
  • Google Chrome 4.0.249.60
    cpe:2.3:a:google:chrome:4.0.249.60
  • Google Chrome 4.0.244.0
    cpe:2.3:a:google:chrome:4.0.244.0
  • Google Chrome 4.0.249.0
    cpe:2.3:a:google:chrome:4.0.249.0
  • cpe:2.3:a:google:chrome:4.0.243.0
  • cpe:2.3:a:google:chrome:4.0.242.0
  • Google Chrome 4.0.241.0
    cpe:2.3:a:google:chrome:4.0.241.0
  • Google Chrome 4.0.240.0
    cpe:2.3:a:google:chrome:4.0.240.0
  • cpe:2.3:a:google:chrome:4.0.239.0
  • Google Chrome 4.0.237.0
    cpe:2.3:a:google:chrome:4.0.237.0
  • cpe:2.3:a:google:chrome:4.0.237.1
  • cpe:2.3:a:google:chrome:4.0.236.0
  • cpe:2.3:a:google:chrome:4.0.235.0
  • cpe:2.3:a:google:chrome:4.0.229.1
  • cpe:2.3:a:google:chrome:4.0.224.0
  • Google Chrome 4.0.223.9
    cpe:2.3:a:google:chrome:4.0.223.9
  • Google Chrome 4.0.223.8
    cpe:2.3:a:google:chrome:4.0.223.8
  • Google Chrome 4.0.223.7
    cpe:2.3:a:google:chrome:4.0.223.7
  • cpe:2.3:a:google:chrome:4.0.223.5
  • cpe:2.3:a:google:chrome:4.0.223.4
  • Google Chrome 4.0.223.1
    cpe:2.3:a:google:chrome:4.0.223.1
  • Google Chrome 4.0.223.2
    cpe:2.3:a:google:chrome:4.0.223.2
  • Google Chrome 4.0.222.0
    cpe:2.3:a:google:chrome:4.0.222.0
  • Google Chrome 4.0.223.0
    cpe:2.3:a:google:chrome:4.0.223.0
  • Google Chrome 4.0.222.12
    cpe:2.3:a:google:chrome:4.0.222.12
  • Google Chrome 4.0.222.5
    cpe:2.3:a:google:chrome:4.0.222.5
  • cpe:2.3:a:google:chrome:4.0.221.8
  • cpe:2.3:a:google:chrome:4.0.222.1
  • Google Chrome 4.0.212.0
    cpe:2.3:a:google:chrome:4.0.212.0
  • Google Chrome 4.0.212.1
    cpe:2.3:a:google:chrome:4.0.212.1
  • Google Chrome 4.0.249.21
    cpe:2.3:a:google:chrome:4.0.249.21
  • Google Chrome 4.0.249.22
    cpe:2.3:a:google:chrome:4.0.249.22
  • cpe:2.3:a:google:chrome:4.0.249.23
  • cpe:2.3:a:google:chrome:4.0.249.24
  • Google Chrome 4.0.249.25
    cpe:2.3:a:google:chrome:4.0.249.25
  • cpe:2.3:a:google:chrome:4.0.249.26
  • Google Chrome 4.0.249.27
    cpe:2.3:a:google:chrome:4.0.249.27
  • Google Chrome 4.0.249.28
    cpe:2.3:a:google:chrome:4.0.249.28
  • cpe:2.3:a:google:chrome:4.0.249.29
  • Google Chrome 4.0.249.30
    cpe:2.3:a:google:chrome:4.0.249.30
  • Google Chrome 4.0.249.31
    cpe:2.3:a:google:chrome:4.0.249.31
  • Google Chrome 4.0.249.32
    cpe:2.3:a:google:chrome:4.0.249.32
  • Google Chrome 4.0.249.33
    cpe:2.3:a:google:chrome:4.0.249.33
  • cpe:2.3:a:google:chrome:4.0.249.34
  • Google Chrome 4.0.249.35
    cpe:2.3:a:google:chrome:4.0.249.35
  • Google Chrome 4.0.249.36
    cpe:2.3:a:google:chrome:4.0.249.36
  • Google Chrome 4.0.245.1
    cpe:2.3:a:google:chrome:4.0.245.1
  • cpe:2.3:a:google:chrome:4.0.245.0
  • cpe:2.3:a:google:chrome:4.0.247.0
  • Google Chrome 4.0.246.0
    cpe:2.3:a:google:chrome:4.0.246.0
  • Google Chrome 4.0.249.1
    cpe:2.3:a:google:chrome:4.0.249.1
  • cpe:2.3:a:google:chrome:4.0.248.0
  • cpe:2.3:a:google:chrome:4.0.249.11
  • Google Chrome 4.0.249.10
    cpe:2.3:a:google:chrome:4.0.249.10
  • Google Chrome 4.0.249.14
    cpe:2.3:a:google:chrome:4.0.249.14
  • cpe:2.3:a:google:chrome:4.0.249.12
  • Google Chrome 4.0.249.17
    cpe:2.3:a:google:chrome:4.0.249.17
  • cpe:2.3:a:google:chrome:4.0.249.16
  • Google Chrome 4.0.249.19
    cpe:2.3:a:google:chrome:4.0.249.19
  • Google Chrome 4.0.249.18
    cpe:2.3:a:google:chrome:4.0.249.18
  • cpe:2.3:a:google:chrome:4.0.249.20
  • Google Chrome 4.0.249.2
    cpe:2.3:a:google:chrome:4.0.249.2
  • cpe:2.3:a:google:chrome:4.0.249.52
  • cpe:2.3:a:google:chrome:4.0.249.53
  • Google Chrome 4.0.249.50
    cpe:2.3:a:google:chrome:4.0.249.50
  • cpe:2.3:a:google:chrome:4.0.249.51
  • cpe:2.3:a:google:chrome:4.0.249.56
  • cpe:2.3:a:google:chrome:4.0.249.57
  • Google Chrome 4.0.249.54
    cpe:2.3:a:google:chrome:4.0.249.54
  • Google Chrome 4.0.249.55
    cpe:2.3:a:google:chrome:4.0.249.55
  • Google Chrome 4.0.249.6
    cpe:2.3:a:google:chrome:4.0.249.6
  • cpe:2.3:a:google:chrome:4.0.249.61
  • Google Chrome 4.0.249.58
    cpe:2.3:a:google:chrome:4.0.249.58
  • Google Chrome 4.0.249.59
    cpe:2.3:a:google:chrome:4.0.249.59
  • cpe:2.3:a:google:chrome:4.0.249.64
  • cpe:2.3:a:google:chrome:4.0.249.65
  • cpe:2.3:a:google:chrome:4.0.249.62
  • cpe:2.3:a:google:chrome:4.0.249.63
  • Google Chrome 4.0.249.3
    cpe:2.3:a:google:chrome:4.0.249.3
  • Google Chrome 4.0.249.39
    cpe:2.3:a:google:chrome:4.0.249.39
  • Google Chrome 4.0.249.38
    cpe:2.3:a:google:chrome:4.0.249.38
  • Google Chrome 4.0.249.37
    cpe:2.3:a:google:chrome:4.0.249.37
  • cpe:2.3:a:google:chrome:4.0.249.42
  • Google Chrome 4.0.249.41
    cpe:2.3:a:google:chrome:4.0.249.41
  • cpe:2.3:a:google:chrome:4.0.249.40
  • cpe:2.3:a:google:chrome:4.0.249.4
  • cpe:2.3:a:google:chrome:4.0.249.46
  • cpe:2.3:a:google:chrome:4.0.249.45
  • cpe:2.3:a:google:chrome:4.0.249.44
  • Google Chrome 4.0.249.43
    cpe:2.3:a:google:chrome:4.0.249.43
  • cpe:2.3:a:google:chrome:4.0.249.5
  • cpe:2.3:a:google:chrome:4.0.249.49
  • cpe:2.3:a:google:chrome:4.0.249.48
  • Google Chrome 4.0.249.47
    cpe:2.3:a:google:chrome:4.0.249.47
  • Google Chrome 4.0.249.70
    cpe:2.3:a:google:chrome:4.0.249.70
  • Google Chrome 4.0.249.7
    cpe:2.3:a:google:chrome:4.0.249.7
  • cpe:2.3:a:google:chrome:4.0.249.71
  • cpe:2.3:a:google:chrome:4.0.249.67
  • Google Chrome 4.0.249.66
    cpe:2.3:a:google:chrome:4.0.249.66
  • Google Chrome 4.0.249.69
    cpe:2.3:a:google:chrome:4.0.249.69
  • Google Chrome 4.0.249.68
    cpe:2.3:a:google:chrome:4.0.249.68
  • Google Chrome 3.0.195.38
    cpe:2.3:a:google:chrome:3.0.195.38
  • cpe:2.3:a:google:chrome:3.0.195.37
  • cpe:2.3:a:google:chrome:3.0.195.36
  • Google Chrome 3.0.195.33
    cpe:2.3:a:google:chrome:3.0.195.33
  • cpe:2.3:a:google:chrome:3.0.195.27
  • Google Chrome 3.0.195.25
    cpe:2.3:a:google:chrome:3.0.195.25
  • cpe:2.3:a:google:chrome:3.0.190.2
  • cpe:2.3:a:google:chrome:3.0.182.2
  • cpe:2.3:a:google:chrome:2.0.172.8
  • Google Chrome 2.0.172.38
    cpe:2.3:a:google:chrome:2.0.172.38
  • Google Chrome 2.0.172.37
    cpe:2.3:a:google:chrome:2.0.172.37
  • Google Chrome 2.0.172.33
    cpe:2.3:a:google:chrome:2.0.172.33
  • cpe:2.3:a:google:chrome:2.0.172.30
  • cpe:2.3:a:google:chrome:2.0.172.28
  • Google Chrome 2.0.172.27
    cpe:2.3:a:google:chrome:2.0.172.27
  • cpe:2.3:a:google:chrome:2.0.172.2
  • cpe:2.3:a:google:chrome:2.0.170.0
  • Google Chrome 2.0.169.1
    cpe:2.3:a:google:chrome:2.0.169.1
  • Google Chrome 2.0.169.0
    cpe:2.3:a:google:chrome:2.0.169.0
  • Google Chrome 1.0.154.65
    cpe:2.3:a:google:chrome:1.0.154.65
  • cpe:2.3:a:google:chrome:1.0.154.64
  • cpe:2.3:a:google:chrome:1.0.154.59
  • cpe:2.3:a:google:chrome:1.0.154.53
  • Google Chrome 5.0.375.54
    cpe:2.3:a:google:chrome:5.0.375.54
  • cpe:2.3:a:google:chrome:5.0.375.55
  • cpe:2.3:a:google:chrome:5.0.375.56
  • cpe:2.3:a:google:chrome:5.0.375.57
  • Google Chrome 5.0.375.58
    cpe:2.3:a:google:chrome:5.0.375.58
  • cpe:2.3:a:google:chrome:5.0.375.59
  • cpe:2.3:a:google:chrome:5.0.375.60
  • cpe:2.3:a:google:chrome:5.0.375.61
  • Google Chrome 5.0.375.62
    cpe:2.3:a:google:chrome:5.0.375.62
  • cpe:2.3:a:google:chrome:5.0.375.63
  • cpe:2.3:a:google:chrome:5.0.375.64
  • Google Chrome 5.0.375.65
    cpe:2.3:a:google:chrome:5.0.375.65
  • Google Chrome 5.0.375.66
    cpe:2.3:a:google:chrome:5.0.375.66
  • cpe:2.3:a:google:chrome:5.0.375.67
  • Google Chrome 5.0.375.68
    cpe:2.3:a:google:chrome:5.0.375.68
  • Google Chrome 5.0.375.69
    cpe:2.3:a:google:chrome:5.0.375.69
  • cpe:2.3:a:google:chrome:1.0.154.39
  • Google Chrome 1.0.154.48
    cpe:2.3:a:google:chrome:1.0.154.48
  • cpe:2.3:a:google:chrome:1.0.154.42
  • cpe:2.3:a:google:chrome:1.0.154.36
  • cpe:2.3:a:google:chrome:1.0.154.46
  • Google Chrome 1.0.154.52
    cpe:2.3:a:google:chrome:1.0.154.52
  • cpe:2.3:a:google:chrome:1.0.154.43
CVSS
Base: 9.3 (as of 27-09-2010 - 13:52)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-11020.NASL
    description This is an update to the latest stable bugfix qt release, including several security fixes related to qtwebkit. For details, see also: http://qt.nokia.com/about/news/nokia-releases-qt-4.6.3 http://qt.nokia.com/developer/changes/changes-4.6.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 47724
    published 2010-07-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=47724
    title Fedora 12 : qt-4.6.3-8.fc12 (2010-11020)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-14419.NASL
    description Update to 1.2.4 which fixes: CVE-2010-1780 CVE-2010-1782 CVE-2010-1784 CVE-2010-1785 CVE-2010-1786 CVE-2010-1787 CVE-2010-1788 CVE-2010-1790 CVE-2010-1792 CVE-2010-1793 CVE-2010-2648 Update to 1.2.3 which fixes: CVE-2010-1386 CVE-2010-1392 CVE-2010-1405 CVE-2010-1407 CVE-2010-1416 CVE-2010-1417 CVE-2010-1665 CVE-2010-1418 CVE-2010-1421 CVE-2010-1422 CVE-2010-1501 CVE-2010-1767 CVE-2010-1664 CVE-2010-1758 CVE-2010-1759 CVE-2010-1760 CVE-2010-1761 CVE-2010-1762 CVE-2010-1770 CVE-2010-1771 CVE-2010-1772 CVE-2010-1773 CVE-2010-1774 CVE-2010-2264 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 49295
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49295
    title Fedora 12 : webkitgtk-1.2.4-1.fc12 (2010-14419)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-11011.NASL
    description This is an update to the latest stable bugfix qt release, including several security fixes related to qtwebkit. For details see also: http://qt.nokia.com/about/news/nokia-releases-qt-4.6.3 http://qt.nokia.com/developer/changes/changes-4.6.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 47723
    published 2010-07-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=47723
    title Fedora 13 : qt-4.6.3-8.fc13 (2010-11011)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-14409.NASL
    description Update to 1.2.4 which fixes: CVE-2010-1780 CVE-2010-1782 CVE-2010-1784 CVE-2010-1785 CVE-2010-1786 CVE-2010-1787 CVE-2010-1788 CVE-2010-1790 CVE-2010-1792 CVE-2010-1793 CVE-2010-2648 Update to 1.2.3 which fixes: CVE-2010-1386 CVE-2010-1392 CVE-2010-1405 CVE-2010-1407 CVE-2010-1416 CVE-2010-1417 CVE-2010-1665 CVE-2010-1418 CVE-2010-1421 CVE-2010-1422 CVE-2010-1501 CVE-2010-1767 CVE-2010-1664 CVE-2010-1758 CVE-2010-1759 CVE-2010-1760 CVE-2010-1761 CVE-2010-1762 CVE-2010-1770 CVE-2010-1771 CVE-2010-1772 CVE-2010-1773 CVE-2010-1774 CVE-2010-2264 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 49246
    published 2010-09-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49246
    title Fedora 13 : webkitgtk-1.2.4-1.fc13 (2010-14409)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_LIBWEBKIT-110111.NASL
    description Various bugs in webkit have been fixed. The CVE id's are : CVE-2009-0945, CVE-2009-1681, CVE-2009-1684, CVE-2009-1685, CVE-2009-1686, CVE-2009-1687, CVE-2009-1688, CVE-2009-1689, CVE-2009-1691, CVE-2009-1690, CVE-2009-1692, CVE-2009-1693, CVE-2009-1694, CVE-2009-1695, CVE-2009-1696, CVE-2009-1697, CVE-2009-1698, CVE-2009-1699, CVE-2009-1700, CVE-2009-1701, CVE-2009-1702, CVE-2009-1703, CVE-2009-1709, CVE-2009-1710, CVE-2009-1711, CVE-2009-1712, CVE-2009-1713, CVE-2009-1714, CVE-2009-1715, CVE-2009-1718, CVE-2009-1724, CVE-2009-1725, CVE-2009-2195, CVE-2009-2199, CVE-2009-2200, CVE-2009-2419, CVE-2009-2797, CVE-2009-2816, CVE-2009-2841, CVE-2009-3272, CVE-2009-3384, CVE-2009-3933, CVE-2009-3934, CVE-2010-0046, CVE-2010-0047, CVE-2010-0048, CVE-2010-0049, CVE-2010-0050, CVE-2010-0052, CVE-2010-0053, CVE-2010-0054, CVE-2010-0315, CVE-2010-0647, CVE-2010-0051, CVE-2010-0650, CVE-2010-0651, CVE-2010-0656, CVE-2010-0659, CVE-2010-0661, CVE-2010-1029, CVE-2010-1126, CVE-2010-1233, CVE-2010-1236, CVE-2010-1386, CVE-2010-1387, CVE-2010-1388, CVE-2010-1389, CVE-2010-1390, CVE-2010-1391, CVE-2010-1392, CVE-2010-1393, CVE-2010-1394, CVE-2010-1395, CVE-2010-1396, CVE-2010-1397, CVE-2010-1398, CVE-2010-1399, CVE-2010-1400, CVE-2010-1401, CVE-2010-1402, CVE-2010-1403, CVE-2010-1404, CVE-2010-1405, CVE-2010-1406, CVE-2010-1407, CVE-2010-1408, CVE-2010-1409, CVE-2010-1410, CVE-2010-1412, CVE-2010-1413, CVE-2010-1414, CVE-2010-1415, CVE-2010-1416, CVE-2010-1417, CVE-2010-1418, CVE-2010-1419, CVE-2010-1421, CVE-2010-1422, CVE-2010-1729, CVE-2010-1749, CVE-2010-1757, CVE-2010-1758, CVE-2010-1759, CVE-2010-1760, CVE-2010-1761, CVE-2010-1762, CVE-2010-1763, CVE-2010-1764, CVE-2010-1766, CVE-2010-1767, CVE-2010-1769, CVE-2010-1770, CVE-2010-1771, CVE-2010-1772, CVE-2010-1773, CVE-2010-1774, CVE-2010-1780, CVE-2010-1781, CVE-2010-1782, CVE-2010-1783, CVE-2010-1784, CVE-2010-1785, CVE-2010-1786, CVE-2010-1787, CVE-2010-1788, CVE-2010-1789, CVE-2010-1790, CVE-2010-1791, CVE-2010-1792, CVE-2010-1793, CVE-2010-1807, CVE-2010-1812, CVE-2010-1813, CVE-2010-1814, CVE-2010-1815, CVE-2010-1822, CVE-2010-1823, CVE-2010-1824, CVE-2010-1825, CVE-2010-2264, CVE-2010-2295, CVE-2010-2297, CVE-2010-2300, CVE-2010-2301, CVE-2010-2302, CVE-2010-2441, CVE-2010-3116, CVE-2010-3257, CVE-2010-3259, CVE-2010-3312, CVE-2010-3803, CVE-2010-3804, CVE-2010-3805, CVE-2010-3808, CVE-2010-3809, CVE-2010-3810, CVE-2010-3811, CVE-2010-3812, CVE-2010-3813, CVE-2010-3816, CVE-2010-3817, CVE-2010-3818, CVE-2010-3819, CVE-2010-3820, CVE-2010-3821, CVE-2010-3822, CVE-2010-3823, CVE-2010-3824, CVE-2010-3826, CVE-2010-3829, CVE-2010-3900, CVE-2010-4040
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53764
    published 2011-05-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53764
    title openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-039.NASL
    description Multiple cross-site scripting, denial of service and arbitrary code execution security flaws were discovered in webkit. Please consult the CVE web links for further information. The updated packages have been upgraded to the latest version (1.2.7) to correct these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 52523
    published 2011-03-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52523
    title Mandriva Linux Security Advisory : webkit (MDVSA-2011:039)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_LIBWEBKIT-110104.NASL
    description Various bugs in webkit have been fixed. The CVE id's are : CVE-2009-0945, CVE-2009-1681, CVE-2009-1684, CVE-2009-1685, CVE-2009-1686, CVE-2009-1687, CVE-2009-1688, CVE-2009-1689, CVE-2009-1691, CVE-2009-1690, CVE-2009-1692, CVE-2009-1693, CVE-2009-1694, CVE-2009-1695, CVE-2009-1696, CVE-2009-1697, CVE-2009-1698, CVE-2009-1699, CVE-2009-1700, CVE-2009-1701, CVE-2009-1702, CVE-2009-1703, CVE-2009-1709, CVE-2009-1710, CVE-2009-1711, CVE-2009-1712, CVE-2009-1713, CVE-2009-1714, CVE-2009-1715, CVE-2009-1718, CVE-2009-1724, CVE-2009-1725, CVE-2009-2195, CVE-2009-2199, CVE-2009-2200, CVE-2009-2419, CVE-2009-2797, CVE-2009-2816, CVE-2009-2841, CVE-2009-3272, CVE-2009-3384, CVE-2009-3933, CVE-2009-3934, CVE-2010-0046, CVE-2010-0047, CVE-2010-0048, CVE-2010-0049, CVE-2010-0050, CVE-2010-0052, CVE-2010-0053, CVE-2010-0054, CVE-2010-0315, CVE-2010-0647, CVE-2010-0051, CVE-2010-0650, CVE-2010-0651, CVE-2010-0656, CVE-2010-0659, CVE-2010-0661, CVE-2010-1029, CVE-2010-1126, CVE-2010-1233, CVE-2010-1236, CVE-2010-1386, CVE-2010-1387, CVE-2010-1388, CVE-2010-1389, CVE-2010-1390, CVE-2010-1391, CVE-2010-1392, CVE-2010-1393, CVE-2010-1394, CVE-2010-1395, CVE-2010-1396, CVE-2010-1397, CVE-2010-1398, CVE-2010-1399, CVE-2010-1400, CVE-2010-1401, CVE-2010-1402, CVE-2010-1403, CVE-2010-1404, CVE-2010-1405, CVE-2010-1406, CVE-2010-1407, CVE-2010-1408, CVE-2010-1409, CVE-2010-1410, CVE-2010-1412, CVE-2010-1413, CVE-2010-1414, CVE-2010-1415, CVE-2010-1416, CVE-2010-1417, CVE-2010-1418, CVE-2010-1419, CVE-2010-1421, CVE-2010-1422, CVE-2010-1729, CVE-2010-1749, CVE-2010-1757, CVE-2010-1758, CVE-2010-1759, CVE-2010-1760, CVE-2010-1761, CVE-2010-1762, CVE-2010-1763, CVE-2010-1764, CVE-2010-1766, CVE-2010-1767, CVE-2010-1769, CVE-2010-1770, CVE-2010-1771, CVE-2010-1772, CVE-2010-1773, CVE-2010-1774, CVE-2010-1780, CVE-2010-1781, CVE-2010-1782, CVE-2010-1783, CVE-2010-1784, CVE-2010-1785, CVE-2010-1786, CVE-2010-1787, CVE-2010-1788, CVE-2010-1789, CVE-2010-1790, CVE-2010-1791, CVE-2010-1792, CVE-2010-1793, CVE-2010-1807, CVE-2010-1812, CVE-2010-1813, CVE-2010-1814, CVE-2010-1815, CVE-2010-1822, CVE-2010-1823, CVE-2010-1824, CVE-2010-1825, CVE-2010-2264, CVE-2010-2295, CVE-2010-2297, CVE-2010-2300, CVE-2010-2301, CVE-2010-2302, CVE-2010-2441, CVE-2010-3116, CVE-2010-3257, CVE-2010-3259, CVE-2010-3312, CVE-2010-3803, CVE-2010-3804, CVE-2010-3805, CVE-2010-3808, CVE-2010-3809, CVE-2010-3810, CVE-2010-3811, CVE-2010-3812, CVE-2010-3813, CVE-2010-3816, CVE-2010-3817, CVE-2010-3818, CVE-2010-3819, CVE-2010-3820, CVE-2010-3821, CVE-2010-3822, CVE-2010-3823, CVE-2010-3824, CVE-2010-3826, CVE-2010-3829, CVE-2010-3900, CVE-2010-4040
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75629
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75629
    title openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)
  • NASL family Windows
    NASL id GOOGLE_CHROME_5_0_375_70.NASL
    description The version of Google Chrome installed on the remote host is earlier than 5.0.375.70. As such, it is reportedly affected by multiple vulnerabilities : - A cross-origin keystroke redirection vulnerability. (Issue #15766) - A cross-origin bypass in DOM methods. (Issue #39985) - A memory error exists in table layout. (Issue #42723) - It is possible to escape the sandbox in Linux. (Issue #43304) - A stale pointer exists in bitmap. (Issue #43307) - A memory corruption vulnerability exists in DOM node normalization. (Issue #43315) - A memory corruption vulnerability exists in text transforms. (Issue #43487) - A cross-site scripting vulnerability exists in the innerHTML property of textarea. (Issue #43902) - A memory corruption vulnerability exists in font handling. (Issue #44740) - Geolocation events fire after document deletion. (Issue #44868) - A memory corruption vulnerability exists in the rendering of list markers. (Issue #44955)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 46850
    published 2010-06-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46850
    title Google Chrome < 5.0.375.70 Multiple Vulnerabilities
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1006-1.NASL
    description A large number of security issues were discovered in the WebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Please consult the bug listed at the top of this advisory to get the exact list of CVE numbers fixed for each release. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 50046
    published 2010-10-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50046
    title Ubuntu 9.10 / 10.04 LTS / 10.10 : webkit vulnerabilities (USN-1006-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_19419B3B92BD11DFB1400015F2DB7BDE.NASL
    description Gustavo Noronha reports : Debian's Michael Gilbert has done a great job going through all CVEs released about WebKit, and including patches in the Debian package. 1.2.3 includes all of the commits from trunk to fix those, too.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 47751
    published 2010-07-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=47751
    title FreeBSD : webkit-gtk2 -- Multiple vulnerabilities (19419b3b-92bd-11df-b140-0015f2db7bde)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_LIBWEBKIT-100723.NASL
    description The libwebkit browser engine version 1.2.3 fixes several security relevant bugs (CVE-2010-1386, CVE-2010-1392, CVE-2010-1405, CVE-2010-1407, CVE-2010-1416, CVE-2010-1417, CVE-2010-1665, CVE-2010-1418, CVE-2010-1421, CVE-2010-1422, CVE-2010-1501, CVE-2010-1767, CVE-2010-1664, CVE-2010-1758, CVE-2010-1759, CVE-2010-1760, CVE-2010-1761, CVE-2010-1762, CVE-2010-1770, CVE-2010-1771, CVE-2010-1772, CVE-2010-1773, CVE-2010-1774)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75627
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75627
    title openSUSE Security Update : libwebkit (openSUSE-SU-2010:0458-1)
oval via4
accepted 2013-08-12T04:00:27.277-04:00
class vulnerability
contributors
  • name Preeti Subramanian
    organization SecPod Technologies
  • name Akihito Nakamura
    organization AIST
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
comment Google Chrome is installed
oval oval:org.mitre.oval:def:11914
description Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit before r59950, as used in Google Chrome before 5.0.375.70, allows remote attackers to obtain sensitive information, cause a denial of service (memory corruption and application crash), or possibly execute arbitrary code via vectors related to list markers for HTML lists, aka rdar problem 8009118.
family windows
id oval:org.mitre.oval:def:11830
status accepted
submitted 2010-08-26T11:57:22
title Vulnerability in toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70
version 55
refmap via4
bid 41575
confirm
fedora
  • FEDORA-2010-11011
  • FEDORA-2010-11020
mandriva MDVSA-2011:039
secunia
  • 40072
  • 40557
  • 41856
  • 43068
suse SUSE-SR:2011:002
ubuntu USN-1006-1
vupen
  • ADV-2010-1801
  • ADV-2010-2722
  • ADV-2011-0212
  • ADV-2011-0552
Last major update 18-07-2011 - 22:37
Published 24-09-2010 - 15:00
Last modified 18-09-2017 - 21:30
Back to Top