ID CVE-2011-3026
Summary Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
References
Vulnerable Configurations
  • cpe:2.3:a:google:chrome:0.1.38.1
  • Google Chrome 0.1.38.2
    cpe:2.3:a:google:chrome:0.1.38.2
  • Google Chrome 0.1.38.4
    cpe:2.3:a:google:chrome:0.1.38.4
  • Google Chrome 0.1.40.1
    cpe:2.3:a:google:chrome:0.1.40.1
  • cpe:2.3:a:google:chrome:0.1.42.2
  • Google Chrome 0.1.42.3
    cpe:2.3:a:google:chrome:0.1.42.3
  • cpe:2.3:a:google:chrome:0.2.149.27
  • cpe:2.3:a:google:chrome:0.2.149.29
  • Google Chrome 0.2.149.30
    cpe:2.3:a:google:chrome:0.2.149.30
  • cpe:2.3:a:google:chrome:0.2.152.1
  • cpe:2.3:a:google:chrome:0.2.153.1
  • Google Chrome 0.3.154.0
    cpe:2.3:a:google:chrome:0.3.154.0
  • cpe:2.3:a:google:chrome:0.3.154.3
  • Google Chrome 0.4.154.18
    cpe:2.3:a:google:chrome:0.4.154.18
  • cpe:2.3:a:google:chrome:0.4.154.22
  • cpe:2.3:a:google:chrome:0.4.154.31
  • cpe:2.3:a:google:chrome:0.4.154.33
  • cpe:2.3:a:google:chrome:1.0.154.36
  • Google Chrome 1.0.154.39
    cpe:2.3:a:google:chrome:1.0.154.39
  • cpe:2.3:a:google:chrome:1.0.154.42
  • cpe:2.3:a:google:chrome:1.0.154.43
  • Google Chrome 1.0.154.46
    cpe:2.3:a:google:chrome:1.0.154.46
  • cpe:2.3:a:google:chrome:1.0.154.48
  • cpe:2.3:a:google:chrome:1.0.154.52
  • Google Chrome 1.0.154.53
    cpe:2.3:a:google:chrome:1.0.154.53
  • cpe:2.3:a:google:chrome:1.0.154.59
  • cpe:2.3:a:google:chrome:1.0.154.64
  • cpe:2.3:a:google:chrome:1.0.154.65
  • Google Chrome 2.0.156.1
    cpe:2.3:a:google:chrome:2.0.156.1
  • cpe:2.3:a:google:chrome:2.0.157.0
  • Google Chrome 2.0.157.2
    cpe:2.3:a:google:chrome:2.0.157.2
  • Google Chrome 2.0.158.0
    cpe:2.3:a:google:chrome:2.0.158.0
  • Google Chrome 2.0.159.0
    cpe:2.3:a:google:chrome:2.0.159.0
  • Google Chrome 2.0.169.0
    cpe:2.3:a:google:chrome:2.0.169.0
  • cpe:2.3:a:google:chrome:2.0.169.1
  • Google Chrome 2.0.170.0
    cpe:2.3:a:google:chrome:2.0.170.0
  • cpe:2.3:a:google:chrome:2.0.172
  • Google Chrome 2.0.172.2
    cpe:2.3:a:google:chrome:2.0.172.2
  • Google Chrome 2.0.172.8
    cpe:2.3:a:google:chrome:2.0.172.8
  • Google Chrome 2.0.172.27
    cpe:2.3:a:google:chrome:2.0.172.27
  • cpe:2.3:a:google:chrome:2.0.172.28
  • Google Chrome 2.0.172.30
    cpe:2.3:a:google:chrome:2.0.172.30
  • cpe:2.3:a:google:chrome:2.0.172.31
  • cpe:2.3:a:google:chrome:2.0.172.33
  • Google Chrome 2.0.172.37
    cpe:2.3:a:google:chrome:2.0.172.37
  • cpe:2.3:a:google:chrome:2.0.172.38
  • cpe:2.3:a:google:chrome:3.0.182.2
  • Google Chrome 3.0.190.2
    cpe:2.3:a:google:chrome:3.0.190.2
  • cpe:2.3:a:google:chrome:3.0.193.2:beta
  • Google Chrome 3.0.195.2
    cpe:2.3:a:google:chrome:3.0.195.2
  • Google Chrome 3.0.195.21
    cpe:2.3:a:google:chrome:3.0.195.21
  • Google Chrome 3.0.195.24
    cpe:2.3:a:google:chrome:3.0.195.24
  • cpe:2.3:a:google:chrome:3.0.195.25
  • Google Chrome 3.0.195.27
    cpe:2.3:a:google:chrome:3.0.195.27
  • Google Chrome 3.0.195.32
    cpe:2.3:a:google:chrome:3.0.195.32
  • Google Chrome 3.0.195.33
    cpe:2.3:a:google:chrome:3.0.195.33
  • Google Chrome 3.0.195.36
    cpe:2.3:a:google:chrome:3.0.195.36
  • cpe:2.3:a:google:chrome:3.0.195.37
  • Google Chrome 3.0.195.38
    cpe:2.3:a:google:chrome:3.0.195.38
  • cpe:2.3:a:google:chrome:4.0.212.0
  • cpe:2.3:a:google:chrome:4.0.212.1
  • Google Chrome 4.0.221.8
    cpe:2.3:a:google:chrome:4.0.221.8
  • cpe:2.3:a:google:chrome:4.0.222.0
  • cpe:2.3:a:google:chrome:4.0.222.1
  • cpe:2.3:a:google:chrome:4.0.222.5
  • Google Chrome 4.0.222.12
    cpe:2.3:a:google:chrome:4.0.222.12
  • cpe:2.3:a:google:chrome:4.0.223.0
  • Google Chrome 4.0.223.1
    cpe:2.3:a:google:chrome:4.0.223.1
  • cpe:2.3:a:google:chrome:4.0.223.2
  • Google Chrome 4.0.223.4
    cpe:2.3:a:google:chrome:4.0.223.4
  • Google Chrome 4.0.223.5
    cpe:2.3:a:google:chrome:4.0.223.5
  • Google Chrome 4.0.223.7
    cpe:2.3:a:google:chrome:4.0.223.7
  • Google Chrome 4.0.223.8
    cpe:2.3:a:google:chrome:4.0.223.8
  • Google Chrome 4.0.223.9
    cpe:2.3:a:google:chrome:4.0.223.9
  • cpe:2.3:a:google:chrome:4.0.224.0
  • cpe:2.3:a:google:chrome:4.0.229.1
  • cpe:2.3:a:google:chrome:4.0.235.0
  • cpe:2.3:a:google:chrome:4.0.236.0
  • Google Chrome 4.0.237.0
    cpe:2.3:a:google:chrome:4.0.237.0
  • Google Chrome 4.0.237.1
    cpe:2.3:a:google:chrome:4.0.237.1
  • cpe:2.3:a:google:chrome:4.0.239.0
  • Google Chrome 4.0.240.0
    cpe:2.3:a:google:chrome:4.0.240.0
  • Google Chrome 4.0.241.0
    cpe:2.3:a:google:chrome:4.0.241.0
  • Google Chrome 4.0.242.0
    cpe:2.3:a:google:chrome:4.0.242.0
  • Google Chrome 4.0.243.0
    cpe:2.3:a:google:chrome:4.0.243.0
  • Google Chrome 4.0.244.0
    cpe:2.3:a:google:chrome:4.0.244.0
  • Google Chrome 4.0.245.0
    cpe:2.3:a:google:chrome:4.0.245.0
  • cpe:2.3:a:google:chrome:4.0.245.1
  • Google Chrome 4.0.246.0
    cpe:2.3:a:google:chrome:4.0.246.0
  • Google Chrome 4.0.247.0
    cpe:2.3:a:google:chrome:4.0.247.0
  • cpe:2.3:a:google:chrome:4.0.248.0
  • Google Chrome 4.0.249.0
    cpe:2.3:a:google:chrome:4.0.249.0
  • Google Chrome 4.0.249.1
    cpe:2.3:a:google:chrome:4.0.249.1
  • cpe:2.3:a:google:chrome:4.0.249.2
  • Google Chrome 4.0.249.3
    cpe:2.3:a:google:chrome:4.0.249.3
  • cpe:2.3:a:google:chrome:4.0.249.4
  • Google Chrome 4.0.249.5
    cpe:2.3:a:google:chrome:4.0.249.5
  • cpe:2.3:a:google:chrome:4.0.249.6
  • Google Chrome 4.0.249.7
    cpe:2.3:a:google:chrome:4.0.249.7
  • cpe:2.3:a:google:chrome:4.0.249.8
  • Google Chrome 4.0.249.9
    cpe:2.3:a:google:chrome:4.0.249.9
  • Google Chrome 4.0.249.10
    cpe:2.3:a:google:chrome:4.0.249.10
  • Google Chrome 4.0.249.11
    cpe:2.3:a:google:chrome:4.0.249.11
  • cpe:2.3:a:google:chrome:4.0.249.12
  • cpe:2.3:a:google:chrome:4.0.249.14
  • Google Chrome 4.0.249.16
    cpe:2.3:a:google:chrome:4.0.249.16
  • Google Chrome 4.0.249.17
    cpe:2.3:a:google:chrome:4.0.249.17
  • Google Chrome 4.0.249.18
    cpe:2.3:a:google:chrome:4.0.249.18
  • Google Chrome 4.0.249.19
    cpe:2.3:a:google:chrome:4.0.249.19
  • cpe:2.3:a:google:chrome:4.0.249.20
  • cpe:2.3:a:google:chrome:4.0.249.21
  • Google Chrome 4.0.249.22
    cpe:2.3:a:google:chrome:4.0.249.22
  • cpe:2.3:a:google:chrome:4.0.249.23
  • cpe:2.3:a:google:chrome:4.0.249.24
  • Google Chrome 4.0.249.25
    cpe:2.3:a:google:chrome:4.0.249.25
  • Google Chrome 4.0.249.26
    cpe:2.3:a:google:chrome:4.0.249.26
  • Google Chrome 4.0.249.27
    cpe:2.3:a:google:chrome:4.0.249.27
  • Google Chrome 4.0.249.28
    cpe:2.3:a:google:chrome:4.0.249.28
  • Google Chrome 4.0.249.29
    cpe:2.3:a:google:chrome:4.0.249.29
  • Google Chrome 4.0.249.30
    cpe:2.3:a:google:chrome:4.0.249.30
  • cpe:2.3:a:google:chrome:4.0.249.31
  • cpe:2.3:a:google:chrome:4.0.249.32
  • Google Chrome 4.0.249.33
    cpe:2.3:a:google:chrome:4.0.249.33
  • Google Chrome 4.0.249.34
    cpe:2.3:a:google:chrome:4.0.249.34
  • cpe:2.3:a:google:chrome:4.0.249.35
  • Google Chrome 4.0.249.36
    cpe:2.3:a:google:chrome:4.0.249.36
  • Google Chrome 4.0.249.37
    cpe:2.3:a:google:chrome:4.0.249.37
  • Google Chrome 4.0.249.38
    cpe:2.3:a:google:chrome:4.0.249.38
  • cpe:2.3:a:google:chrome:4.0.249.39
  • Google Chrome 4.0.249.40
    cpe:2.3:a:google:chrome:4.0.249.40
  • cpe:2.3:a:google:chrome:4.0.249.41
  • cpe:2.3:a:google:chrome:4.0.249.42
  • cpe:2.3:a:google:chrome:4.0.249.43
  • cpe:2.3:a:google:chrome:4.0.249.44
  • cpe:2.3:a:google:chrome:4.0.249.45
  • Google Chrome 4.0.249.46
    cpe:2.3:a:google:chrome:4.0.249.46
  • Google Chrome 4.0.249.47
    cpe:2.3:a:google:chrome:4.0.249.47
  • cpe:2.3:a:google:chrome:4.0.249.48
  • cpe:2.3:a:google:chrome:4.0.249.49
  • Google Chrome 4.0.249.50
    cpe:2.3:a:google:chrome:4.0.249.50
  • cpe:2.3:a:google:chrome:4.0.249.51
  • Google Chrome 4.0.249.52
    cpe:2.3:a:google:chrome:4.0.249.52
  • Google Chrome 4.0.249.53
    cpe:2.3:a:google:chrome:4.0.249.53
  • Google Chrome 4.0.249.54
    cpe:2.3:a:google:chrome:4.0.249.54
  • cpe:2.3:a:google:chrome:4.0.249.55
  • Google Chrome 4.0.249.56
    cpe:2.3:a:google:chrome:4.0.249.56
  • Google Chrome 4.0.249.57
    cpe:2.3:a:google:chrome:4.0.249.57
  • cpe:2.3:a:google:chrome:4.0.249.58
  • cpe:2.3:a:google:chrome:4.0.249.59
  • cpe:2.3:a:google:chrome:4.0.249.60
  • cpe:2.3:a:google:chrome:4.0.249.61
  • Google Chrome 4.0.249.62
    cpe:2.3:a:google:chrome:4.0.249.62
  • Google Chrome 4.0.249.63
    cpe:2.3:a:google:chrome:4.0.249.63
  • cpe:2.3:a:google:chrome:4.0.249.64
  • Google Chrome 4.0.249.65
    cpe:2.3:a:google:chrome:4.0.249.65
  • cpe:2.3:a:google:chrome:4.0.249.66
  • Google Chrome 4.0.249.67
    cpe:2.3:a:google:chrome:4.0.249.67
  • Google Chrome 4.0.249.68
    cpe:2.3:a:google:chrome:4.0.249.68
  • cpe:2.3:a:google:chrome:4.0.249.69
  • Google Chrome 4.0.249.70
    cpe:2.3:a:google:chrome:4.0.249.70
  • cpe:2.3:a:google:chrome:4.0.249.71
  • cpe:2.3:a:google:chrome:4.0.249.72
  • cpe:2.3:a:google:chrome:4.0.249.73
  • Google Chrome 4.0.249.74
    cpe:2.3:a:google:chrome:4.0.249.74
  • Google Chrome 4.0.249.75
    cpe:2.3:a:google:chrome:4.0.249.75
  • Google Chrome 4.0.249.76
    cpe:2.3:a:google:chrome:4.0.249.76
  • cpe:2.3:a:google:chrome:4.0.249.77
  • cpe:2.3:a:google:chrome:4.0.249.78
  • Google Chrome 4.0.249.78:beta
    cpe:2.3:a:google:chrome:4.0.249.78:beta
  • cpe:2.3:a:google:chrome:4.0.249.79
  • cpe:2.3:a:google:chrome:4.0.249.80
  • cpe:2.3:a:google:chrome:4.0.249.81
  • cpe:2.3:a:google:chrome:4.0.249.82
  • Google Chrome 4.0.249.89
    cpe:2.3:a:google:chrome:4.0.249.89
  • Google Chrome 4.0.250.0
    cpe:2.3:a:google:chrome:4.0.250.0
  • cpe:2.3:a:google:chrome:4.0.250.2
  • cpe:2.3:a:google:chrome:4.0.251.0
  • Google Chrome 4.0.252.0
    cpe:2.3:a:google:chrome:4.0.252.0
  • Google Chrome 4.0.254.0
    cpe:2.3:a:google:chrome:4.0.254.0
  • Google Chrome 4.0.255.0
    cpe:2.3:a:google:chrome:4.0.255.0
  • cpe:2.3:a:google:chrome:4.0.256.0
  • Google Chrome 4.0.257.0
    cpe:2.3:a:google:chrome:4.0.257.0
  • Google Chrome 4.0.258.0
    cpe:2.3:a:google:chrome:4.0.258.0
  • Google Chrome 4.0.259.0
    cpe:2.3:a:google:chrome:4.0.259.0
  • cpe:2.3:a:google:chrome:4.0.260.0
  • Google Chrome 4.0.261.0
    cpe:2.3:a:google:chrome:4.0.261.0
  • Google Chrome 4.0.262.0
    cpe:2.3:a:google:chrome:4.0.262.0
  • Google Chrome 4.0.263.0
    cpe:2.3:a:google:chrome:4.0.263.0
  • cpe:2.3:a:google:chrome:4.0.264.0
  • Google Chrome 4.0.265.0
    cpe:2.3:a:google:chrome:4.0.265.0
  • Google Chrome 4.0.266.0
    cpe:2.3:a:google:chrome:4.0.266.0
  • Google Chrome 4.0.267.0
    cpe:2.3:a:google:chrome:4.0.267.0
  • cpe:2.3:a:google:chrome:4.0.268.0
  • Google Chrome 4.0.269.0
    cpe:2.3:a:google:chrome:4.0.269.0
  • Google Chrome 4.0.271.0
    cpe:2.3:a:google:chrome:4.0.271.0
  • Google Chrome 4.0.272.0
    cpe:2.3:a:google:chrome:4.0.272.0
  • Google Chrome 4.0.275.0
    cpe:2.3:a:google:chrome:4.0.275.0
  • cpe:2.3:a:google:chrome:4.0.275.1
  • Google Chrome 4.0.276.0
    cpe:2.3:a:google:chrome:4.0.276.0
  • cpe:2.3:a:google:chrome:4.0.277.0
  • Google Chrome 4.0.278.0
    cpe:2.3:a:google:chrome:4.0.278.0
  • cpe:2.3:a:google:chrome:4.0.286.0
  • Google Chrome 4.0.287.0
    cpe:2.3:a:google:chrome:4.0.287.0
  • Google Chrome 4.0.288.0
    cpe:2.3:a:google:chrome:4.0.288.0
  • cpe:2.3:a:google:chrome:4.0.288.1
  • Google Chrome 4.0.289.0
    cpe:2.3:a:google:chrome:4.0.289.0
  • Google Chrome 4.0.290.0
    cpe:2.3:a:google:chrome:4.0.290.0
  • cpe:2.3:a:google:chrome:4.0.292.0
  • cpe:2.3:a:google:chrome:4.0.294.0
  • Google Chrome 4.0.295.0
    cpe:2.3:a:google:chrome:4.0.295.0
  • cpe:2.3:a:google:chrome:4.0.296.0
  • Google Chrome 4.0.299.0
    cpe:2.3:a:google:chrome:4.0.299.0
  • Google Chrome 4.0.300.0
    cpe:2.3:a:google:chrome:4.0.300.0
  • Google Chrome 4.0.301.0
    cpe:2.3:a:google:chrome:4.0.301.0
  • cpe:2.3:a:google:chrome:4.0.302.0
  • cpe:2.3:a:google:chrome:4.0.302.1
  • Google Chrome 4.0.302.2
    cpe:2.3:a:google:chrome:4.0.302.2
  • Google Chrome 4.0.302.3
    cpe:2.3:a:google:chrome:4.0.302.3
  • Google Chrome 4.0.303.0
    cpe:2.3:a:google:chrome:4.0.303.0
  • cpe:2.3:a:google:chrome:4.0.304.0
  • Google Chrome 4.0.305.0
    cpe:2.3:a:google:chrome:4.0.305.0
  • Google Chrome 4.1:beta
    cpe:2.3:a:google:chrome:4.1:beta
  • Google Chrome 4.1.249.0
    cpe:2.3:a:google:chrome:4.1.249.0
  • cpe:2.3:a:google:chrome:4.1.249.1001
  • Google Chrome 4.1.249.1004
    cpe:2.3:a:google:chrome:4.1.249.1004
  • cpe:2.3:a:google:chrome:4.1.249.1006
  • Google Chrome 4.1.249.1007
    cpe:2.3:a:google:chrome:4.1.249.1007
  • cpe:2.3:a:google:chrome:4.1.249.1008
  • Google Chrome 4.1.249.1009
    cpe:2.3:a:google:chrome:4.1.249.1009
  • cpe:2.3:a:google:chrome:4.1.249.1010
  • Google Chrome 4.1.249.1011
    cpe:2.3:a:google:chrome:4.1.249.1011
  • cpe:2.3:a:google:chrome:4.1.249.1012
  • Google Chrome 4.1.249.1013
    cpe:2.3:a:google:chrome:4.1.249.1013
  • Google Chrome 4.1.249.1014
    cpe:2.3:a:google:chrome:4.1.249.1014
  • cpe:2.3:a:google:chrome:4.1.249.1015
  • cpe:2.3:a:google:chrome:4.1.249.1016
  • Google Chrome 4.1.249.1017
    cpe:2.3:a:google:chrome:4.1.249.1017
  • Google Chrome 4.1.249.1018
    cpe:2.3:a:google:chrome:4.1.249.1018
  • cpe:2.3:a:google:chrome:4.1.249.1019
  • cpe:2.3:a:google:chrome:4.1.249.1020
  • cpe:2.3:a:google:chrome:4.1.249.1021
  • Google Chrome 4.1.249.1022
    cpe:2.3:a:google:chrome:4.1.249.1022
  • cpe:2.3:a:google:chrome:4.1.249.1023
  • cpe:2.3:a:google:chrome:4.1.249.1024
  • Google Chrome 4.1.249.1025
    cpe:2.3:a:google:chrome:4.1.249.1025
  • Google Chrome 4.1.249.1026
    cpe:2.3:a:google:chrome:4.1.249.1026
  • Google Chrome 4.1.249.1027
    cpe:2.3:a:google:chrome:4.1.249.1027
  • Google Chrome 4.1.249.1028
    cpe:2.3:a:google:chrome:4.1.249.1028
  • cpe:2.3:a:google:chrome:4.1.249.1029
  • cpe:2.3:a:google:chrome:4.1.249.1030
  • cpe:2.3:a:google:chrome:4.1.249.1031
  • cpe:2.3:a:google:chrome:4.1.249.1032
  • cpe:2.3:a:google:chrome:4.1.249.1033
  • cpe:2.3:a:google:chrome:4.1.249.1034
  • cpe:2.3:a:google:chrome:4.1.249.1035
  • Google Chrome 4.1.249.1036
    cpe:2.3:a:google:chrome:4.1.249.1036
  • cpe:2.3:a:google:chrome:4.1.249.1037
  • cpe:2.3:a:google:chrome:4.1.249.1038
  • Google Chrome 4.1.249.1039
    cpe:2.3:a:google:chrome:4.1.249.1039
  • Google Chrome 4.1.249.1040
    cpe:2.3:a:google:chrome:4.1.249.1040
  • cpe:2.3:a:google:chrome:4.1.249.1041
  • cpe:2.3:a:google:chrome:4.1.249.1042
  • Google Chrome 4.1.249.1043
    cpe:2.3:a:google:chrome:4.1.249.1043
  • Google Chrome 4.1.249.1044
    cpe:2.3:a:google:chrome:4.1.249.1044
  • Google Chrome 4.1.249.1045
    cpe:2.3:a:google:chrome:4.1.249.1045
  • cpe:2.3:a:google:chrome:4.1.249.1046
  • cpe:2.3:a:google:chrome:4.1.249.1047
  • cpe:2.3:a:google:chrome:4.1.249.1048
  • cpe:2.3:a:google:chrome:4.1.249.1049
  • cpe:2.3:a:google:chrome:4.1.249.1050
  • Google Chrome 4.1.249.1051
    cpe:2.3:a:google:chrome:4.1.249.1051
  • Google Chrome 4.1.249.1052
    cpe:2.3:a:google:chrome:4.1.249.1052
  • Google Chrome 4.1.249.1053
    cpe:2.3:a:google:chrome:4.1.249.1053
  • Google Chrome 4.1.249.1054
    cpe:2.3:a:google:chrome:4.1.249.1054
  • Google Chrome 4.1.249.1055
    cpe:2.3:a:google:chrome:4.1.249.1055
  • cpe:2.3:a:google:chrome:4.1.249.1056
  • cpe:2.3:a:google:chrome:4.1.249.1057
  • cpe:2.3:a:google:chrome:4.1.249.1058
  • Google Chrome 4.1.249.1059
    cpe:2.3:a:google:chrome:4.1.249.1059
  • cpe:2.3:a:google:chrome:4.1.249.1060
  • Google Chrome 4.1.249.1061
    cpe:2.3:a:google:chrome:4.1.249.1061
  • Google Chrome 4.1.249.1062
    cpe:2.3:a:google:chrome:4.1.249.1062
  • cpe:2.3:a:google:chrome:4.1.249.1063
  • cpe:2.3:a:google:chrome:4.1.249.1064
  • cpe:2.3:a:google:chrome:5.0.306.0
  • cpe:2.3:a:google:chrome:5.0.306.1
  • cpe:2.3:a:google:chrome:5.0.307.1
  • Google Chrome 5.0.307.3
    cpe:2.3:a:google:chrome:5.0.307.3
  • cpe:2.3:a:google:chrome:5.0.307.4
  • Google Chrome 5.0.307.5
    cpe:2.3:a:google:chrome:5.0.307.5
  • cpe:2.3:a:google:chrome:5.0.307.6
  • Google Chrome 5.0.307.7
    cpe:2.3:a:google:chrome:5.0.307.7
  • cpe:2.3:a:google:chrome:5.0.307.8
  • Google Chrome 5.0.307.9
    cpe:2.3:a:google:chrome:5.0.307.9
  • cpe:2.3:a:google:chrome:5.0.307.10
  • cpe:2.3:a:google:chrome:5.0.307.11
  • Google Chrome 5.0.308.0
    cpe:2.3:a:google:chrome:5.0.308.0
  • cpe:2.3:a:google:chrome:5.0.309.0
  • Google Chrome 5.0.313.0
    cpe:2.3:a:google:chrome:5.0.313.0
  • cpe:2.3:a:google:chrome:5.0.314.0
  • Google Chrome 5.0.314.1
    cpe:2.3:a:google:chrome:5.0.314.1
  • cpe:2.3:a:google:chrome:5.0.315.0
  • Google Chrome 5.0.316.0
    cpe:2.3:a:google:chrome:5.0.316.0
  • cpe:2.3:a:google:chrome:5.0.317.0
  • Google Chrome 5.0.317.1
    cpe:2.3:a:google:chrome:5.0.317.1
  • Google Chrome 5.0.317.2
    cpe:2.3:a:google:chrome:5.0.317.2
  • Google Chrome 5.0.318.0
    cpe:2.3:a:google:chrome:5.0.318.0
  • cpe:2.3:a:google:chrome:5.0.319.0
  • cpe:2.3:a:google:chrome:5.0.320.0
  • Google Chrome 5.0.321.0
    cpe:2.3:a:google:chrome:5.0.321.0
  • cpe:2.3:a:google:chrome:5.0.322.0
  • cpe:2.3:a:google:chrome:5.0.322.1
  • Google Chrome 5.0.322.2
    cpe:2.3:a:google:chrome:5.0.322.2
  • Google Chrome 5.0.323.0
    cpe:2.3:a:google:chrome:5.0.323.0
  • cpe:2.3:a:google:chrome:5.0.324.0
  • cpe:2.3:a:google:chrome:5.0.325.0
  • Google Chrome 5.0.326.0
    cpe:2.3:a:google:chrome:5.0.326.0
  • Google Chrome 5.0.327.0
    cpe:2.3:a:google:chrome:5.0.327.0
  • cpe:2.3:a:google:chrome:5.0.328.0
  • cpe:2.3:a:google:chrome:5.0.329.0
  • cpe:2.3:a:google:chrome:5.0.330.0
  • cpe:2.3:a:google:chrome:5.0.332.0
  • Google Chrome 5.0.333.0
    cpe:2.3:a:google:chrome:5.0.333.0
  • cpe:2.3:a:google:chrome:5.0.334.0
  • cpe:2.3:a:google:chrome:5.0.335.0
  • Google Chrome 5.0.335.1
    cpe:2.3:a:google:chrome:5.0.335.1
  • Google Chrome 5.0.335.2
    cpe:2.3:a:google:chrome:5.0.335.2
  • Google Chrome 5.0.335.3
    cpe:2.3:a:google:chrome:5.0.335.3
  • Google Chrome 5.0.335.4
    cpe:2.3:a:google:chrome:5.0.335.4
  • Google Chrome 5.0.336.0
    cpe:2.3:a:google:chrome:5.0.336.0
  • Google Chrome 5.0.337.0
    cpe:2.3:a:google:chrome:5.0.337.0
  • cpe:2.3:a:google:chrome:5.0.338.0
  • cpe:2.3:a:google:chrome:5.0.339.0
  • cpe:2.3:a:google:chrome:5.0.340.0
  • Google Chrome 5.0.341.0
    cpe:2.3:a:google:chrome:5.0.341.0
  • Google Chrome 5.0.342.0
    cpe:2.3:a:google:chrome:5.0.342.0
  • cpe:2.3:a:google:chrome:5.0.342.1
  • cpe:2.3:a:google:chrome:5.0.342.2
  • Google Chrome 5.0.342.3
    cpe:2.3:a:google:chrome:5.0.342.3
  • Google Chrome 5.0.342.4
    cpe:2.3:a:google:chrome:5.0.342.4
  • cpe:2.3:a:google:chrome:5.0.342.5
  • cpe:2.3:a:google:chrome:5.0.342.6
  • cpe:2.3:a:google:chrome:5.0.342.7
  • cpe:2.3:a:google:chrome:5.0.342.8
  • Google Chrome 5.0.342.9
    cpe:2.3:a:google:chrome:5.0.342.9
  • cpe:2.3:a:google:chrome:5.0.343.0
  • cpe:2.3:a:google:chrome:5.0.344.0
  • cpe:2.3:a:google:chrome:5.0.345.0
  • Google Chrome 5.0.346.0
    cpe:2.3:a:google:chrome:5.0.346.0
  • Google Chrome 5.0.347.0
    cpe:2.3:a:google:chrome:5.0.347.0
  • cpe:2.3:a:google:chrome:5.0.348.0
  • cpe:2.3:a:google:chrome:5.0.349.0
  • cpe:2.3:a:google:chrome:5.0.350.0
  • Google Chrome 5.0.350.1
    cpe:2.3:a:google:chrome:5.0.350.1
  • cpe:2.3:a:google:chrome:5.0.351.0
  • Google Chrome 5.0.353.0
    cpe:2.3:a:google:chrome:5.0.353.0
  • cpe:2.3:a:google:chrome:5.0.354.0
  • cpe:2.3:a:google:chrome:5.0.354.1
  • cpe:2.3:a:google:chrome:5.0.355.0
  • Google Chrome 5.0.356.0
    cpe:2.3:a:google:chrome:5.0.356.0
  • Google Chrome 5.0.356.1
    cpe:2.3:a:google:chrome:5.0.356.1
  • Google Chrome 5.0.356.2
    cpe:2.3:a:google:chrome:5.0.356.2
  • cpe:2.3:a:google:chrome:5.0.357.0
  • cpe:2.3:a:google:chrome:5.0.358.0
  • cpe:2.3:a:google:chrome:5.0.359.0
  • cpe:2.3:a:google:chrome:5.0.360.0
  • cpe:2.3:a:google:chrome:5.0.360.3
  • Google Chrome 5.0.360.4
    cpe:2.3:a:google:chrome:5.0.360.4
  • cpe:2.3:a:google:chrome:5.0.360.5
  • Google Chrome 5.0.361.0
    cpe:2.3:a:google:chrome:5.0.361.0
  • Google Chrome 5.0.362.0
    cpe:2.3:a:google:chrome:5.0.362.0
  • Google Chrome 5.0.363.0
    cpe:2.3:a:google:chrome:5.0.363.0
  • Google Chrome 5.0.364.0
    cpe:2.3:a:google:chrome:5.0.364.0
  • Google Chrome 5.0.365.0
    cpe:2.3:a:google:chrome:5.0.365.0
  • Google Chrome 5.0.366.0
    cpe:2.3:a:google:chrome:5.0.366.0
  • Google Chrome 5.0.366.1
    cpe:2.3:a:google:chrome:5.0.366.1
  • Google Chrome 5.0.366.2
    cpe:2.3:a:google:chrome:5.0.366.2
  • cpe:2.3:a:google:chrome:5.0.366.3
  • Google Chrome 5.0.366.4
    cpe:2.3:a:google:chrome:5.0.366.4
  • Google Chrome 5.0.367.0
    cpe:2.3:a:google:chrome:5.0.367.0
  • cpe:2.3:a:google:chrome:5.0.368.0
  • Google Chrome 5.0.369.0
    cpe:2.3:a:google:chrome:5.0.369.0
  • Google Chrome 5.0.369.1
    cpe:2.3:a:google:chrome:5.0.369.1
  • cpe:2.3:a:google:chrome:5.0.369.2
  • Google Chrome 5.0.370.0
    cpe:2.3:a:google:chrome:5.0.370.0
  • Google Chrome 5.0.371.0
    cpe:2.3:a:google:chrome:5.0.371.0
  • cpe:2.3:a:google:chrome:5.0.372.0
  • Google Chrome 5.0.373.0
    cpe:2.3:a:google:chrome:5.0.373.0
  • Google Chrome 5.0.374.0
    cpe:2.3:a:google:chrome:5.0.374.0
  • Google Chrome 5.0.375.0
    cpe:2.3:a:google:chrome:5.0.375.0
  • cpe:2.3:a:google:chrome:5.0.375.1
  • Google Chrome 5.0.375.2
    cpe:2.3:a:google:chrome:5.0.375.2
  • cpe:2.3:a:google:chrome:5.0.375.3
  • Google Chrome 5.0.375.4
    cpe:2.3:a:google:chrome:5.0.375.4
  • Google Chrome 5.0.375.5
    cpe:2.3:a:google:chrome:5.0.375.5
  • Google Chrome 5.0.375.6
    cpe:2.3:a:google:chrome:5.0.375.6
  • cpe:2.3:a:google:chrome:5.0.375.7
  • Google Chrome 5.0.375.8
    cpe:2.3:a:google:chrome:5.0.375.8
  • Google Chrome 5.0.375.9
    cpe:2.3:a:google:chrome:5.0.375.9
  • cpe:2.3:a:google:chrome:5.0.375.10
  • cpe:2.3:a:google:chrome:5.0.375.11
  • Google Chrome 5.0.375.12
    cpe:2.3:a:google:chrome:5.0.375.12
  • Google Chrome 5.0.375.13
    cpe:2.3:a:google:chrome:5.0.375.13
  • Google Chrome 5.0.375.14
    cpe:2.3:a:google:chrome:5.0.375.14
  • cpe:2.3:a:google:chrome:5.0.375.15
  • Google Chrome 5.0.375.16
    cpe:2.3:a:google:chrome:5.0.375.16
  • cpe:2.3:a:google:chrome:5.0.375.17
  • cpe:2.3:a:google:chrome:5.0.375.18
  • cpe:2.3:a:google:chrome:5.0.375.19
  • Google Chrome 5.0.375.20
    cpe:2.3:a:google:chrome:5.0.375.20
  • cpe:2.3:a:google:chrome:5.0.375.21
  • cpe:2.3:a:google:chrome:5.0.375.22
  • cpe:2.3:a:google:chrome:5.0.375.23
  • cpe:2.3:a:google:chrome:5.0.375.25
  • Google Chrome 5.0.375.26
    cpe:2.3:a:google:chrome:5.0.375.26
  • cpe:2.3:a:google:chrome:5.0.375.27
  • Google Chrome 5.0.375.28
    cpe:2.3:a:google:chrome:5.0.375.28
  • Google Chrome 5.0.375.29
    cpe:2.3:a:google:chrome:5.0.375.29
  • Google Chrome 5.0.375.30
    cpe:2.3:a:google:chrome:5.0.375.30
  • cpe:2.3:a:google:chrome:5.0.375.31
  • Google Chrome 5.0.375.32
    cpe:2.3:a:google:chrome:5.0.375.32
  • cpe:2.3:a:google:chrome:5.0.375.33
  • cpe:2.3:a:google:chrome:5.0.375.34
  • cpe:2.3:a:google:chrome:5.0.375.35
  • Google Chrome 5.0.375.36
    cpe:2.3:a:google:chrome:5.0.375.36
  • Google Chrome 5.0.375.37
    cpe:2.3:a:google:chrome:5.0.375.37
  • Google Chrome 5.0.375.38
    cpe:2.3:a:google:chrome:5.0.375.38
  • cpe:2.3:a:google:chrome:5.0.375.39
  • Google Chrome 5.0.375.40
    cpe:2.3:a:google:chrome:5.0.375.40
  • cpe:2.3:a:google:chrome:5.0.375.41
  • cpe:2.3:a:google:chrome:5.0.375.42
  • cpe:2.3:a:google:chrome:5.0.375.43
  • cpe:2.3:a:google:chrome:5.0.375.44
  • cpe:2.3:a:google:chrome:5.0.375.45
  • Google Chrome 5.0.375.46
    cpe:2.3:a:google:chrome:5.0.375.46
  • cpe:2.3:a:google:chrome:5.0.375.47
  • Google Chrome 5.0.375.48
    cpe:2.3:a:google:chrome:5.0.375.48
  • Google Chrome 5.0.375.49
    cpe:2.3:a:google:chrome:5.0.375.49
  • Google Chrome 5.0.375.50
    cpe:2.3:a:google:chrome:5.0.375.50
  • cpe:2.3:a:google:chrome:5.0.375.51
  • cpe:2.3:a:google:chrome:5.0.375.52
  • cpe:2.3:a:google:chrome:5.0.375.53
  • cpe:2.3:a:google:chrome:5.0.375.54
  • Google Chrome 5.0.375.55
    cpe:2.3:a:google:chrome:5.0.375.55
  • Google Chrome 5.0.375.56
    cpe:2.3:a:google:chrome:5.0.375.56
  • Google Chrome 5.0.375.57
    cpe:2.3:a:google:chrome:5.0.375.57
  • Google Chrome 5.0.375.58
    cpe:2.3:a:google:chrome:5.0.375.58
  • cpe:2.3:a:google:chrome:5.0.375.59
  • cpe:2.3:a:google:chrome:5.0.375.60
  • cpe:2.3:a:google:chrome:5.0.375.61
  • cpe:2.3:a:google:chrome:5.0.375.62
  • Google Chrome 5.0.375.63
    cpe:2.3:a:google:chrome:5.0.375.63
  • cpe:2.3:a:google:chrome:5.0.375.64
  • cpe:2.3:a:google:chrome:5.0.375.65
  • cpe:2.3:a:google:chrome:5.0.375.66
  • Google Chrome 5.0.375.67
    cpe:2.3:a:google:chrome:5.0.375.67
  • Google Chrome 5.0.375.68
    cpe:2.3:a:google:chrome:5.0.375.68
  • Google Chrome 5.0.375.69
    cpe:2.3:a:google:chrome:5.0.375.69
  • cpe:2.3:a:google:chrome:5.0.375.70
  • cpe:2.3:a:google:chrome:5.0.375.71
  • Google Chrome 5.0.375.72
    cpe:2.3:a:google:chrome:5.0.375.72
  • Google Chrome 5.0.375.73
    cpe:2.3:a:google:chrome:5.0.375.73
  • cpe:2.3:a:google:chrome:5.0.375.74
  • cpe:2.3:a:google:chrome:5.0.375.75
  • cpe:2.3:a:google:chrome:5.0.375.76
  • cpe:2.3:a:google:chrome:5.0.375.77
  • Google Chrome 5.0.375.78
    cpe:2.3:a:google:chrome:5.0.375.78
  • Google Chrome 5.0.375.79
    cpe:2.3:a:google:chrome:5.0.375.79
  • cpe:2.3:a:google:chrome:5.0.375.80
  • Google Chrome 5.0.375.81
    cpe:2.3:a:google:chrome:5.0.375.81
  • Google Chrome 5.0.375.82
    cpe:2.3:a:google:chrome:5.0.375.82
  • cpe:2.3:a:google:chrome:5.0.375.83
  • cpe:2.3:a:google:chrome:5.0.375.84
  • Google Chrome 5.0.375.85
    cpe:2.3:a:google:chrome:5.0.375.85
  • cpe:2.3:a:google:chrome:5.0.375.86
  • cpe:2.3:a:google:chrome:5.0.375.87
  • Google Chrome 5.0.375.88
    cpe:2.3:a:google:chrome:5.0.375.88
  • cpe:2.3:a:google:chrome:5.0.375.89
  • Google Chrome 5.0.375.90
    cpe:2.3:a:google:chrome:5.0.375.90
  • cpe:2.3:a:google:chrome:5.0.375.91
  • Google Chrome 5.0.375.92
    cpe:2.3:a:google:chrome:5.0.375.92
  • Google Chrome 5.0.375.93
    cpe:2.3:a:google:chrome:5.0.375.93
  • cpe:2.3:a:google:chrome:5.0.375.94
  • Google Chrome 5.0.375.95
    cpe:2.3:a:google:chrome:5.0.375.95
  • Google Chrome 5.0.375.96
    cpe:2.3:a:google:chrome:5.0.375.96
  • Google Chrome 5.0.375.97
    cpe:2.3:a:google:chrome:5.0.375.97
  • cpe:2.3:a:google:chrome:5.0.375.98
  • cpe:2.3:a:google:chrome:5.0.375.99
  • cpe:2.3:a:google:chrome:5.0.375.125
  • Google Chrome 5.0.375.126
    cpe:2.3:a:google:chrome:5.0.375.126
  • Google Chrome 5.0.375.127
    cpe:2.3:a:google:chrome:5.0.375.127
  • Google Chrome 5.0.376.0
    cpe:2.3:a:google:chrome:5.0.376.0
  • cpe:2.3:a:google:chrome:5.0.378.0
  • Google Chrome 5.0.379.0
    cpe:2.3:a:google:chrome:5.0.379.0
  • Google Chrome 5.0.380.0
    cpe:2.3:a:google:chrome:5.0.380.0
  • Google Chrome 5.0.381.0
    cpe:2.3:a:google:chrome:5.0.381.0
  • cpe:2.3:a:google:chrome:5.0.382.0
  • Google Chrome 5.0.382.3
    cpe:2.3:a:google:chrome:5.0.382.3
  • cpe:2.3:a:google:chrome:5.0.383.0
  • Google Chrome 5.0.384.0
    cpe:2.3:a:google:chrome:5.0.384.0
  • cpe:2.3:a:google:chrome:5.0.385.0
  • Google Chrome 5.0.386.0
    cpe:2.3:a:google:chrome:5.0.386.0
  • cpe:2.3:a:google:chrome:5.0.387.0
  • Google Chrome 5.0.390.0
    cpe:2.3:a:google:chrome:5.0.390.0
  • cpe:2.3:a:google:chrome:5.0.391.0
  • Google Chrome 5.0.392.0
    cpe:2.3:a:google:chrome:5.0.392.0
  • cpe:2.3:a:google:chrome:5.0.393.0
  • Google Chrome 5.0.394.0
    cpe:2.3:a:google:chrome:5.0.394.0
  • Google Chrome 5.0.395.0
    cpe:2.3:a:google:chrome:5.0.395.0
  • cpe:2.3:a:google:chrome:5.0.396.0
  • Google Chrome 6.0.397.0
    cpe:2.3:a:google:chrome:6.0.397.0
  • Google Chrome 6.0.398.0
    cpe:2.3:a:google:chrome:6.0.398.0
  • Google Chrome 6.0.399.0
    cpe:2.3:a:google:chrome:6.0.399.0
  • cpe:2.3:a:google:chrome:6.0.400.0
  • Google Chrome 6.0.401.0
    cpe:2.3:a:google:chrome:6.0.401.0
  • Google Chrome 6.0.401.1
    cpe:2.3:a:google:chrome:6.0.401.1
  • cpe:2.3:a:google:chrome:6.0.403.0
  • Google Chrome 6.0.404.0
    cpe:2.3:a:google:chrome:6.0.404.0
  • Google Chrome 6.0.404.1
    cpe:2.3:a:google:chrome:6.0.404.1
  • cpe:2.3:a:google:chrome:6.0.404.2
  • Google Chrome 6.0.405.0
    cpe:2.3:a:google:chrome:6.0.405.0
  • Google Chrome 6.0.406.0
    cpe:2.3:a:google:chrome:6.0.406.0
  • Google Chrome 6.0.407.0
    cpe:2.3:a:google:chrome:6.0.407.0
  • cpe:2.3:a:google:chrome:6.0.408.0
  • cpe:2.3:a:google:chrome:6.0.408.1
  • Google Chrome 6.0.408.2
    cpe:2.3:a:google:chrome:6.0.408.2
  • cpe:2.3:a:google:chrome:6.0.408.3
  • cpe:2.3:a:google:chrome:6.0.408.4
  • Google Chrome 6.0.408.5
    cpe:2.3:a:google:chrome:6.0.408.5
  • cpe:2.3:a:google:chrome:6.0.408.6
  • Google Chrome 6.0.408.7
    cpe:2.3:a:google:chrome:6.0.408.7
  • cpe:2.3:a:google:chrome:6.0.408.8
  • cpe:2.3:a:google:chrome:6.0.408.9
  • cpe:2.3:a:google:chrome:6.0.408.10
  • cpe:2.3:a:google:chrome:6.0.409.0
  • Google Chrome 6.0.410.0
    cpe:2.3:a:google:chrome:6.0.410.0
  • cpe:2.3:a:google:chrome:6.0.411.0
  • cpe:2.3:a:google:chrome:6.0.412.0
  • Google Chrome 6.0.413.0
    cpe:2.3:a:google:chrome:6.0.413.0
  • Google Chrome 6.0.414.0
    cpe:2.3:a:google:chrome:6.0.414.0
  • Google Chrome 6.0.415.0
    cpe:2.3:a:google:chrome:6.0.415.0
  • Google Chrome 6.0.415.1
    cpe:2.3:a:google:chrome:6.0.415.1
  • Google Chrome 6.0.416.0
    cpe:2.3:a:google:chrome:6.0.416.0
  • Google Chrome 6.0.416.1
    cpe:2.3:a:google:chrome:6.0.416.1
  • Google Chrome 6.0.417.0
    cpe:2.3:a:google:chrome:6.0.417.0
  • Google Chrome 6.0.418.0
    cpe:2.3:a:google:chrome:6.0.418.0
  • Google Chrome 6.0.418.1
    cpe:2.3:a:google:chrome:6.0.418.1
  • cpe:2.3:a:google:chrome:6.0.418.2
  • cpe:2.3:a:google:chrome:6.0.418.3
  • Google Chrome 6.0.418.4
    cpe:2.3:a:google:chrome:6.0.418.4
  • cpe:2.3:a:google:chrome:6.0.418.5
  • cpe:2.3:a:google:chrome:6.0.418.6
  • cpe:2.3:a:google:chrome:6.0.418.7
  • cpe:2.3:a:google:chrome:6.0.418.8
  • cpe:2.3:a:google:chrome:6.0.418.9
  • Google Chrome 6.0.419.0
    cpe:2.3:a:google:chrome:6.0.419.0
  • Google Chrome 6.0.421.0
    cpe:2.3:a:google:chrome:6.0.421.0
  • cpe:2.3:a:google:chrome:6.0.422.0
  • cpe:2.3:a:google:chrome:6.0.423.0
  • Google Chrome 6.0.424.0
    cpe:2.3:a:google:chrome:6.0.424.0
  • Google Chrome 6.0.425.0
    cpe:2.3:a:google:chrome:6.0.425.0
  • Google Chrome 6.0.426.0
    cpe:2.3:a:google:chrome:6.0.426.0
  • Google Chrome 6.0.427.0
    cpe:2.3:a:google:chrome:6.0.427.0
  • Google Chrome 6.0.428.0
    cpe:2.3:a:google:chrome:6.0.428.0
  • Google Chrome 6.0.430.0
    cpe:2.3:a:google:chrome:6.0.430.0
  • Google Chrome 6.0.431.0
    cpe:2.3:a:google:chrome:6.0.431.0
  • Google Chrome 6.0.432.0
    cpe:2.3:a:google:chrome:6.0.432.0
  • cpe:2.3:a:google:chrome:6.0.433.0
  • cpe:2.3:a:google:chrome:6.0.434.0
  • Google Chrome 6.0.435.0
    cpe:2.3:a:google:chrome:6.0.435.0
  • Google Chrome 6.0.436.0
    cpe:2.3:a:google:chrome:6.0.436.0
  • cpe:2.3:a:google:chrome:6.0.437.0
  • Google Chrome 6.0.437.1
    cpe:2.3:a:google:chrome:6.0.437.1
  • cpe:2.3:a:google:chrome:6.0.437.2
  • Google Chrome 6.0.437.3
    cpe:2.3:a:google:chrome:6.0.437.3
  • Google Chrome 6.0.438.0
    cpe:2.3:a:google:chrome:6.0.438.0
  • Google Chrome 6.0.440.0
    cpe:2.3:a:google:chrome:6.0.440.0
  • Google Chrome 6.0.441.0
    cpe:2.3:a:google:chrome:6.0.441.0
  • cpe:2.3:a:google:chrome:6.0.443.0
  • Google Chrome 6.0.444.0
    cpe:2.3:a:google:chrome:6.0.444.0
  • Google Chrome 6.0.445.0
    cpe:2.3:a:google:chrome:6.0.445.0
  • Google Chrome 6.0.445.1
    cpe:2.3:a:google:chrome:6.0.445.1
  • cpe:2.3:a:google:chrome:6.0.446.0
  • Google Chrome 6.0.447.0
    cpe:2.3:a:google:chrome:6.0.447.0
  • Google Chrome 6.0.447.1
    cpe:2.3:a:google:chrome:6.0.447.1
  • cpe:2.3:a:google:chrome:6.0.447.2
  • cpe:2.3:a:google:chrome:6.0.449.0
  • cpe:2.3:a:google:chrome:6.0.450.0
  • Google Chrome 6.0.450.1
    cpe:2.3:a:google:chrome:6.0.450.1
  • Google Chrome 6.0.450.2
    cpe:2.3:a:google:chrome:6.0.450.2
  • Google Chrome 6.0.450.3
    cpe:2.3:a:google:chrome:6.0.450.3
  • cpe:2.3:a:google:chrome:6.0.450.4
  • Google Chrome 6.0.451.0
    cpe:2.3:a:google:chrome:6.0.451.0
  • Google Chrome 6.0.452.0
    cpe:2.3:a:google:chrome:6.0.452.0
  • Google Chrome 6.0.452.1
    cpe:2.3:a:google:chrome:6.0.452.1
  • Google Chrome 6.0.453.0
    cpe:2.3:a:google:chrome:6.0.453.0
  • Google Chrome 6.0.453.1
    cpe:2.3:a:google:chrome:6.0.453.1
  • cpe:2.3:a:google:chrome:6.0.454.0
  • cpe:2.3:a:google:chrome:6.0.455.0
  • Google Chrome 6.0.456.0
    cpe:2.3:a:google:chrome:6.0.456.0
  • cpe:2.3:a:google:chrome:6.0.457.0
  • Google Chrome 6.0.458.0
    cpe:2.3:a:google:chrome:6.0.458.0
  • Google Chrome 6.0.458.1
    cpe:2.3:a:google:chrome:6.0.458.1
  • Google Chrome 6.0.458.2
    cpe:2.3:a:google:chrome:6.0.458.2
  • cpe:2.3:a:google:chrome:6.0.459.0
  • Google Chrome 6.0.460.0
    cpe:2.3:a:google:chrome:6.0.460.0
  • cpe:2.3:a:google:chrome:6.0.461.0
  • Google Chrome 6.0.462.0
    cpe:2.3:a:google:chrome:6.0.462.0
  • cpe:2.3:a:google:chrome:6.0.464.1
  • cpe:2.3:a:google:chrome:6.0.465.1
  • cpe:2.3:a:google:chrome:6.0.465.2
  • Google Chrome 6.0.466.0
    cpe:2.3:a:google:chrome:6.0.466.0
  • cpe:2.3:a:google:chrome:6.0.466.1
  • cpe:2.3:a:google:chrome:6.0.466.2
  • cpe:2.3:a:google:chrome:6.0.466.3
  • Google Chrome 6.0.466.4
    cpe:2.3:a:google:chrome:6.0.466.4
  • Google Chrome 6.0.466.5
    cpe:2.3:a:google:chrome:6.0.466.5
  • cpe:2.3:a:google:chrome:6.0.466.6
  • Google Chrome 6.0.467.0
    cpe:2.3:a:google:chrome:6.0.467.0
  • Google Chrome 6.0.469.0
    cpe:2.3:a:google:chrome:6.0.469.0
  • Google Chrome 6.0.470.0
    cpe:2.3:a:google:chrome:6.0.470.0
  • cpe:2.3:a:google:chrome:6.0.471.0
  • Google Chrome 6.0.472.0
    cpe:2.3:a:google:chrome:6.0.472.0
  • Google Chrome 6.0.472.1
    cpe:2.3:a:google:chrome:6.0.472.1
  • Google Chrome 6.0.472.2
    cpe:2.3:a:google:chrome:6.0.472.2
  • cpe:2.3:a:google:chrome:6.0.472.3
  • Google Chrome 6.0.472.4
    cpe:2.3:a:google:chrome:6.0.472.4
  • Google Chrome 6.0.472.5
    cpe:2.3:a:google:chrome:6.0.472.5
  • cpe:2.3:a:google:chrome:6.0.472.6
  • Google Chrome 6.0.472.7
    cpe:2.3:a:google:chrome:6.0.472.7
  • Google Chrome 6.0.472.8
    cpe:2.3:a:google:chrome:6.0.472.8
  • Google Chrome 6.0.472.9
    cpe:2.3:a:google:chrome:6.0.472.9
  • cpe:2.3:a:google:chrome:6.0.472.10
  • Google Chrome 6.0.472.11
    cpe:2.3:a:google:chrome:6.0.472.11
  • Google Chrome 6.0.472.12
    cpe:2.3:a:google:chrome:6.0.472.12
  • cpe:2.3:a:google:chrome:6.0.472.13
  • Google Chrome 6.0.472.14
    cpe:2.3:a:google:chrome:6.0.472.14
  • cpe:2.3:a:google:chrome:6.0.472.15
  • cpe:2.3:a:google:chrome:6.0.472.16
  • Google Chrome 6.0.472.17
    cpe:2.3:a:google:chrome:6.0.472.17
  • Google Chrome 6.0.472.18
    cpe:2.3:a:google:chrome:6.0.472.18
  • cpe:2.3:a:google:chrome:6.0.472.19
  • cpe:2.3:a:google:chrome:6.0.472.20
  • cpe:2.3:a:google:chrome:6.0.472.21
  • cpe:2.3:a:google:chrome:6.0.472.22
  • cpe:2.3:a:google:chrome:6.0.472.23
  • Google Chrome 6.0.472.24
    cpe:2.3:a:google:chrome:6.0.472.24
  • Google Chrome 6.0.472.25
    cpe:2.3:a:google:chrome:6.0.472.25
  • Google Chrome 6.0.472.26
    cpe:2.3:a:google:chrome:6.0.472.26
  • Google Chrome 6.0.472.27
    cpe:2.3:a:google:chrome:6.0.472.27
  • Google Chrome 6.0.472.28
    cpe:2.3:a:google:chrome:6.0.472.28
  • cpe:2.3:a:google:chrome:6.0.472.29
  • cpe:2.3:a:google:chrome:6.0.472.30
  • cpe:2.3:a:google:chrome:6.0.472.31
  • cpe:2.3:a:google:chrome:6.0.472.32
  • cpe:2.3:a:google:chrome:6.0.472.33
  • cpe:2.3:a:google:chrome:6.0.472.34
  • cpe:2.3:a:google:chrome:6.0.472.35
  • cpe:2.3:a:google:chrome:6.0.472.36
  • cpe:2.3:a:google:chrome:6.0.472.37
  • Google Chrome 6.0.472.38
    cpe:2.3:a:google:chrome:6.0.472.38
  • Google Chrome 6.0.472.39
    cpe:2.3:a:google:chrome:6.0.472.39
  • Google Chrome 6.0.472.40
    cpe:2.3:a:google:chrome:6.0.472.40
  • cpe:2.3:a:google:chrome:6.0.472.41
  • cpe:2.3:a:google:chrome:6.0.472.42
  • cpe:2.3:a:google:chrome:6.0.472.43
  • cpe:2.3:a:google:chrome:6.0.472.44
  • Google Chrome 6.0.472.45
    cpe:2.3:a:google:chrome:6.0.472.45
  • cpe:2.3:a:google:chrome:6.0.472.46
  • Google Chrome 6.0.472.47
    cpe:2.3:a:google:chrome:6.0.472.47
  • Google Chrome 6.0.472.48
    cpe:2.3:a:google:chrome:6.0.472.48
  • cpe:2.3:a:google:chrome:6.0.472.49
  • cpe:2.3:a:google:chrome:6.0.472.50
  • cpe:2.3:a:google:chrome:6.0.472.51
  • Google Chrome 6.0.472.52
    cpe:2.3:a:google:chrome:6.0.472.52
  • Google Chrome 6.0.472.53
    cpe:2.3:a:google:chrome:6.0.472.53
  • Google Chrome 6.0.472.54
    cpe:2.3:a:google:chrome:6.0.472.54
  • Google Chrome 6.0.472.55
    cpe:2.3:a:google:chrome:6.0.472.55
  • cpe:2.3:a:google:chrome:6.0.472.56
  • Google Chrome 6.0.472.57
    cpe:2.3:a:google:chrome:6.0.472.57
  • cpe:2.3:a:google:chrome:6.0.472.58
  • cpe:2.3:a:google:chrome:6.0.472.59
  • Google Chrome 6.0.472.60
    cpe:2.3:a:google:chrome:6.0.472.60
  • Google Chrome 6.0.472.61
    cpe:2.3:a:google:chrome:6.0.472.61
  • Google Chrome 6.0.472.62
    cpe:2.3:a:google:chrome:6.0.472.62
  • cpe:2.3:a:google:chrome:6.0.472.63
  • Google Chrome 6.0.473.0
    cpe:2.3:a:google:chrome:6.0.473.0
  • cpe:2.3:a:google:chrome:6.0.474.0
  • cpe:2.3:a:google:chrome:6.0.475.0
  • Google Chrome 6.0.476.0
    cpe:2.3:a:google:chrome:6.0.476.0
  • Google Chrome 6.0.477.0
    cpe:2.3:a:google:chrome:6.0.477.0
  • Google Chrome 6.0.478.0
    cpe:2.3:a:google:chrome:6.0.478.0
  • cpe:2.3:a:google:chrome:6.0.479.0
  • Google Chrome 6.0.480.0
    cpe:2.3:a:google:chrome:6.0.480.0
  • Google Chrome 6.0.481.0
    cpe:2.3:a:google:chrome:6.0.481.0
  • Google Chrome 6.0.482.0
    cpe:2.3:a:google:chrome:6.0.482.0
  • Google Chrome 6.0.483.0
    cpe:2.3:a:google:chrome:6.0.483.0
  • cpe:2.3:a:google:chrome:6.0.484.0
  • Google Chrome 6.0.485.0
    cpe:2.3:a:google:chrome:6.0.485.0
  • Google Chrome 6.0.486.0
    cpe:2.3:a:google:chrome:6.0.486.0
  • cpe:2.3:a:google:chrome:6.0.487.0
  • cpe:2.3:a:google:chrome:6.0.488.0
  • cpe:2.3:a:google:chrome:6.0.489.0
  • Google Chrome 6.0.490.0
    cpe:2.3:a:google:chrome:6.0.490.0
  • Google Chrome 6.0.490.1
    cpe:2.3:a:google:chrome:6.0.490.1
  • cpe:2.3:a:google:chrome:6.0.491.0
  • cpe:2.3:a:google:chrome:6.0.492.0
  • cpe:2.3:a:google:chrome:6.0.493.0
  • cpe:2.3:a:google:chrome:6.0.494.0
  • cpe:2.3:a:google:chrome:6.0.495.0
  • cpe:2.3:a:google:chrome:6.0.495.1
  • cpe:2.3:a:google:chrome:6.0.496.0
  • Google Chrome 7.0.497.0
    cpe:2.3:a:google:chrome:7.0.497.0
  • Google Chrome 7.0.498.0
    cpe:2.3:a:google:chrome:7.0.498.0
  • Google Chrome 7.0.499.0
    cpe:2.3:a:google:chrome:7.0.499.0
  • Google Chrome 7.0.499.1
    cpe:2.3:a:google:chrome:7.0.499.1
  • cpe:2.3:a:google:chrome:7.0.500.0
  • cpe:2.3:a:google:chrome:7.0.500.1
  • Google Chrome 7.0.503.0
    cpe:2.3:a:google:chrome:7.0.503.0
  • Google Chrome 7.0.503.1
    cpe:2.3:a:google:chrome:7.0.503.1
  • Google Chrome 7.0.504.0
    cpe:2.3:a:google:chrome:7.0.504.0
  • cpe:2.3:a:google:chrome:7.0.505.0
  • Google Chrome 7.0.506.0
    cpe:2.3:a:google:chrome:7.0.506.0
  • cpe:2.3:a:google:chrome:7.0.507.0
  • cpe:2.3:a:google:chrome:7.0.507.1
  • cpe:2.3:a:google:chrome:7.0.507.2
  • Google Chrome 7.0.507.3
    cpe:2.3:a:google:chrome:7.0.507.3
  • Google Chrome 7.0.509.0
    cpe:2.3:a:google:chrome:7.0.509.0
  • Google Chrome 7.0.510.0
    cpe:2.3:a:google:chrome:7.0.510.0
  • Google Chrome 7.0.511.1
    cpe:2.3:a:google:chrome:7.0.511.1
  • Google Chrome 7.0.511.2
    cpe:2.3:a:google:chrome:7.0.511.2
  • Google Chrome 7.0.511.4
    cpe:2.3:a:google:chrome:7.0.511.4
  • Google Chrome 7.0.512.0
    cpe:2.3:a:google:chrome:7.0.512.0
  • cpe:2.3:a:google:chrome:7.0.513.0
  • cpe:2.3:a:google:chrome:7.0.514.0
  • cpe:2.3:a:google:chrome:7.0.514.1
  • Google Chrome 7.0.515.0
    cpe:2.3:a:google:chrome:7.0.515.0
  • cpe:2.3:a:google:chrome:7.0.516.0
  • Google Chrome 7.0.517.0
    cpe:2.3:a:google:chrome:7.0.517.0
  • Google Chrome 7.0.517.2
    cpe:2.3:a:google:chrome:7.0.517.2
  • Google Chrome 7.0.517.4
    cpe:2.3:a:google:chrome:7.0.517.4
  • Google Chrome 7.0.517.5
    cpe:2.3:a:google:chrome:7.0.517.5
  • Google Chrome 7.0.517.6
    cpe:2.3:a:google:chrome:7.0.517.6
  • cpe:2.3:a:google:chrome:7.0.517.7
  • cpe:2.3:a:google:chrome:7.0.517.8
  • cpe:2.3:a:google:chrome:7.0.517.9
  • cpe:2.3:a:google:chrome:7.0.517.10
  • cpe:2.3:a:google:chrome:7.0.517.11
  • cpe:2.3:a:google:chrome:7.0.517.12
  • cpe:2.3:a:google:chrome:7.0.517.13
  • Google Chrome 7.0.517.14
    cpe:2.3:a:google:chrome:7.0.517.14
  • cpe:2.3:a:google:chrome:7.0.517.16
  • Google Chrome 7.0.517.17
    cpe:2.3:a:google:chrome:7.0.517.17
  • Google Chrome 7.0.517.18
    cpe:2.3:a:google:chrome:7.0.517.18
  • cpe:2.3:a:google:chrome:7.0.517.19
  • Google Chrome 7.0.517.20
    cpe:2.3:a:google:chrome:7.0.517.20
  • cpe:2.3:a:google:chrome:7.0.517.21
  • cpe:2.3:a:google:chrome:7.0.517.22
  • cpe:2.3:a:google:chrome:7.0.517.23
  • cpe:2.3:a:google:chrome:7.0.517.24
  • Google Chrome 7.0.517.25
    cpe:2.3:a:google:chrome:7.0.517.25
  • Google Chrome 7.0.517.26
    cpe:2.3:a:google:chrome:7.0.517.26
  • cpe:2.3:a:google:chrome:7.0.517.27
  • Google Chrome 7.0.517.28
    cpe:2.3:a:google:chrome:7.0.517.28
  • Google Chrome 7.0.517.29
    cpe:2.3:a:google:chrome:7.0.517.29
  • Google Chrome 7.0.517.30
    cpe:2.3:a:google:chrome:7.0.517.30
  • cpe:2.3:a:google:chrome:7.0.517.31
  • cpe:2.3:a:google:chrome:7.0.517.32
  • cpe:2.3:a:google:chrome:7.0.517.33
  • Google Chrome 7.0.517.34
    cpe:2.3:a:google:chrome:7.0.517.34
  • Google Chrome 7.0.517.35
    cpe:2.3:a:google:chrome:7.0.517.35
  • Google Chrome 7.0.517.36
    cpe:2.3:a:google:chrome:7.0.517.36
  • cpe:2.3:a:google:chrome:7.0.517.37
  • cpe:2.3:a:google:chrome:7.0.517.38
  • Google Chrome 7.0.517.39
    cpe:2.3:a:google:chrome:7.0.517.39
  • cpe:2.3:a:google:chrome:7.0.517.40
  • Google Chrome 7.0.517.41
    cpe:2.3:a:google:chrome:7.0.517.41
  • cpe:2.3:a:google:chrome:7.0.517.42
  • Google Chrome 7.0.517.43
    cpe:2.3:a:google:chrome:7.0.517.43
  • cpe:2.3:a:google:chrome:7.0.517.44
  • Google Chrome 7.0.518.0
    cpe:2.3:a:google:chrome:7.0.518.0
  • cpe:2.3:a:google:chrome:7.0.519.0
  • Google Chrome 7.0.520.0
    cpe:2.3:a:google:chrome:7.0.520.0
  • Google Chrome 7.0.521.0
    cpe:2.3:a:google:chrome:7.0.521.0
  • cpe:2.3:a:google:chrome:7.0.522.0
  • Google Chrome 7.0.524.0
    cpe:2.3:a:google:chrome:7.0.524.0
  • cpe:2.3:a:google:chrome:7.0.525.0
  • Google Chrome 7.0.526.0
    cpe:2.3:a:google:chrome:7.0.526.0
  • cpe:2.3:a:google:chrome:7.0.528.0
  • cpe:2.3:a:google:chrome:7.0.529.0
  • cpe:2.3:a:google:chrome:7.0.529.1
  • cpe:2.3:a:google:chrome:7.0.529.2
  • Google Chrome 7.0.5230.0
    cpe:2.3:a:google:chrome:7.0.530.0
  • Google Chrome 7.0.5231.0
    cpe:2.3:a:google:chrome:7.0.531.0
  • Google Chrome 7.0.5231.1
    cpe:2.3:a:google:chrome:7.0.531.1
  • cpe:2.3:a:google:chrome:7.0.531.2
  • Google Chrome 7.0.535.1
    cpe:2.3:a:google:chrome:7.0.535.1
  • Google Chrome 7.0.535.2
    cpe:2.3:a:google:chrome:7.0.535.2
  • Google Chrome 7.0.536.0
    cpe:2.3:a:google:chrome:7.0.536.0
  • Google Chrome 7.0.536.1
    cpe:2.3:a:google:chrome:7.0.536.1
  • Google Chrome 7.0.536.2
    cpe:2.3:a:google:chrome:7.0.536.2
  • Google Chrome 7.0.536.3
    cpe:2.3:a:google:chrome:7.0.536.3
  • cpe:2.3:a:google:chrome:7.0.536.4
  • cpe:2.3:a:google:chrome:7.0.537.0
  • cpe:2.3:a:google:chrome:7.0.538.0
  • Google Chrome 7.0.539.0
    cpe:2.3:a:google:chrome:7.0.539.0
  • Google Chrome 7.0.540.0
    cpe:2.3:a:google:chrome:7.0.540.0
  • Google Chrome 7.0.541.0
    cpe:2.3:a:google:chrome:7.0.541.0
  • cpe:2.3:a:google:chrome:7.0.542.0
  • cpe:2.3:a:google:chrome:7.0.544.0
  • Google Chrome 7.0.547.0
    cpe:2.3:a:google:chrome:7.0.547.0
  • cpe:2.3:a:google:chrome:7.0.547.1
  • Google Chrome 7.0.548.0
    cpe:2.3:a:google:chrome:7.0.548.0
  • Google Chrome 8.0.549.0
    cpe:2.3:a:google:chrome:8.0.549.0
  • cpe:2.3:a:google:chrome:8.0.550.0
  • Google Chrome 8.0.551.0
    cpe:2.3:a:google:chrome:8.0.551.0
  • Google Chrome 8.0.551.1
    cpe:2.3:a:google:chrome:8.0.551.1
  • cpe:2.3:a:google:chrome:8.0.552.0
  • Google Chrome 8.0.552.1
    cpe:2.3:a:google:chrome:8.0.552.1
  • Google Chrome 8.0.552.2
    cpe:2.3:a:google:chrome:8.0.552.2
  • Google Chrome 8.0.552.4
    cpe:2.3:a:google:chrome:8.0.552.4
  • Google Chrome 8.0.552.5
    cpe:2.3:a:google:chrome:8.0.552.5
  • cpe:2.3:a:google:chrome:8.0.552.6
  • Google Chrome 8.0.552.7
    cpe:2.3:a:google:chrome:8.0.552.7
  • cpe:2.3:a:google:chrome:8.0.552.8
  • Google Chrome 8.0.552.9
    cpe:2.3:a:google:chrome:8.0.552.9
  • Google Chrome 8.0.552.10
    cpe:2.3:a:google:chrome:8.0.552.10
  • cpe:2.3:a:google:chrome:8.0.552.11
  • Google Chrome 8.0.552.12
    cpe:2.3:a:google:chrome:8.0.552.12
  • Google Chrome 8.0.552.13
    cpe:2.3:a:google:chrome:8.0.552.13
  • Google Chrome 8.0.552.14
    cpe:2.3:a:google:chrome:8.0.552.14
  • Google Chrome 8.0.552.15
    cpe:2.3:a:google:chrome:8.0.552.15
  • cpe:2.3:a:google:chrome:8.0.552.16
  • Google Chrome 8.0.552.17
    cpe:2.3:a:google:chrome:8.0.552.17
  • cpe:2.3:a:google:chrome:8.0.552.18
  • Google Chrome 8.0.552.19
    cpe:2.3:a:google:chrome:8.0.552.19
  • cpe:2.3:a:google:chrome:8.0.552.20
  • Google Chrome 8.0.552.21
    cpe:2.3:a:google:chrome:8.0.552.21
  • cpe:2.3:a:google:chrome:8.0.552.23
  • cpe:2.3:a:google:chrome:8.0.552.24
  • Google Chrome 8.0.552.25
    cpe:2.3:a:google:chrome:8.0.552.25
  • Google Chrome 8.0.552.26
    cpe:2.3:a:google:chrome:8.0.552.26
  • Google Chrome 8.0.552.27
    cpe:2.3:a:google:chrome:8.0.552.27
  • cpe:2.3:a:google:chrome:8.0.552.28
  • Google Chrome 8.0.552.29
    cpe:2.3:a:google:chrome:8.0.552.29
  • Google Chrome 8.0.552.35
    cpe:2.3:a:google:chrome:8.0.552.35
  • cpe:2.3:a:google:chrome:8.0.552.40
  • Google Chrome 8.0.552.41
    cpe:2.3:a:google:chrome:8.0.552.41
  • cpe:2.3:a:google:chrome:8.0.552.42
  • Google Chrome 8.0.552.43
    cpe:2.3:a:google:chrome:8.0.552.43
  • Google Chrome 8.0.552.44
    cpe:2.3:a:google:chrome:8.0.552.44
  • cpe:2.3:a:google:chrome:8.0.552.45
  • cpe:2.3:a:google:chrome:8.0.552.47
  • Google Chrome 8.0.552.48
    cpe:2.3:a:google:chrome:8.0.552.48
  • cpe:2.3:a:google:chrome:8.0.552.49
  • Google Chrome 8.0.552.50
    cpe:2.3:a:google:chrome:8.0.552.50
  • cpe:2.3:a:google:chrome:8.0.552.51
  • Google Chrome 8.0.552.52
    cpe:2.3:a:google:chrome:8.0.552.52
  • cpe:2.3:a:google:chrome:8.0.552.100
  • Google Chrome 8.0.552.101
    cpe:2.3:a:google:chrome:8.0.552.101
  • cpe:2.3:a:google:chrome:8.0.552.102
  • cpe:2.3:a:google:chrome:8.0.552.103
  • cpe:2.3:a:google:chrome:8.0.552.104
  • cpe:2.3:a:google:chrome:8.0.552.105
  • Google Chrome 8.0.552.200
    cpe:2.3:a:google:chrome:8.0.552.200
  • cpe:2.3:a:google:chrome:8.0.552.201
  • cpe:2.3:a:google:chrome:8.0.552.202
  • cpe:2.3:a:google:chrome:8.0.552.203
  • cpe:2.3:a:google:chrome:8.0.552.204
  • Google Chrome 8.0.552.205
    cpe:2.3:a:google:chrome:8.0.552.205
  • Google Chrome 8.0.552.206
    cpe:2.3:a:google:chrome:8.0.552.206
  • cpe:2.3:a:google:chrome:8.0.552.207
  • Google Chrome 8.0.552.208
    cpe:2.3:a:google:chrome:8.0.552.208
  • cpe:2.3:a:google:chrome:8.0.552.209
  • cpe:2.3:a:google:chrome:8.0.552.210
  • cpe:2.3:a:google:chrome:8.0.552.211
  • Google Chrome 8.0.552.212
    cpe:2.3:a:google:chrome:8.0.552.212
  • cpe:2.3:a:google:chrome:8.0.552.213
  • Google Chrome 8.0.552.214
    cpe:2.3:a:google:chrome:8.0.552.214
  • Google Chrome 8.0.552.215
    cpe:2.3:a:google:chrome:8.0.552.215
  • cpe:2.3:a:google:chrome:8.0.552.216
  • Google Chrome 8.0.552.217
    cpe:2.3:a:google:chrome:8.0.552.217
  • Google Chrome 8.0.552.218
    cpe:2.3:a:google:chrome:8.0.552.218
  • Google Chrome 8.0.552.219
    cpe:2.3:a:google:chrome:8.0.552.219
  • Google Chrome 8.0.552.220
    cpe:2.3:a:google:chrome:8.0.552.220
  • Google Chrome 8.0.552.221
    cpe:2.3:a:google:chrome:8.0.552.221
  • cpe:2.3:a:google:chrome:8.0.552.222
  • cpe:2.3:a:google:chrome:8.0.552.223
  • cpe:2.3:a:google:chrome:8.0.552.224
  • cpe:2.3:a:google:chrome:8.0.552.225
  • cpe:2.3:a:google:chrome:8.0.552.226
  • Google Chrome 8.0.552.227
    cpe:2.3:a:google:chrome:8.0.552.227
  • cpe:2.3:a:google:chrome:8.0.552.228
  • cpe:2.3:a:google:chrome:8.0.552.229
  • Google Chrome 8.0.552.230
    cpe:2.3:a:google:chrome:8.0.552.230
  • Google Chrome 8.0.552.231
    cpe:2.3:a:google:chrome:8.0.552.231
  • Google Chrome 8.0.552.232
    cpe:2.3:a:google:chrome:8.0.552.232
  • cpe:2.3:a:google:chrome:8.0.552.233
  • Google Chrome 8.0.552.234
    cpe:2.3:a:google:chrome:8.0.552.234
  • cpe:2.3:a:google:chrome:8.0.552.235
  • cpe:2.3:a:google:chrome:8.0.552.237
  • cpe:2.3:a:google:chrome:8.0.552.300
  • cpe:2.3:a:google:chrome:8.0.552.301
  • Google Chrome 8.0.552.302
    cpe:2.3:a:google:chrome:8.0.552.302
  • Google Chrome 8.0.552.303
    cpe:2.3:a:google:chrome:8.0.552.303
  • Google Chrome 8.0.552.304
    cpe:2.3:a:google:chrome:8.0.552.304
  • cpe:2.3:a:google:chrome:8.0.552.305
  • cpe:2.3:a:google:chrome:8.0.552.306
  • Google Chrome 8.0.552.307
    cpe:2.3:a:google:chrome:8.0.552.307
  • Google Chrome 8.0.552.308
    cpe:2.3:a:google:chrome:8.0.552.308
  • Google Chrome 8.0.552.309
    cpe:2.3:a:google:chrome:8.0.552.309
  • Google Chrome 8.0.552.310
    cpe:2.3:a:google:chrome:8.0.552.310
  • cpe:2.3:a:google:chrome:8.0.552.311
  • cpe:2.3:a:google:chrome:8.0.552.312
  • cpe:2.3:a:google:chrome:8.0.552.313
  • Google Chrome 8.0.552.315
    cpe:2.3:a:google:chrome:8.0.552.315
  • Google Chrome 8.0.552.316
    cpe:2.3:a:google:chrome:8.0.552.316
  • cpe:2.3:a:google:chrome:8.0.552.317
  • Google Chrome 8.0.552.318
    cpe:2.3:a:google:chrome:8.0.552.318
  • cpe:2.3:a:google:chrome:8.0.552.319
  • cpe:2.3:a:google:chrome:8.0.552.320
  • Google Chrome 8.0.552.321
    cpe:2.3:a:google:chrome:8.0.552.321
  • cpe:2.3:a:google:chrome:8.0.552.322
  • cpe:2.3:a:google:chrome:8.0.552.323
  • cpe:2.3:a:google:chrome:8.0.552.324
  • cpe:2.3:a:google:chrome:8.0.552.325
  • Google Chrome 8.0.552.326
    cpe:2.3:a:google:chrome:8.0.552.326
  • Google Chrome 8.0.552.327
    cpe:2.3:a:google:chrome:8.0.552.327
  • cpe:2.3:a:google:chrome:8.0.552.328
  • cpe:2.3:a:google:chrome:8.0.552.329
  • Google Chrome 8.0.552.330
    cpe:2.3:a:google:chrome:8.0.552.330
  • Google Chrome 8.0.552.331
    cpe:2.3:a:google:chrome:8.0.552.331
  • Google Chrome 8.0.552.332
    cpe:2.3:a:google:chrome:8.0.552.332
  • cpe:2.3:a:google:chrome:8.0.552.333
  • Google Chrome 8.0.552.334
    cpe:2.3:a:google:chrome:8.0.552.334
  • cpe:2.3:a:google:chrome:8.0.552.335
  • Google Chrome 8.0.552.336
    cpe:2.3:a:google:chrome:8.0.552.336
  • Google Chrome 8.0.552.337
    cpe:2.3:a:google:chrome:8.0.552.337
  • Google Chrome 8.0.552.338
    cpe:2.3:a:google:chrome:8.0.552.338
  • cpe:2.3:a:google:chrome:8.0.552.339
  • cpe:2.3:a:google:chrome:8.0.552.340
  • Google Chrome 8.0.552.341
    cpe:2.3:a:google:chrome:8.0.552.341
  • Google Chrome 8.0.552.342
    cpe:2.3:a:google:chrome:8.0.552.342
  • cpe:2.3:a:google:chrome:8.0.552.343
  • cpe:2.3:a:google:chrome:8.0.552.344
  • cpe:2.3:a:google:chrome:8.0.553.0
  • cpe:2.3:a:google:chrome:8.0.554.0
  • cpe:2.3:a:google:chrome:8.0.555.0
  • cpe:2.3:a:google:chrome:8.0.556.0
  • Google Chrome 8.0.557.0
    cpe:2.3:a:google:chrome:8.0.557.0
  • Google Chrome 8.0.558.0
    cpe:2.3:a:google:chrome:8.0.558.0
  • cpe:2.3:a:google:chrome:8.0.559.0
  • cpe:2.3:a:google:chrome:8.0.560.0
  • Google Chrome 8.0.561.0
    cpe:2.3:a:google:chrome:8.0.561.0
  • cpe:2.3:a:google:chrome:9.0.562.0
  • Google Chrome 9.0.563.0
    cpe:2.3:a:google:chrome:9.0.563.0
  • cpe:2.3:a:google:chrome:9.0.564.0
  • Google Chrome 9.0.565.0
    cpe:2.3:a:google:chrome:9.0.565.0
  • Google Chrome 9.0.566.0
    cpe:2.3:a:google:chrome:9.0.566.0
  • cpe:2.3:a:google:chrome:9.0.567.0
  • cpe:2.3:a:google:chrome:9.0.568.0
  • cpe:2.3:a:google:chrome:9.0.569.0
  • cpe:2.3:a:google:chrome:9.0.570.0
  • Google Chrome 9.0.570.1
    cpe:2.3:a:google:chrome:9.0.570.1
  • Google Chrome 9.0.571.0
    cpe:2.3:a:google:chrome:9.0.571.0
  • Google Chrome 9.0.572.0
    cpe:2.3:a:google:chrome:9.0.572.0
  • Google Chrome 9.0.572.1
    cpe:2.3:a:google:chrome:9.0.572.1
  • Google Chrome 9.0.573.0
    cpe:2.3:a:google:chrome:9.0.573.0
  • cpe:2.3:a:google:chrome:9.0.574.0
  • Google Chrome 9.0.575.0
    cpe:2.3:a:google:chrome:9.0.575.0
  • cpe:2.3:a:google:chrome:9.0.576.0
  • Google Chrome 9.0.577.0
    cpe:2.3:a:google:chrome:9.0.577.0
  • Google Chrome 9.0.578.0
    cpe:2.3:a:google:chrome:9.0.578.0
  • cpe:2.3:a:google:chrome:9.0.579.0
  • Google Chrome 9.0.580.0
    cpe:2.3:a:google:chrome:9.0.580.0
  • Google Chrome 9.0.581.0
    cpe:2.3:a:google:chrome:9.0.581.0
  • Google Chrome 9.0.582.0
    cpe:2.3:a:google:chrome:9.0.582.0
  • cpe:2.3:a:google:chrome:9.0.583.0
  • cpe:2.3:a:google:chrome:9.0.584.0
  • cpe:2.3:a:google:chrome:9.0.585.0
  • Google Chrome 9.0.586.0
    cpe:2.3:a:google:chrome:9.0.586.0
  • cpe:2.3:a:google:chrome:9.0.587.0
  • Google Chrome 9.0.587.1
    cpe:2.3:a:google:chrome:9.0.587.1
  • Google Chrome 9.0.588.0
    cpe:2.3:a:google:chrome:9.0.588.0
  • Google Chrome 9.0.589.0
    cpe:2.3:a:google:chrome:9.0.589.0
  • Google Chrome 9.0.590.0
    cpe:2.3:a:google:chrome:9.0.590.0
  • Google Chrome 9.0.591.0
    cpe:2.3:a:google:chrome:9.0.591.0
  • Google Chrome 9.0.592.0
    cpe:2.3:a:google:chrome:9.0.592.0
  • Google Chrome 9.0.593.0
    cpe:2.3:a:google:chrome:9.0.593.0
  • cpe:2.3:a:google:chrome:9.0.594.0
  • cpe:2.3:a:google:chrome:9.0.595.0
  • Google Chrome 9.0.596.0
    cpe:2.3:a:google:chrome:9.0.596.0
  • Google Chrome 9.0.597.0
    cpe:2.3:a:google:chrome:9.0.597.0
  • cpe:2.3:a:google:chrome:9.0.597.1
  • Google Chrome 9.0.597.2
    cpe:2.3:a:google:chrome:9.0.597.2
  • Google Chrome 9.0.597.4
    cpe:2.3:a:google:chrome:9.0.597.4
  • Google Chrome 9.0.597.5
    cpe:2.3:a:google:chrome:9.0.597.5
  • cpe:2.3:a:google:chrome:9.0.597.7
  • Google Chrome 9.0.597.8
    cpe:2.3:a:google:chrome:9.0.597.8
  • Google Chrome 9.0.597.9
    cpe:2.3:a:google:chrome:9.0.597.9
  • cpe:2.3:a:google:chrome:9.0.597.10
  • cpe:2.3:a:google:chrome:9.0.597.11
  • cpe:2.3:a:google:chrome:9.0.597.12
  • Google Chrome 9.0.597.14
    cpe:2.3:a:google:chrome:9.0.597.14
  • Google Chrome 9.0.597.15
    cpe:2.3:a:google:chrome:9.0.597.15
  • Google Chrome 9.0.597.16
    cpe:2.3:a:google:chrome:9.0.597.16
  • Google Chrome 9.0.597.17
    cpe:2.3:a:google:chrome:9.0.597.17
  • Google Chrome 9.0.597.18
    cpe:2.3:a:google:chrome:9.0.597.18
  • cpe:2.3:a:google:chrome:9.0.597.19
  • Google Chrome 9.0.597.20
    cpe:2.3:a:google:chrome:9.0.597.20
  • cpe:2.3:a:google:chrome:9.0.597.21
  • cpe:2.3:a:google:chrome:9.0.597.22
  • cpe:2.3:a:google:chrome:9.0.597.23
  • Google Chrome 9.0.597.24
    cpe:2.3:a:google:chrome:9.0.597.24
  • Google Chrome 9.0.597.25
    cpe:2.3:a:google:chrome:9.0.597.25
  • Google Chrome 9.0.597.26
    cpe:2.3:a:google:chrome:9.0.597.26
  • cpe:2.3:a:google:chrome:9.0.597.27
  • cpe:2.3:a:google:chrome:9.0.597.28
  • Google Chrome 9.0.597.29
    cpe:2.3:a:google:chrome:9.0.597.29
  • Google Chrome 9.0.597.30
    cpe:2.3:a:google:chrome:9.0.597.30
  • Google Chrome 9.0.597.31
    cpe:2.3:a:google:chrome:9.0.597.31
  • Google Chrome 9.0.597.32
    cpe:2.3:a:google:chrome:9.0.597.32
  • cpe:2.3:a:google:chrome:9.0.597.33
  • cpe:2.3:a:google:chrome:9.0.597.34
  • cpe:2.3:a:google:chrome:9.0.597.35
  • Google Chrome 9.0.597.36
    cpe:2.3:a:google:chrome:9.0.597.36
  • cpe:2.3:a:google:chrome:9.0.597.37
  • cpe:2.3:a:google:chrome:9.0.597.38
  • cpe:2.3:a:google:chrome:9.0.597.39
  • Google Chrome 9.0.597.40
    cpe:2.3:a:google:chrome:9.0.597.40
  • cpe:2.3:a:google:chrome:9.0.597.41
  • cpe:2.3:a:google:chrome:9.0.597.42
  • cpe:2.3:a:google:chrome:9.0.597.44
  • Google Chrome 9.0.597.45
    cpe:2.3:a:google:chrome:9.0.597.45
  • cpe:2.3:a:google:chrome:9.0.597.46
  • Google Chrome 9.0.597.47
    cpe:2.3:a:google:chrome:9.0.597.47
  • cpe:2.3:a:google:chrome:9.0.597.54
  • Google Chrome 9.0.597.55
    cpe:2.3:a:google:chrome:9.0.597.55
  • cpe:2.3:a:google:chrome:9.0.597.56
  • cpe:2.3:a:google:chrome:9.0.597.57
  • cpe:2.3:a:google:chrome:9.0.597.58
  • cpe:2.3:a:google:chrome:9.0.597.59
  • cpe:2.3:a:google:chrome:9.0.597.60
  • cpe:2.3:a:google:chrome:9.0.597.62
  • cpe:2.3:a:google:chrome:9.0.597.63
  • cpe:2.3:a:google:chrome:9.0.597.64
  • Google Chrome 9.0.597.65
    cpe:2.3:a:google:chrome:9.0.597.65
  • Google Chrome 9.0.597.66
    cpe:2.3:a:google:chrome:9.0.597.66
  • Google Chrome 9.0.597.67
    cpe:2.3:a:google:chrome:9.0.597.67
  • cpe:2.3:a:google:chrome:9.0.597.68
  • Google Chrome 9.0.597.69
    cpe:2.3:a:google:chrome:9.0.597.69
  • cpe:2.3:a:google:chrome:9.0.597.70
  • Google Chrome 9.0.597.71
    cpe:2.3:a:google:chrome:9.0.597.71
  • Google Chrome 9.0.597.72
    cpe:2.3:a:google:chrome:9.0.597.72
  • Google Chrome 9.0.597.73
    cpe:2.3:a:google:chrome:9.0.597.73
  • Google Chrome 9.0.597.74
    cpe:2.3:a:google:chrome:9.0.597.74
  • Google Chrome 9.0.597.75
    cpe:2.3:a:google:chrome:9.0.597.75
  • Google Chrome 9.0.597.76
    cpe:2.3:a:google:chrome:9.0.597.76
  • cpe:2.3:a:google:chrome:9.0.597.77
  • cpe:2.3:a:google:chrome:9.0.597.78
  • Google Chrome 9.0.597.79
    cpe:2.3:a:google:chrome:9.0.597.79
  • cpe:2.3:a:google:chrome:9.0.597.80
  • Google Chrome 9.0.597.81
    cpe:2.3:a:google:chrome:9.0.597.81
  • Google Chrome 9.0.597.82
    cpe:2.3:a:google:chrome:9.0.597.82
  • cpe:2.3:a:google:chrome:9.0.597.83
  • Google Chrome 9.0.597.84
    cpe:2.3:a:google:chrome:9.0.597.84
  • cpe:2.3:a:google:chrome:9.0.597.85
  • Google Chrome 9.0.597.86
    cpe:2.3:a:google:chrome:9.0.597.86
  • Google Chrome 9.0.597.88
    cpe:2.3:a:google:chrome:9.0.597.88
  • cpe:2.3:a:google:chrome:9.0.597.90
  • cpe:2.3:a:google:chrome:9.0.597.92
  • cpe:2.3:a:google:chrome:9.0.597.94
  • Google Chrome 9.0.597.96
    cpe:2.3:a:google:chrome:9.0.597.96
  • cpe:2.3:a:google:chrome:9.0.597.97
  • cpe:2.3:a:google:chrome:9.0.597.98
  • Google Chrome 9.0.597.99
    cpe:2.3:a:google:chrome:9.0.597.99
  • Google Chrome 9.0.597.100
    cpe:2.3:a:google:chrome:9.0.597.100
  • cpe:2.3:a:google:chrome:9.0.597.101
  • cpe:2.3:a:google:chrome:9.0.597.102
  • cpe:2.3:a:google:chrome:9.0.597.106
  • Google Chrome 9.0.597.107
    cpe:2.3:a:google:chrome:9.0.597.107
  • cpe:2.3:a:google:chrome:9.0.598.0
  • Google Chrome 9.0.599.0
    cpe:2.3:a:google:chrome:9.0.599.0
  • Google Chrome 9.0.600.0
    cpe:2.3:a:google:chrome:9.0.600.0
  • Google Chrome 10.0.601.0
    cpe:2.3:a:google:chrome:10.0.601.0
  • cpe:2.3:a:google:chrome:10.0.602.0
  • cpe:2.3:a:google:chrome:10.0.603.0
  • Google Chrome 10.0.603.2
    cpe:2.3:a:google:chrome:10.0.603.2
  • Google Chrome 10.0.603.3
    cpe:2.3:a:google:chrome:10.0.603.3
  • Google Chrome 10.0.604.0
    cpe:2.3:a:google:chrome:10.0.604.0
  • Google Chrome 10.0.605.0
    cpe:2.3:a:google:chrome:10.0.605.0
  • cpe:2.3:a:google:chrome:10.0.606.0
  • Google Chrome 10.0.607.0
    cpe:2.3:a:google:chrome:10.0.607.0
  • Google Chrome 10.0.608.0
    cpe:2.3:a:google:chrome:10.0.608.0
  • Google Chrome 10.0.609.0
    cpe:2.3:a:google:chrome:10.0.609.0
  • Google Chrome 10.0.610.0
    cpe:2.3:a:google:chrome:10.0.610.0
  • Google Chrome 10.0.611.0
    cpe:2.3:a:google:chrome:10.0.611.0
  • Google Chrome 10.0.611.1
    cpe:2.3:a:google:chrome:10.0.611.1
  • cpe:2.3:a:google:chrome:10.0.612.0
  • Google Chrome 10.0.612.1
    cpe:2.3:a:google:chrome:10.0.612.1
  • cpe:2.3:a:google:chrome:10.0.612.2
  • cpe:2.3:a:google:chrome:10.0.612.3
  • cpe:2.3:a:google:chrome:10.0.613.0
  • cpe:2.3:a:google:chrome:10.0.614.0
  • cpe:2.3:a:google:chrome:10.0.615.0
  • Google Chrome 10.0.616.0
    cpe:2.3:a:google:chrome:10.0.616.0
  • cpe:2.3:a:google:chrome:10.0.617.0
  • Google Chrome 10.0.618.0
    cpe:2.3:a:google:chrome:10.0.618.0
  • cpe:2.3:a:google:chrome:10.0.619.0
  • cpe:2.3:a:google:chrome:10.0.620.0
  • cpe:2.3:a:google:chrome:10.0.621.0
  • cpe:2.3:a:google:chrome:10.0.622.0
  • Google Chrome 10.0.622.1
    cpe:2.3:a:google:chrome:10.0.622.1
  • cpe:2.3:a:google:chrome:10.0.623.0
  • cpe:2.3:a:google:chrome:10.0.624.0
  • cpe:2.3:a:google:chrome:10.0.625.0
  • Google Chrome 10.0.626.0
    cpe:2.3:a:google:chrome:10.0.626.0
  • Google Chrome 10.0.627.0
    cpe:2.3:a:google:chrome:10.0.627.0
  • Google Chrome 10.0.628.0
    cpe:2.3:a:google:chrome:10.0.628.0
  • cpe:2.3:a:google:chrome:10.0.629.0
  • Google Chrome 10.0.630.0
    cpe:2.3:a:google:chrome:10.0.630.0
  • cpe:2.3:a:google:chrome:10.0.631.0
  • cpe:2.3:a:google:chrome:10.0.632.0
  • Google Chrome 10.0.633.0
    cpe:2.3:a:google:chrome:10.0.633.0
  • cpe:2.3:a:google:chrome:10.0.634.0
  • cpe:2.3:a:google:chrome:10.0.634.1
  • cpe:2.3:a:google:chrome:10.0.635.0
  • cpe:2.3:a:google:chrome:10.0.636.0
  • Google Chrome 10.0.638.0
    cpe:2.3:a:google:chrome:10.0.638.0
  • cpe:2.3:a:google:chrome:10.0.638.1
  • Google Chrome 10.0.639.0
    cpe:2.3:a:google:chrome:10.0.639.0
  • cpe:2.3:a:google:chrome:10.0.640.0
  • cpe:2.3:a:google:chrome:10.0.642.0
  • Google Chrome 10.0.642.1
    cpe:2.3:a:google:chrome:10.0.642.1
  • Google Chrome 10.0.642.2
    cpe:2.3:a:google:chrome:10.0.642.2
  • Google Chrome 10.0.643.0
    cpe:2.3:a:google:chrome:10.0.643.0
  • Google Chrome 10.0.644.0
    cpe:2.3:a:google:chrome:10.0.644.0
  • cpe:2.3:a:google:chrome:10.0.645.0
  • Google Chrome 10.0.646.0
    cpe:2.3:a:google:chrome:10.0.646.0
  • Google Chrome 10.0.647.0
    cpe:2.3:a:google:chrome:10.0.647.0
  • Google Chrome 10.0.648.0
    cpe:2.3:a:google:chrome:10.0.648.0
  • Google Chrome 10.0.648.1
    cpe:2.3:a:google:chrome:10.0.648.1
  • Google Chrome 10.0.648.2
    cpe:2.3:a:google:chrome:10.0.648.2
  • cpe:2.3:a:google:chrome:10.0.648.3
  • cpe:2.3:a:google:chrome:10.0.648.4
  • Google Chrome 10.0.648.5
    cpe:2.3:a:google:chrome:10.0.648.5
  • Google Chrome 10.0.648.6
    cpe:2.3:a:google:chrome:10.0.648.6
  • cpe:2.3:a:google:chrome:10.0.648.7
  • cpe:2.3:a:google:chrome:10.0.648.8
  • cpe:2.3:a:google:chrome:10.0.648.9
  • cpe:2.3:a:google:chrome:10.0.648.10
  • cpe:2.3:a:google:chrome:10.0.648.11
  • Google Chrome 10.0.648.12
    cpe:2.3:a:google:chrome:10.0.648.12
  • cpe:2.3:a:google:chrome:10.0.648.13
  • Google Chrome 10.0.648.18
    cpe:2.3:a:google:chrome:10.0.648.18
  • cpe:2.3:a:google:chrome:10.0.648.23
  • cpe:2.3:a:google:chrome:10.0.648.26
  • Google Chrome 10.0.648.28
    cpe:2.3:a:google:chrome:10.0.648.28
  • cpe:2.3:a:google:chrome:10.0.648.32
  • cpe:2.3:a:google:chrome:10.0.648.35
  • cpe:2.3:a:google:chrome:10.0.648.38
  • cpe:2.3:a:google:chrome:10.0.648.42
  • Google Chrome 10.0.648.45
    cpe:2.3:a:google:chrome:10.0.648.45
  • Google Chrome 10.0.648.49
    cpe:2.3:a:google:chrome:10.0.648.49
  • Google Chrome 10.0.648.54
    cpe:2.3:a:google:chrome:10.0.648.54
  • cpe:2.3:a:google:chrome:10.0.648.56
  • cpe:2.3:a:google:chrome:10.0.648.59
  • cpe:2.3:a:google:chrome:10.0.648.62
  • Google Chrome 10.0.648.66
    cpe:2.3:a:google:chrome:10.0.648.66
  • cpe:2.3:a:google:chrome:10.0.648.68
  • Google Chrome 10.0.648.70
    cpe:2.3:a:google:chrome:10.0.648.70
  • Google Chrome 10.0.648.72
    cpe:2.3:a:google:chrome:10.0.648.72
  • cpe:2.3:a:google:chrome:10.0.648.76
  • cpe:2.3:a:google:chrome:10.0.648.79
  • Google Chrome 10.0.648.82
    cpe:2.3:a:google:chrome:10.0.648.82
  • cpe:2.3:a:google:chrome:10.0.648.84
  • Google Chrome 10.0.648.87
    cpe:2.3:a:google:chrome:10.0.648.87
  • cpe:2.3:a:google:chrome:10.0.648.90
  • cpe:2.3:a:google:chrome:10.0.648.101
  • cpe:2.3:a:google:chrome:10.0.648.103
  • cpe:2.3:a:google:chrome:10.0.648.105
  • Google Chrome 10.0.648.107
    cpe:2.3:a:google:chrome:10.0.648.107
  • Google Chrome 10.0.648.114
    cpe:2.3:a:google:chrome:10.0.648.114
  • Google Chrome 10.0.648.116
    cpe:2.3:a:google:chrome:10.0.648.116
  • cpe:2.3:a:google:chrome:10.0.648.118
  • Google Chrome 10.0.648.119
    cpe:2.3:a:google:chrome:10.0.648.119
  • Google Chrome 10.0.648.120
    cpe:2.3:a:google:chrome:10.0.648.120
  • cpe:2.3:a:google:chrome:10.0.648.121
  • cpe:2.3:a:google:chrome:10.0.648.122
  • Google Chrome 10.0.648.123
    cpe:2.3:a:google:chrome:10.0.648.123
  • Google Chrome 10.0.648.124
    cpe:2.3:a:google:chrome:10.0.648.124
  • Google Chrome 10.0.648.125
    cpe:2.3:a:google:chrome:10.0.648.125
  • Google Chrome 10.0.648.126
    cpe:2.3:a:google:chrome:10.0.648.126
  • cpe:2.3:a:google:chrome:10.0.648.127
  • cpe:2.3:a:google:chrome:10.0.648.128
  • Google Chrome 10.0.648.129
    cpe:2.3:a:google:chrome:10.0.648.129
  • cpe:2.3:a:google:chrome:10.0.648.130
  • Google Chrome 10.0.648.131
    cpe:2.3:a:google:chrome:10.0.648.131
  • cpe:2.3:a:google:chrome:10.0.648.132
  • Google Chrome 10.0.648.133
    cpe:2.3:a:google:chrome:10.0.648.133
  • Google Chrome 10.0.648.134
    cpe:2.3:a:google:chrome:10.0.648.134
  • cpe:2.3:a:google:chrome:10.0.648.135
  • cpe:2.3:a:google:chrome:10.0.648.151
  • cpe:2.3:a:google:chrome:10.0.648.201
  • Google Chrome 10.0.648.203
    cpe:2.3:a:google:chrome:10.0.648.203
  • cpe:2.3:a:google:chrome:10.0.648.204
  • Google Chrome 10.0.648.205
    cpe:2.3:a:google:chrome:10.0.648.205
  • cpe:2.3:a:google:chrome:10.0.649.0
  • cpe:2.3:a:google:chrome:10.0.650.0
  • cpe:2.3:a:google:chrome:10.0.651.0
  • Google Chrome 11.0.652.0
    cpe:2.3:a:google:chrome:11.0.652.0
  • cpe:2.3:a:google:chrome:11.0.653.0
  • Google Chrome 11.0.654.0
    cpe:2.3:a:google:chrome:11.0.654.0
  • cpe:2.3:a:google:chrome:11.0.655.0
  • cpe:2.3:a:google:chrome:11.0.656.0
  • cpe:2.3:a:google:chrome:11.0.657.0
  • Google Chrome 11.0.658.0
    cpe:2.3:a:google:chrome:11.0.658.0
  • cpe:2.3:a:google:chrome:11.0.658.1
  • cpe:2.3:a:google:chrome:11.0.659.0
  • Google Chrome 11.0.660.0
    cpe:2.3:a:google:chrome:11.0.660.0
  • Google Chrome 11.0.661.0
    cpe:2.3:a:google:chrome:11.0.661.0
  • cpe:2.3:a:google:chrome:11.0.662.0
  • cpe:2.3:a:google:chrome:11.0.663.0
  • Google Chrome 11.0.664.1
    cpe:2.3:a:google:chrome:11.0.664.1
  • cpe:2.3:a:google:chrome:11.0.665.0
  • Google Chrome 11.0.666.0
    cpe:2.3:a:google:chrome:11.0.666.0
  • cpe:2.3:a:google:chrome:11.0.667.0
  • Google Chrome 11.0.667.2
    cpe:2.3:a:google:chrome:11.0.667.2
  • cpe:2.3:a:google:chrome:11.0.667.3
  • cpe:2.3:a:google:chrome:11.0.667.4
  • cpe:2.3:a:google:chrome:11.0.668.0
  • cpe:2.3:a:google:chrome:11.0.669.0
  • cpe:2.3:a:google:chrome:11.0.670.0
  • Google Chrome 11.0.671.0
    cpe:2.3:a:google:chrome:11.0.671.0
  • cpe:2.3:a:google:chrome:11.0.672.0
  • cpe:2.3:a:google:chrome:11.0.672.1
  • cpe:2.3:a:google:chrome:11.0.672.2
  • cpe:2.3:a:google:chrome:11.0.673.0
  • Google Chrome 11.0.674.0
    cpe:2.3:a:google:chrome:11.0.674.0
  • cpe:2.3:a:google:chrome:11.0.675.0
  • cpe:2.3:a:google:chrome:11.0.676.0
  • Google Chrome 11.0.677.0
    cpe:2.3:a:google:chrome:11.0.677.0
  • cpe:2.3:a:google:chrome:11.0.678.0
  • Google Chrome 11.0.679.0
    cpe:2.3:a:google:chrome:11.0.679.0
  • cpe:2.3:a:google:chrome:11.0.680.0
  • cpe:2.3:a:google:chrome:11.0.681.0
  • cpe:2.3:a:google:chrome:11.0.682.0
  • Google Chrome 11.0.683.0
    cpe:2.3:a:google:chrome:11.0.683.0
  • cpe:2.3:a:google:chrome:11.0.684.0
  • cpe:2.3:a:google:chrome:11.0.685.0
  • Google Chrome 11.0.686.0
    cpe:2.3:a:google:chrome:11.0.686.0
  • Google Chrome 11.0.686.1
    cpe:2.3:a:google:chrome:11.0.686.1
  • cpe:2.3:a:google:chrome:11.0.686.2
  • cpe:2.3:a:google:chrome:11.0.686.3
  • Google Chrome 11.0.687.0
    cpe:2.3:a:google:chrome:11.0.687.0
  • Google Chrome 11.0.687.1
    cpe:2.3:a:google:chrome:11.0.687.1
  • cpe:2.3:a:google:chrome:11.0.688.0
  • cpe:2.3:a:google:chrome:11.0.689.0
  • cpe:2.3:a:google:chrome:11.0.690.0
  • cpe:2.3:a:google:chrome:11.0.690.1
  • Google Chrome 11.0.691.0
    cpe:2.3:a:google:chrome:11.0.691.0
  • Google Chrome 11.0.692.0
    cpe:2.3:a:google:chrome:11.0.692.0
  • cpe:2.3:a:google:chrome:11.0.693.0
  • Google Chrome 11.0.694.0
    cpe:2.3:a:google:chrome:11.0.694.0
  • cpe:2.3:a:google:chrome:11.0.695.0
  • cpe:2.3:a:google:chrome:11.0.696.0
  • Google Chrome 11.0.696.1
    cpe:2.3:a:google:chrome:11.0.696.1
  • cpe:2.3:a:google:chrome:11.0.696.2
  • cpe:2.3:a:google:chrome:11.0.696.3
  • Google Chrome 11.0.696.4
    cpe:2.3:a:google:chrome:11.0.696.4
  • cpe:2.3:a:google:chrome:11.0.696.5
  • cpe:2.3:a:google:chrome:11.0.696.7
  • cpe:2.3:a:google:chrome:11.0.696.8
  • Google Chrome 11.0.696.9
    cpe:2.3:a:google:chrome:11.0.696.9
  • cpe:2.3:a:google:chrome:11.0.696.10
  • cpe:2.3:a:google:chrome:11.0.696.11
  • Google Chrome 11.0.696.12
    cpe:2.3:a:google:chrome:11.0.696.12
  • Google Chrome 11.0.696.13
    cpe:2.3:a:google:chrome:11.0.696.13
  • Google Chrome 11.0.696.14
    cpe:2.3:a:google:chrome:11.0.696.14
  • cpe:2.3:a:google:chrome:11.0.696.15
  • Google Chrome 11.0.696.16
    cpe:2.3:a:google:chrome:11.0.696.16
  • cpe:2.3:a:google:chrome:11.0.696.17
  • cpe:2.3:a:google:chrome:11.0.696.18
  • Google Chrome 11.0.696.19
    cpe:2.3:a:google:chrome:11.0.696.19
  • Google Chrome 11.0.696.20
    cpe:2.3:a:google:chrome:11.0.696.20
  • cpe:2.3:a:google:chrome:11.0.696.21
  • cpe:2.3:a:google:chrome:11.0.696.22
  • cpe:2.3:a:google:chrome:11.0.696.23
  • cpe:2.3:a:google:chrome:11.0.696.24
  • Google Chrome 11.0.696.25
    cpe:2.3:a:google:chrome:11.0.696.25
  • Google Chrome 11.0.696.26
    cpe:2.3:a:google:chrome:11.0.696.26
  • cpe:2.3:a:google:chrome:11.0.696.27
  • cpe:2.3:a:google:chrome:11.0.696.28
  • Google Chrome 11.0.696.29
    cpe:2.3:a:google:chrome:11.0.696.29
  • cpe:2.3:a:google:chrome:11.0.696.30
  • Google Chrome 11.0.696.31
    cpe:2.3:a:google:chrome:11.0.696.31
  • cpe:2.3:a:google:chrome:11.0.696.32
  • Google Chrome 11.0.696.33
    cpe:2.3:a:google:chrome:11.0.696.33
  • Google Chrome 11.0.696.34
    cpe:2.3:a:google:chrome:11.0.696.34
  • cpe:2.3:a:google:chrome:11.0.696.35
  • cpe:2.3:a:google:chrome:11.0.696.36
  • cpe:2.3:a:google:chrome:11.0.696.37
  • cpe:2.3:a:google:chrome:11.0.696.38
  • Google Chrome 11.0.696.39
    cpe:2.3:a:google:chrome:11.0.696.39
  • cpe:2.3:a:google:chrome:11.0.696.40
  • Google Chrome 11.0.696.41
    cpe:2.3:a:google:chrome:11.0.696.41
  • Google Chrome 11.0.696.42
    cpe:2.3:a:google:chrome:11.0.696.42
  • Google Chrome 11.0.696.43
    cpe:2.3:a:google:chrome:11.0.696.43
  • cpe:2.3:a:google:chrome:11.0.696.44
  • Google Chrome 11.0.696.45
    cpe:2.3:a:google:chrome:11.0.696.45
  • Google Chrome 11.0.696.46
    cpe:2.3:a:google:chrome:11.0.696.46
  • cpe:2.3:a:google:chrome:11.0.696.47
  • cpe:2.3:a:google:chrome:11.0.696.48
  • cpe:2.3:a:google:chrome:11.0.696.49
  • cpe:2.3:a:google:chrome:11.0.696.50
  • cpe:2.3:a:google:chrome:11.0.696.51
  • Google Chrome 11.0.696.52
    cpe:2.3:a:google:chrome:11.0.696.52
  • cpe:2.3:a:google:chrome:11.0.696.53
  • cpe:2.3:a:google:chrome:11.0.696.54
  • Google Chrome 11.0.696.55
    cpe:2.3:a:google:chrome:11.0.696.55
  • Google Chrome 11.0.696.56
    cpe:2.3:a:google:chrome:11.0.696.56
  • Google Chrome 11.0.696.57
    cpe:2.3:a:google:chrome:11.0.696.57
  • cpe:2.3:a:google:chrome:11.0.696.58
  • cpe:2.3:a:google:chrome:11.0.696.59
  • cpe:2.3:a:google:chrome:11.0.696.60
  • Google Chrome 11.0.696.61
    cpe:2.3:a:google:chrome:11.0.696.61
  • Google Chrome 11.0.696.62
    cpe:2.3:a:google:chrome:11.0.696.62
  • Google Chrome 11.0.696.63
    cpe:2.3:a:google:chrome:11.0.696.63
  • Google Chrome 11.0.696.64
    cpe:2.3:a:google:chrome:11.0.696.64
  • cpe:2.3:a:google:chrome:11.0.696.65
  • cpe:2.3:a:google:chrome:11.0.696.66
  • cpe:2.3:a:google:chrome:11.0.696.67
  • Google Chrome 11.0.696.68
    cpe:2.3:a:google:chrome:11.0.696.68
  • Google Chrome 11.0.696.69
    cpe:2.3:a:google:chrome:11.0.696.69
  • Google Chrome 11.0.696.70
    cpe:2.3:a:google:chrome:11.0.696.70
  • cpe:2.3:a:google:chrome:11.0.696.71
  • Google Chrome 11.0.696.72
    cpe:2.3:a:google:chrome:11.0.696.72
  • cpe:2.3:a:google:chrome:11.0.696.77
  • cpe:2.3:a:google:chrome:11.0.697.0
  • cpe:2.3:a:google:chrome:11.0.698.0
  • Google Chrome 11.0.699.0
    cpe:2.3:a:google:chrome:11.0.699.0
  • cpe:2.3:a:google:chrome:12.0.700.0
  • cpe:2.3:a:google:chrome:12.0.701.0
  • Google Chrome 12.0.702.0
    cpe:2.3:a:google:chrome:12.0.702.0
  • Google Chrome 12.0.702.1
    cpe:2.3:a:google:chrome:12.0.702.1
  • Google Chrome 12.0.702.2
    cpe:2.3:a:google:chrome:12.0.702.2
  • Google Chrome 12.0.703.0
    cpe:2.3:a:google:chrome:12.0.703.0
  • cpe:2.3:a:google:chrome:12.0.704.0
  • cpe:2.3:a:google:chrome:12.0.705.0
  • cpe:2.3:a:google:chrome:12.0.706.0
  • cpe:2.3:a:google:chrome:12.0.707.0
  • cpe:2.3:a:google:chrome:12.0.708.0
  • Google Chrome 12.0.709.0
    cpe:2.3:a:google:chrome:12.0.709.0
  • cpe:2.3:a:google:chrome:12.0.710.0
  • Google Chrome 12.0.711.0
    cpe:2.3:a:google:chrome:12.0.711.0
  • Google Chrome 12.0.712.0
    cpe:2.3:a:google:chrome:12.0.712.0
  • Google Chrome 12.0.713.0
    cpe:2.3:a:google:chrome:12.0.713.0
  • Google Chrome 12.0.714.0
    cpe:2.3:a:google:chrome:12.0.714.0
  • cpe:2.3:a:google:chrome:12.0.715.0
  • cpe:2.3:a:google:chrome:12.0.716.0
  • Google Chrome 12.0.717.0
    cpe:2.3:a:google:chrome:12.0.717.0
  • cpe:2.3:a:google:chrome:12.0.718.0
  • cpe:2.3:a:google:chrome:12.0.719.0
  • Google Chrome 12.0.719.1
    cpe:2.3:a:google:chrome:12.0.719.1
  • Google Chrome 12.0.720.0
    cpe:2.3:a:google:chrome:12.0.720.0
  • cpe:2.3:a:google:chrome:12.0.721.0
  • Google Chrome 12.0.721.1
    cpe:2.3:a:google:chrome:12.0.721.1
  • Google Chrome 12.0.722.0
    cpe:2.3:a:google:chrome:12.0.722.0
  • cpe:2.3:a:google:chrome:12.0.723.0
  • Google Chrome 12.0.723.1
    cpe:2.3:a:google:chrome:12.0.723.1
  • cpe:2.3:a:google:chrome:12.0.724.0
  • Google Chrome 12.0.725.0
    cpe:2.3:a:google:chrome:12.0.725.0
  • Google Chrome 12.0.726.0
    cpe:2.3:a:google:chrome:12.0.726.0
  • Google Chrome 12.0.727.0
    cpe:2.3:a:google:chrome:12.0.727.0
  • cpe:2.3:a:google:chrome:12.0.728.0
  • Google Chrome 12.0.729.0
    cpe:2.3:a:google:chrome:12.0.729.0
  • Google Chrome 12.0.730.0
    cpe:2.3:a:google:chrome:12.0.730.0
  • cpe:2.3:a:google:chrome:12.0.731.0
  • Google Chrome 12.0.732.0
    cpe:2.3:a:google:chrome:12.0.732.0
  • Google Chrome 12.0.733.0
    cpe:2.3:a:google:chrome:12.0.733.0
  • Google Chrome 12.0.734.0
    cpe:2.3:a:google:chrome:12.0.734.0
  • Google Chrome 12.0.735.0
    cpe:2.3:a:google:chrome:12.0.735.0
  • Google Chrome 12.0.736.0
    cpe:2.3:a:google:chrome:12.0.736.0
  • cpe:2.3:a:google:chrome:12.0.737.0
  • Google Chrome 12.0.738.0
    cpe:2.3:a:google:chrome:12.0.738.0
  • cpe:2.3:a:google:chrome:12.0.739.0
  • cpe:2.3:a:google:chrome:12.0.740.0
  • Google Chrome 12.0.741.0
    cpe:2.3:a:google:chrome:12.0.741.0
  • cpe:2.3:a:google:chrome:12.0.742.0
  • cpe:2.3:a:google:chrome:12.0.742.1
  • Google Chrome 12.0.742.2
    cpe:2.3:a:google:chrome:12.0.742.2
  • cpe:2.3:a:google:chrome:12.0.742.3
  • Google Chrome 12.0.742.4
    cpe:2.3:a:google:chrome:12.0.742.4
  • cpe:2.3:a:google:chrome:12.0.742.5
  • Google Chrome 12.0.742.6
    cpe:2.3:a:google:chrome:12.0.742.6
  • Google Chrome 12.0.742.8
    cpe:2.3:a:google:chrome:12.0.742.8
  • cpe:2.3:a:google:chrome:12.0.742.9
  • cpe:2.3:a:google:chrome:12.0.742.10
  • Google Chrome 12.0.742.11
    cpe:2.3:a:google:chrome:12.0.742.11
  • Google Chrome 12.0.742.12
    cpe:2.3:a:google:chrome:12.0.742.12
  • cpe:2.3:a:google:chrome:12.0.742.13
  • Google Chrome 12.0.742.14
    cpe:2.3:a:google:chrome:12.0.742.14
  • Google Chrome 12.0.742.15
    cpe:2.3:a:google:chrome:12.0.742.15
  • Google Chrome 12.0.742.16
    cpe:2.3:a:google:chrome:12.0.742.16
  • Google Chrome 12.0.742.17
    cpe:2.3:a:google:chrome:12.0.742.17
  • cpe:2.3:a:google:chrome:12.0.742.18
  • cpe:2.3:a:google:chrome:12.0.742.19
  • cpe:2.3:a:google:chrome:12.0.742.20
  • cpe:2.3:a:google:chrome:12.0.742.21
  • Google Chrome 12.0.742.22
    cpe:2.3:a:google:chrome:12.0.742.22
  • cpe:2.3:a:google:chrome:12.0.742.30
  • cpe:2.3:a:google:chrome:12.0.742.41
  • cpe:2.3:a:google:chrome:12.0.742.42
  • Google Chrome 12.0.742.43
    cpe:2.3:a:google:chrome:12.0.742.43
  • cpe:2.3:a:google:chrome:12.0.742.44
  • cpe:2.3:a:google:chrome:12.0.742.45
  • Google Chrome 12.0.742.46
    cpe:2.3:a:google:chrome:12.0.742.46
  • cpe:2.3:a:google:chrome:12.0.742.47
  • cpe:2.3:a:google:chrome:12.0.742.48
  • cpe:2.3:a:google:chrome:12.0.742.49
  • Google Chrome 12.0.742.50
    cpe:2.3:a:google:chrome:12.0.742.50
  • Google Chrome 12.0.742.51
    cpe:2.3:a:google:chrome:12.0.742.51
  • Google Chrome 12.0.742.52
    cpe:2.3:a:google:chrome:12.0.742.52
  • Google Chrome 12.0.742.53
    cpe:2.3:a:google:chrome:12.0.742.53
  • cpe:2.3:a:google:chrome:12.0.742.54
  • Google Chrome 12.0.742.55
    cpe:2.3:a:google:chrome:12.0.742.55
  • Google Chrome 12.0.742.56
    cpe:2.3:a:google:chrome:12.0.742.56
  • Google Chrome 12.0.742.57
    cpe:2.3:a:google:chrome:12.0.742.57
  • cpe:2.3:a:google:chrome:12.0.742.58
  • cpe:2.3:a:google:chrome:12.0.742.59
  • cpe:2.3:a:google:chrome:12.0.742.60
  • cpe:2.3:a:google:chrome:12.0.742.61
  • Google Chrome 12.0.742.63
    cpe:2.3:a:google:chrome:12.0.742.63
  • cpe:2.3:a:google:chrome:12.0.742.64
  • Google Chrome 12.0.742.65
    cpe:2.3:a:google:chrome:12.0.742.65
  • cpe:2.3:a:google:chrome:12.0.742.66
  • cpe:2.3:a:google:chrome:12.0.742.67
  • cpe:2.3:a:google:chrome:12.0.742.68
  • cpe:2.3:a:google:chrome:12.0.742.69
  • Google Chrome 12.0.742.70
    cpe:2.3:a:google:chrome:12.0.742.70
  • Google Chrome 12.0.742.71
    cpe:2.3:a:google:chrome:12.0.742.71
  • Google Chrome 12.0.742.72
    cpe:2.3:a:google:chrome:12.0.742.72
  • Google Chrome 12.0.742.73
    cpe:2.3:a:google:chrome:12.0.742.73
  • cpe:2.3:a:google:chrome:12.0.742.74
  • Google Chrome 12.0.742.75
    cpe:2.3:a:google:chrome:12.0.742.75
  • cpe:2.3:a:google:chrome:12.0.742.77
  • Google Chrome 12.0.742.82
    cpe:2.3:a:google:chrome:12.0.742.82
  • Google Chrome 12.0.742.91
    cpe:2.3:a:google:chrome:12.0.742.91
  • Google Chrome 12.0.742.92
    cpe:2.3:a:google:chrome:12.0.742.92
  • cpe:2.3:a:google:chrome:12.0.742.93
  • Google Chrome 12.0.742.94
    cpe:2.3:a:google:chrome:12.0.742.94
  • Google Chrome 12.0.742.100
    cpe:2.3:a:google:chrome:12.0.742.100
  • Google Chrome 12.0.742.105
    cpe:2.3:a:google:chrome:12.0.742.105
  • Google Chrome 12.0.742.111
    cpe:2.3:a:google:chrome:12.0.742.111
  • Google Chrome 12.0.742.112
    cpe:2.3:a:google:chrome:12.0.742.112
  • Google Chrome 12.0.742.113
    cpe:2.3:a:google:chrome:12.0.742.113
  • cpe:2.3:a:google:chrome:12.0.742.114
  • cpe:2.3:a:google:chrome:12.0.742.115
  • cpe:2.3:a:google:chrome:12.0.742.120
  • Google Chrome 12.0.742.121
    cpe:2.3:a:google:chrome:12.0.742.121
  • Google Chrome 12.0.742.122
    cpe:2.3:a:google:chrome:12.0.742.122
  • Google Chrome 12.0.742.123
    cpe:2.3:a:google:chrome:12.0.742.123
  • Google Chrome 12.0.742.124
    cpe:2.3:a:google:chrome:12.0.742.124
  • cpe:2.3:a:google:chrome:12.0.743.0
  • cpe:2.3:a:google:chrome:12.0.744.0
  • cpe:2.3:a:google:chrome:12.0.745.0
  • cpe:2.3:a:google:chrome:12.0.746.0
  • Google Chrome 12.0.747.0
    cpe:2.3:a:google:chrome:12.0.747.0
  • Google Chrome 13.0.748.0
    cpe:2.3:a:google:chrome:13.0.748.0
  • Google Chrome 13.0.749.0
    cpe:2.3:a:google:chrome:13.0.749.0
  • cpe:2.3:a:google:chrome:13.0.750.0
  • cpe:2.3:a:google:chrome:13.0.751.0
  • cpe:2.3:a:google:chrome:13.0.752.0
  • cpe:2.3:a:google:chrome:13.0.753.0
  • cpe:2.3:a:google:chrome:13.0.754.0
  • cpe:2.3:a:google:chrome:13.0.755.0
  • Google Chrome 13.0.756.0
    cpe:2.3:a:google:chrome:13.0.756.0
  • cpe:2.3:a:google:chrome:13.0.757.0
  • Google Chrome 13.0.758.0
    cpe:2.3:a:google:chrome:13.0.758.0
  • cpe:2.3:a:google:chrome:13.0.759.0
  • Google Chrome 13.0.760.0
    cpe:2.3:a:google:chrome:13.0.760.0
  • cpe:2.3:a:google:chrome:13.0.761.0
  • Google Chrome 13.0.761.1
    cpe:2.3:a:google:chrome:13.0.761.1
  • Google Chrome 13.0.762.0
    cpe:2.3:a:google:chrome:13.0.762.0
  • Google Chrome 13.0.762.1
    cpe:2.3:a:google:chrome:13.0.762.1
  • Google Chrome 13.0.763.0
    cpe:2.3:a:google:chrome:13.0.763.0
  • cpe:2.3:a:google:chrome:13.0.764.0
  • cpe:2.3:a:google:chrome:13.0.765.0
  • cpe:2.3:a:google:chrome:13.0.766.0
  • cpe:2.3:a:google:chrome:13.0.767.0
  • Google Chrome 13.0.767.1
    cpe:2.3:a:google:chrome:13.0.767.1
  • cpe:2.3:a:google:chrome:13.0.768.0
  • Google Chrome 13.0.769.0
    cpe:2.3:a:google:chrome:13.0.769.0
  • Google Chrome 13.0.770.0
    cpe:2.3:a:google:chrome:13.0.770.0
  • Google Chrome 13.0.771.0
    cpe:2.3:a:google:chrome:13.0.771.0
  • Google Chrome 13.0.772.0
    cpe:2.3:a:google:chrome:13.0.772.0
  • cpe:2.3:a:google:chrome:13.0.773.0
  • Google Chrome 13.0.774.0
    cpe:2.3:a:google:chrome:13.0.774.0
  • cpe:2.3:a:google:chrome:13.0.775.0
  • cpe:2.3:a:google:chrome:13.0.775.1
  • Google Chrome 13.0.775.2
    cpe:2.3:a:google:chrome:13.0.775.2
  • Google Chrome 13.0.775.4
    cpe:2.3:a:google:chrome:13.0.775.4
  • Google Chrome 13.0.776.0
    cpe:2.3:a:google:chrome:13.0.776.0
  • Google Chrome 13.0.776.1
    cpe:2.3:a:google:chrome:13.0.776.1
  • cpe:2.3:a:google:chrome:13.0.777.0
  • Google Chrome 13.0.777.1
    cpe:2.3:a:google:chrome:13.0.777.1
  • Google Chrome 13.0.777.2
    cpe:2.3:a:google:chrome:13.0.777.2
  • Google Chrome 13.0.777.3
    cpe:2.3:a:google:chrome:13.0.777.3
  • cpe:2.3:a:google:chrome:13.0.777.4
  • Google Chrome 13.0.777.5
    cpe:2.3:a:google:chrome:13.0.777.5
  • Google Chrome 13.0.777.6
    cpe:2.3:a:google:chrome:13.0.777.6
  • Google Chrome 13.0.778.0
    cpe:2.3:a:google:chrome:13.0.778.0
  • cpe:2.3:a:google:chrome:13.0.779.0
  • cpe:2.3:a:google:chrome:13.0.780.0
  • Google Chrome 13.0.781.0
    cpe:2.3:a:google:chrome:13.0.781.0
  • cpe:2.3:a:google:chrome:13.0.782.0
  • Google Chrome 13.0.782.1
    cpe:2.3:a:google:chrome:13.0.782.1
  • cpe:2.3:a:google:chrome:13.0.782.3
  • cpe:2.3:a:google:chrome:13.0.782.4
  • Google Chrome 13.0.782.6
    cpe:2.3:a:google:chrome:13.0.782.6
  • cpe:2.3:a:google:chrome:13.0.782.7
  • cpe:2.3:a:google:chrome:13.0.782.10
  • Google Chrome 13.0.782.11
    cpe:2.3:a:google:chrome:13.0.782.11
  • Google Chrome 13.0.782.12
    cpe:2.3:a:google:chrome:13.0.782.12
  • cpe:2.3:a:google:chrome:13.0.782.13
  • cpe:2.3:a:google:chrome:13.0.782.14
  • Google Chrome 13.0.782.15
    cpe:2.3:a:google:chrome:13.0.782.15
  • Google Chrome 13.0.782.16
    cpe:2.3:a:google:chrome:13.0.782.16
  • cpe:2.3:a:google:chrome:13.0.782.17
  • cpe:2.3:a:google:chrome:13.0.782.18
  • cpe:2.3:a:google:chrome:13.0.782.19
  • Google Chrome 13.0.782.20
    cpe:2.3:a:google:chrome:13.0.782.20
  • cpe:2.3:a:google:chrome:13.0.782.21
  • cpe:2.3:a:google:chrome:13.0.782.23
  • cpe:2.3:a:google:chrome:13.0.782.24
  • cpe:2.3:a:google:chrome:13.0.782.25
  • Google Chrome 13.0.782.26
    cpe:2.3:a:google:chrome:13.0.782.26
  • Google Chrome 13.0.782.27
    cpe:2.3:a:google:chrome:13.0.782.27
  • Google Chrome 13.0.782.28
    cpe:2.3:a:google:chrome:13.0.782.28
  • cpe:2.3:a:google:chrome:13.0.782.29
  • cpe:2.3:a:google:chrome:13.0.782.30
  • Google Chrome 13.0.782.31
    cpe:2.3:a:google:chrome:13.0.782.31
  • cpe:2.3:a:google:chrome:13.0.782.32
  • Google Chrome 13.0.782.33
    cpe:2.3:a:google:chrome:13.0.782.33
  • cpe:2.3:a:google:chrome:13.0.782.34
  • Google Chrome 13.0.782.35
    cpe:2.3:a:google:chrome:13.0.782.35
  • Google Chrome 13.0.782.36
    cpe:2.3:a:google:chrome:13.0.782.36
  • cpe:2.3:a:google:chrome:13.0.782.37
  • cpe:2.3:a:google:chrome:13.0.782.38
  • cpe:2.3:a:google:chrome:13.0.782.39
  • cpe:2.3:a:google:chrome:13.0.782.40
  • cpe:2.3:a:google:chrome:13.0.782.41
  • cpe:2.3:a:google:chrome:13.0.782.42
  • cpe:2.3:a:google:chrome:13.0.782.43
  • cpe:2.3:a:google:chrome:13.0.782.44
  • Google Chrome 13.0.782.45
    cpe:2.3:a:google:chrome:13.0.782.45
  • cpe:2.3:a:google:chrome:13.0.782.46
  • Google Chrome 13.0.782.47
    cpe:2.3:a:google:chrome:13.0.782.47
  • cpe:2.3:a:google:chrome:13.0.782.48
  • cpe:2.3:a:google:chrome:13.0.782.49
  • Google Chrome 13.0.782.50
    cpe:2.3:a:google:chrome:13.0.782.50
  • Google Chrome 13.0.782.51
    cpe:2.3:a:google:chrome:13.0.782.51
  • Google Chrome 13.0.782.52
    cpe:2.3:a:google:chrome:13.0.782.52
  • Google Chrome 13.0.782.53
    cpe:2.3:a:google:chrome:13.0.782.53
  • Google Chrome 13.0.782.55
    cpe:2.3:a:google:chrome:13.0.782.55
  • Google Chrome 13.0.782.56
    cpe:2.3:a:google:chrome:13.0.782.56
  • cpe:2.3:a:google:chrome:13.0.782.81
  • Google Chrome 13.0.782.82
    cpe:2.3:a:google:chrome:13.0.782.82
  • cpe:2.3:a:google:chrome:13.0.782.83
  • Google Chrome 13.0.782.84
    cpe:2.3:a:google:chrome:13.0.782.84
  • cpe:2.3:a:google:chrome:13.0.782.85
  • Google Chrome 13.0.782.86
    cpe:2.3:a:google:chrome:13.0.782.86
  • cpe:2.3:a:google:chrome:13.0.782.87
  • cpe:2.3:a:google:chrome:13.0.782.88
  • Google Chrome 13.0.782.89
    cpe:2.3:a:google:chrome:13.0.782.89
  • Google Chrome 13.0.782.90
    cpe:2.3:a:google:chrome:13.0.782.90
  • cpe:2.3:a:google:chrome:13.0.782.91
  • cpe:2.3:a:google:chrome:13.0.782.92
  • cpe:2.3:a:google:chrome:13.0.782.93
  • cpe:2.3:a:google:chrome:13.0.782.94
  • cpe:2.3:a:google:chrome:13.0.782.95
  • cpe:2.3:a:google:chrome:13.0.782.96
  • Google Chrome 13.0.782.97
    cpe:2.3:a:google:chrome:13.0.782.97
  • cpe:2.3:a:google:chrome:13.0.782.98
  • cpe:2.3:a:google:chrome:13.0.782.99
  • cpe:2.3:a:google:chrome:13.0.782.100
  • cpe:2.3:a:google:chrome:13.0.782.101
  • cpe:2.3:a:google:chrome:13.0.782.102
  • Google Chrome 13.0.782.103
    cpe:2.3:a:google:chrome:13.0.782.103
  • Google Chrome 13.0.782.104
    cpe:2.3:a:google:chrome:13.0.782.104
  • cpe:2.3:a:google:chrome:13.0.782.105
  • Google Chrome 13.0.782.106
    cpe:2.3:a:google:chrome:13.0.782.106
  • Google Chrome 13.0.782.107
    cpe:2.3:a:google:chrome:13.0.782.107
  • Google Chrome 13.0.782.108
    cpe:2.3:a:google:chrome:13.0.782.108
  • Google Chrome 13.0.782.109
    cpe:2.3:a:google:chrome:13.0.782.109
  • Google Chrome 13.0.782.112
    cpe:2.3:a:google:chrome:13.0.782.112
  • Google Chrome 13.0.782.210
    cpe:2.3:a:google:chrome:13.0.782.210
  • Google Chrome 13.0.782.211
    cpe:2.3:a:google:chrome:13.0.782.211
  • Google Chrome 13.0.782.212
    cpe:2.3:a:google:chrome:13.0.782.212
  • cpe:2.3:a:google:chrome:13.0.782.213
  • Google Chrome 13.0.782.214
    cpe:2.3:a:google:chrome:13.0.782.214
  • cpe:2.3:a:google:chrome:13.0.782.215
  • Google Chrome 13.0.782.216
    cpe:2.3:a:google:chrome:13.0.782.216
  • cpe:2.3:a:google:chrome:13.0.782.217
  • Google Chrome 13.0.782.218
    cpe:2.3:a:google:chrome:13.0.782.218
  • cpe:2.3:a:google:chrome:13.0.782.219
  • cpe:2.3:a:google:chrome:13.0.782.220
  • Google Chrome 13.0.782.237
    cpe:2.3:a:google:chrome:13.0.782.237
  • cpe:2.3:a:google:chrome:13.0.782.238
  • cpe:2.3:a:google:chrome:14.0.783.0
  • Google Chrome 14.0.784.0
    cpe:2.3:a:google:chrome:14.0.784.0
  • cpe:2.3:a:google:chrome:14.0.785.0
  • Google Chrome 14.0.786.0
    cpe:2.3:a:google:chrome:14.0.786.0
  • cpe:2.3:a:google:chrome:14.0.787.0
  • cpe:2.3:a:google:chrome:14.0.788.0
  • cpe:2.3:a:google:chrome:14.0.789.0
  • cpe:2.3:a:google:chrome:14.0.790.0
  • cpe:2.3:a:google:chrome:14.0.791.0
  • Google Chrome 14.0.792.0
    cpe:2.3:a:google:chrome:14.0.792.0
  • Google Chrome 14.0.793.0
    cpe:2.3:a:google:chrome:14.0.793.0
  • cpe:2.3:a:google:chrome:14.0.794.0
  • cpe:2.3:a:google:chrome:14.0.795.0
  • Google Chrome 14.0.796.0
    cpe:2.3:a:google:chrome:14.0.796.0
  • Google Chrome 14.0.797.0
    cpe:2.3:a:google:chrome:14.0.797.0
  • Google Chrome 14.0.798.0
    cpe:2.3:a:google:chrome:14.0.798.0
  • Google Chrome 14.0.799.0
    cpe:2.3:a:google:chrome:14.0.799.0
  • cpe:2.3:a:google:chrome:14.0.800.0
  • cpe:2.3:a:google:chrome:14.0.801.0
  • cpe:2.3:a:google:chrome:14.0.802.0
  • cpe:2.3:a:google:chrome:14.0.803.0
  • cpe:2.3:a:google:chrome:14.0.804.0
  • cpe:2.3:a:google:chrome:14.0.805.0
  • cpe:2.3:a:google:chrome:14.0.806.0
  • cpe:2.3:a:google:chrome:14.0.807.0
  • Google Chrome 14.0.808.0
    cpe:2.3:a:google:chrome:14.0.808.0
  • cpe:2.3:a:google:chrome:14.0.809.0
  • cpe:2.3:a:google:chrome:14.0.810.0
  • cpe:2.3:a:google:chrome:14.0.811.0
  • Google Chrome 14.0.812.0
    cpe:2.3:a:google:chrome:14.0.812.0
  • Google Chrome 14.0.813.0
    cpe:2.3:a:google:chrome:14.0.813.0
  • Google Chrome 14.0.814.0
    cpe:2.3:a:google:chrome:14.0.814.0
  • Google Chrome 14.0.815.0
    cpe:2.3:a:google:chrome:14.0.815.0
  • cpe:2.3:a:google:chrome:14.0.816.0
  • cpe:2.3:a:google:chrome:14.0.818.0
  • cpe:2.3:a:google:chrome:14.0.819.0
  • cpe:2.3:a:google:chrome:14.0.820.0
  • cpe:2.3:a:google:chrome:14.0.821.0
  • Google Chrome 14.0.822.0
    cpe:2.3:a:google:chrome:14.0.822.0
  • Google Chrome 14.0.823.0
    cpe:2.3:a:google:chrome:14.0.823.0
  • cpe:2.3:a:google:chrome:14.0.824.0
  • cpe:2.3:a:google:chrome:14.0.825.0
  • Google Chrome 14.0.826.0
    cpe:2.3:a:google:chrome:14.0.826.0
  • cpe:2.3:a:google:chrome:14.0.827.0
  • cpe:2.3:a:google:chrome:14.0.827.10
  • Google Chrome 14.0.827.12
    cpe:2.3:a:google:chrome:14.0.827.12
  • Google Chrome 14.0.829.1
    cpe:2.3:a:google:chrome:14.0.829.1
  • Google Chrome 14.0.830.0
    cpe:2.3:a:google:chrome:14.0.830.0
  • cpe:2.3:a:google:chrome:14.0.831.0
  • Google Chrome 14.0.832.0
    cpe:2.3:a:google:chrome:14.0.832.0
  • Google Chrome 14.0.833.0
    cpe:2.3:a:google:chrome:14.0.833.0
  • cpe:2.3:a:google:chrome:14.0.834.0
  • Google Chrome 14.0.835.0
    cpe:2.3:a:google:chrome:14.0.835.0
  • cpe:2.3:a:google:chrome:14.0.835.1
  • cpe:2.3:a:google:chrome:14.0.835.2
  • cpe:2.3:a:google:chrome:14.0.835.4
  • Google Chrome 14.0.835.8
    cpe:2.3:a:google:chrome:14.0.835.8
  • Google Chrome 14.0.835.9
    cpe:2.3:a:google:chrome:14.0.835.9
  • cpe:2.3:a:google:chrome:14.0.835.11
  • cpe:2.3:a:google:chrome:14.0.835.13
  • Google Chrome 14.0.835.14
    cpe:2.3:a:google:chrome:14.0.835.14
  • Google Chrome 14.0.835.15
    cpe:2.3:a:google:chrome:14.0.835.15
  • cpe:2.3:a:google:chrome:14.0.835.16
  • cpe:2.3:a:google:chrome:14.0.835.18
  • cpe:2.3:a:google:chrome:14.0.835.20
  • cpe:2.3:a:google:chrome:14.0.835.21
  • Google Chrome 14.0.835.22
    cpe:2.3:a:google:chrome:14.0.835.22
  • cpe:2.3:a:google:chrome:14.0.835.23
  • Google Chrome 14.0.835.24
    cpe:2.3:a:google:chrome:14.0.835.24
  • Google Chrome 14.0.835.25
    cpe:2.3:a:google:chrome:14.0.835.25
  • Google Chrome 14.0.835.26
    cpe:2.3:a:google:chrome:14.0.835.26
  • Google Chrome 14.0.835.27
    cpe:2.3:a:google:chrome:14.0.835.27
  • cpe:2.3:a:google:chrome:14.0.835.28
  • Google Chrome 14.0.835.29
    cpe:2.3:a:google:chrome:14.0.835.29
  • Google Chrome 14.0.835.30
    cpe:2.3:a:google:chrome:14.0.835.30
  • Google Chrome 14.0.835.31
    cpe:2.3:a:google:chrome:14.0.835.31
  • cpe:2.3:a:google:chrome:14.0.835.32
  • Google Chrome 14.0.835.33
    cpe:2.3:a:google:chrome:14.0.835.33
  • cpe:2.3:a:google:chrome:14.0.835.34
  • Google Chrome 14.0.835.35
    cpe:2.3:a:google:chrome:14.0.835.35
  • cpe:2.3:a:google:chrome:14.0.835.86
  • Google Chrome 14.0.835.87
    cpe:2.3:a:google:chrome:14.0.835.87
  • cpe:2.3:a:google:chrome:14.0.835.88
  • Google Chrome 14.0.835.89
    cpe:2.3:a:google:chrome:14.0.835.89
  • Google Chrome 14.0.835.90
    cpe:2.3:a:google:chrome:14.0.835.90
  • cpe:2.3:a:google:chrome:14.0.835.91
  • Google Chrome 14.0.835.92
    cpe:2.3:a:google:chrome:14.0.835.92
  • Google Chrome 14.0.835.93
    cpe:2.3:a:google:chrome:14.0.835.93
  • cpe:2.3:a:google:chrome:14.0.835.94
  • Google Chrome 14.0.835.95
    cpe:2.3:a:google:chrome:14.0.835.95
  • Google Chrome 14.0.835.96
    cpe:2.3:a:google:chrome:14.0.835.96
  • Google Chrome 14.0.835.97
    cpe:2.3:a:google:chrome:14.0.835.97
  • Google Chrome 14.0.835.98
    cpe:2.3:a:google:chrome:14.0.835.98
  • Google Chrome 14.0.835.99
    cpe:2.3:a:google:chrome:14.0.835.99
  • cpe:2.3:a:google:chrome:14.0.835.100
  • Google Chrome 14.0.835.101
    cpe:2.3:a:google:chrome:14.0.835.101
  • cpe:2.3:a:google:chrome:14.0.835.102
  • Google Chrome 14.0.835.103
    cpe:2.3:a:google:chrome:14.0.835.103
  • Google Chrome 14.0.835.104
    cpe:2.3:a:google:chrome:14.0.835.104
  • Google Chrome 14.0.835.105
    cpe:2.3:a:google:chrome:14.0.835.105
  • cpe:2.3:a:google:chrome:14.0.835.106
  • cpe:2.3:a:google:chrome:14.0.835.107
  • Google Chrome 14.0.835.108
    cpe:2.3:a:google:chrome:14.0.835.108
  • Google Chrome 14.0.835.109
    cpe:2.3:a:google:chrome:14.0.835.109
  • cpe:2.3:a:google:chrome:14.0.835.110
  • cpe:2.3:a:google:chrome:14.0.835.111
  • cpe:2.3:a:google:chrome:14.0.835.112
  • cpe:2.3:a:google:chrome:14.0.835.113
  • cpe:2.3:a:google:chrome:14.0.835.114
  • cpe:2.3:a:google:chrome:14.0.835.115
  • Google Chrome 14.0.835.116
    cpe:2.3:a:google:chrome:14.0.835.116
  • cpe:2.3:a:google:chrome:14.0.835.117
  • cpe:2.3:a:google:chrome:14.0.835.118
  • cpe:2.3:a:google:chrome:14.0.835.119
  • Google Chrome 14.0.835.120
    cpe:2.3:a:google:chrome:14.0.835.120
  • cpe:2.3:a:google:chrome:14.0.835.121
  • Google Chrome 14.0.835.122
    cpe:2.3:a:google:chrome:14.0.835.122
  • Google Chrome 14.0.835.123
    cpe:2.3:a:google:chrome:14.0.835.123
  • Google Chrome 14.0.835.124
    cpe:2.3:a:google:chrome:14.0.835.124
  • Google Chrome 14.0.835.125
    cpe:2.3:a:google:chrome:14.0.835.125
  • Google Chrome 14.0.835.126
    cpe:2.3:a:google:chrome:14.0.835.126
  • Google Chrome 14.0.835.127
    cpe:2.3:a:google:chrome:14.0.835.127
  • cpe:2.3:a:google:chrome:14.0.835.128
  • cpe:2.3:a:google:chrome:14.0.835.149
  • cpe:2.3:a:google:chrome:14.0.835.150
  • cpe:2.3:a:google:chrome:14.0.835.151
  • Google Chrome 14.0.835.152
    cpe:2.3:a:google:chrome:14.0.835.152
  • cpe:2.3:a:google:chrome:14.0.835.153
  • Google Chrome 14.0.835.154
    cpe:2.3:a:google:chrome:14.0.835.154
  • cpe:2.3:a:google:chrome:14.0.835.155
  • Google Chrome 14.0.835.156
    cpe:2.3:a:google:chrome:14.0.835.156
  • cpe:2.3:a:google:chrome:14.0.835.157
  • cpe:2.3:a:google:chrome:14.0.835.158
  • Google Chrome 14.0.835.159
    cpe:2.3:a:google:chrome:14.0.835.159
  • cpe:2.3:a:google:chrome:14.0.835.160
  • cpe:2.3:a:google:chrome:14.0.835.161
  • cpe:2.3:a:google:chrome:14.0.835.162
  • cpe:2.3:a:google:chrome:14.0.835.163
  • Google Chrome 14.0.835.184
    cpe:2.3:a:google:chrome:14.0.835.184
  • cpe:2.3:a:google:chrome:14.0.835.186
  • Google Chrome 14.0.835.187
    cpe:2.3:a:google:chrome:14.0.835.187
  • cpe:2.3:a:google:chrome:14.0.835.202
  • Google Chrome 14.0.835.203
    cpe:2.3:a:google:chrome:14.0.835.203
  • Google Chrome 14.0.835.204
    cpe:2.3:a:google:chrome:14.0.835.204
  • Google Chrome 14.0.836.0
    cpe:2.3:a:google:chrome:14.0.836.0
  • Google Chrome 14.0.837.0
    cpe:2.3:a:google:chrome:14.0.837.0
  • Google Chrome 14.0.838.0
    cpe:2.3:a:google:chrome:14.0.838.0
  • Google Chrome 14.0.839.0
    cpe:2.3:a:google:chrome:14.0.839.0
  • Google Chrome 15.0.859.0
    cpe:2.3:a:google:chrome:15.0.859.0
  • Google Chrome 15.0.860.0
    cpe:2.3:a:google:chrome:15.0.860.0
  • Google Chrome 15.0.861.0
    cpe:2.3:a:google:chrome:15.0.861.0
  • Google Chrome 15.0.862.0
    cpe:2.3:a:google:chrome:15.0.862.0
  • cpe:2.3:a:google:chrome:15.0.862.1
  • cpe:2.3:a:google:chrome:15.0.863.0
  • Google Chrome 15.0.864.0
    cpe:2.3:a:google:chrome:15.0.864.0
  • Google Chrome 15.0.865.0
    cpe:2.3:a:google:chrome:15.0.865.0
  • cpe:2.3:a:google:chrome:15.0.866.0
  • Google Chrome 15.0.867.0
    cpe:2.3:a:google:chrome:15.0.867.0
  • cpe:2.3:a:google:chrome:15.0.868.0
  • cpe:2.3:a:google:chrome:15.0.868.1
  • cpe:2.3:a:google:chrome:15.0.869.0
  • Google Chrome 15.0.870.0
    cpe:2.3:a:google:chrome:15.0.870.0
  • Google Chrome 15.0.871.0
    cpe:2.3:a:google:chrome:15.0.871.0
  • Google Chrome 15.0.871.1
    cpe:2.3:a:google:chrome:15.0.871.1
  • cpe:2.3:a:google:chrome:15.0.872.0
  • Google Chrome 15.0.873.0
    cpe:2.3:a:google:chrome:15.0.873.0
  • cpe:2.3:a:google:chrome:15.0.874.0
  • cpe:2.3:a:google:chrome:15.0.874.1
  • Google Chrome 15.0.874.2
    cpe:2.3:a:google:chrome:15.0.874.2
  • Google Chrome 15.0.874.3
    cpe:2.3:a:google:chrome:15.0.874.3
  • cpe:2.3:a:google:chrome:15.0.874.4
  • Google Chrome 15.0.874.5
    cpe:2.3:a:google:chrome:15.0.874.5
  • Google Chrome 15.0.874.6
    cpe:2.3:a:google:chrome:15.0.874.6
  • cpe:2.3:a:google:chrome:15.0.874.7
  • Google Chrome 15.0.874.8
    cpe:2.3:a:google:chrome:15.0.874.8
  • Google Chrome 15.0.874.9
    cpe:2.3:a:google:chrome:15.0.874.9
  • Google Chrome 15.0.874.10
    cpe:2.3:a:google:chrome:15.0.874.10
  • Google Chrome 15.0.874.11
    cpe:2.3:a:google:chrome:15.0.874.11
  • cpe:2.3:a:google:chrome:15.0.874.12
  • cpe:2.3:a:google:chrome:15.0.874.13
  • cpe:2.3:a:google:chrome:15.0.874.14
  • cpe:2.3:a:google:chrome:15.0.874.15
  • cpe:2.3:a:google:chrome:15.0.874.16
  • cpe:2.3:a:google:chrome:15.0.874.17
  • Google Chrome 15.0.874.18
    cpe:2.3:a:google:chrome:15.0.874.18
  • cpe:2.3:a:google:chrome:15.0.874.19
  • cpe:2.3:a:google:chrome:15.0.874.20
  • Google Chrome 15.0.874.21
    cpe:2.3:a:google:chrome:15.0.874.21
  • cpe:2.3:a:google:chrome:15.0.874.22
  • Google Chrome 15.0.874.23
    cpe:2.3:a:google:chrome:15.0.874.23
  • cpe:2.3:a:google:chrome:15.0.874.24
  • cpe:2.3:a:google:chrome:15.0.874.44
  • cpe:2.3:a:google:chrome:15.0.874.45
  • Google Chrome 15.0.874.46
    cpe:2.3:a:google:chrome:15.0.874.46
  • Google Chrome 15.0.874.47
    cpe:2.3:a:google:chrome:15.0.874.47
  • cpe:2.3:a:google:chrome:15.0.874.48
  • cpe:2.3:a:google:chrome:15.0.874.49
  • cpe:2.3:a:google:chrome:15.0.874.101
  • cpe:2.3:a:google:chrome:15.0.874.102
  • Google Chrome 15.0.874.103
    cpe:2.3:a:google:chrome:15.0.874.103
  • Google Chrome 15.0.874.104
    cpe:2.3:a:google:chrome:15.0.874.104
  • cpe:2.3:a:google:chrome:15.0.874.106
  • Google Chrome 15.0.874.116
    cpe:2.3:a:google:chrome:15.0.874.116
  • cpe:2.3:a:google:chrome:15.0.874.117
  • Google Chrome 15.0.874.119
    cpe:2.3:a:google:chrome:15.0.874.119
  • Google Chrome 15.0.874.120
    cpe:2.3:a:google:chrome:15.0.874.120
  • cpe:2.3:a:google:chrome:15.0.874.121
  • cpe:2.3:a:google:chrome:16.0.877.0
  • cpe:2.3:a:google:chrome:16.0.878.0
  • cpe:2.3:a:google:chrome:16.0.879.0
  • cpe:2.3:a:google:chrome:16.0.880.0
  • cpe:2.3:a:google:chrome:16.0.881.0
  • Google Chrome 16.0.882.0
    cpe:2.3:a:google:chrome:16.0.882.0
  • Google Chrome 16.0.883.0
    cpe:2.3:a:google:chrome:16.0.883.0
  • cpe:2.3:a:google:chrome:16.0.884.0
  • cpe:2.3:a:google:chrome:16.0.885.0
  • Google Chrome 16.0.886.0
    cpe:2.3:a:google:chrome:16.0.886.0
  • cpe:2.3:a:google:chrome:16.0.886.1
  • Google Chrome 16.0.887.0
    cpe:2.3:a:google:chrome:16.0.887.0
  • cpe:2.3:a:google:chrome:16.0.888.0
  • Google Chrome 16.0.889.0
    cpe:2.3:a:google:chrome:16.0.889.0
  • cpe:2.3:a:google:chrome:16.0.889.2
  • Google Chrome 16.0.889.3
    cpe:2.3:a:google:chrome:16.0.889.3
  • cpe:2.3:a:google:chrome:16.0.890.0
  • Google Chrome 16.0.890.1
    cpe:2.3:a:google:chrome:16.0.890.1
  • cpe:2.3:a:google:chrome:16.0.891.0
  • cpe:2.3:a:google:chrome:16.0.891.1
  • cpe:2.3:a:google:chrome:16.0.892.0
  • Google Chrome 16.0.893.0
    cpe:2.3:a:google:chrome:16.0.893.0
  • Google Chrome 16.0.893.1
    cpe:2.3:a:google:chrome:16.0.893.1
  • cpe:2.3:a:google:chrome:16.0.894.0
  • cpe:2.3:a:google:chrome:16.0.895.0
  • cpe:2.3:a:google:chrome:16.0.896.0
  • cpe:2.3:a:google:chrome:16.0.897.0
  • Google Chrome 16.0.898.0
    cpe:2.3:a:google:chrome:16.0.898.0
  • Google Chrome 16.0.899.0
    cpe:2.3:a:google:chrome:16.0.899.0
  • cpe:2.3:a:google:chrome:16.0.900.0
  • cpe:2.3:a:google:chrome:16.0.901.0
  • Google Chrome 16.0.902.0
    cpe:2.3:a:google:chrome:16.0.902.0
  • Google Chrome 16.0.903.0
    cpe:2.3:a:google:chrome:16.0.903.0
  • Google Chrome 16.0.904.0
    cpe:2.3:a:google:chrome:16.0.904.0
  • cpe:2.3:a:google:chrome:16.0.905.0
  • cpe:2.3:a:google:chrome:16.0.906.0
  • Google Chrome 16.0.906.1
    cpe:2.3:a:google:chrome:16.0.906.1
  • Google Chrome 16.0.907.0
    cpe:2.3:a:google:chrome:16.0.907.0
  • Google Chrome 16.0.908.0
    cpe:2.3:a:google:chrome:16.0.908.0
  • Google Chrome 16.0.909.0
    cpe:2.3:a:google:chrome:16.0.909.0
  • cpe:2.3:a:google:chrome:16.0.910.0
  • Google Chrome 16.0.911.0
    cpe:2.3:a:google:chrome:16.0.911.0
  • Google Chrome 16.0.911.1
    cpe:2.3:a:google:chrome:16.0.911.1
  • Google Chrome 16.0.911.2
    cpe:2.3:a:google:chrome:16.0.911.2
  • cpe:2.3:a:google:chrome:16.0.912.0
  • cpe:2.3:a:google:chrome:16.0.912.1
  • cpe:2.3:a:google:chrome:16.0.912.2
  • Google Chrome 16.0.912.3
    cpe:2.3:a:google:chrome:16.0.912.3
  • Google Chrome 16.0.912.4
    cpe:2.3:a:google:chrome:16.0.912.4
  • cpe:2.3:a:google:chrome:16.0.912.5
  • Google Chrome 16.0.912.6
    cpe:2.3:a:google:chrome:16.0.912.6
  • cpe:2.3:a:google:chrome:16.0.912.7
  • cpe:2.3:a:google:chrome:16.0.912.8
  • cpe:2.3:a:google:chrome:16.0.912.9
  • cpe:2.3:a:google:chrome:16.0.912.10
  • cpe:2.3:a:google:chrome:16.0.912.11
  • Google Chrome 16.0.912.12
    cpe:2.3:a:google:chrome:16.0.912.12
  • cpe:2.3:a:google:chrome:16.0.912.13
  • cpe:2.3:a:google:chrome:16.0.912.14
  • cpe:2.3:a:google:chrome:16.0.912.15
  • Google Chrome 16.0.912.19
    cpe:2.3:a:google:chrome:16.0.912.19
  • Google Chrome 16.0.912.20
    cpe:2.3:a:google:chrome:16.0.912.20
  • cpe:2.3:a:google:chrome:16.0.912.21
  • cpe:2.3:a:google:chrome:16.0.912.22
  • Google Chrome 16.0.912.23
    cpe:2.3:a:google:chrome:16.0.912.23
  • Google Chrome 16.0.912.24
    cpe:2.3:a:google:chrome:16.0.912.24
  • Google Chrome 16.0.912.25
    cpe:2.3:a:google:chrome:16.0.912.25
  • Google Chrome 16.0.912.26
    cpe:2.3:a:google:chrome:16.0.912.26
  • cpe:2.3:a:google:chrome:16.0.912.27
  • cpe:2.3:a:google:chrome:16.0.912.28
  • cpe:2.3:a:google:chrome:16.0.912.29
  • Google Chrome 16.0.912.30
    cpe:2.3:a:google:chrome:16.0.912.30
  • cpe:2.3:a:google:chrome:16.0.912.31
  • Google Chrome 16.0.912.32
    cpe:2.3:a:google:chrome:16.0.912.32
  • Google Chrome 16.0.912.33
    cpe:2.3:a:google:chrome:16.0.912.33
  • Google Chrome 16.0.912.34
    cpe:2.3:a:google:chrome:16.0.912.34
  • Google Chrome 16.0.912.35
    cpe:2.3:a:google:chrome:16.0.912.35
  • Google Chrome 16.0.912.36
    cpe:2.3:a:google:chrome:16.0.912.36
  • Google Chrome 16.0.912.37
    cpe:2.3:a:google:chrome:16.0.912.37
  • cpe:2.3:a:google:chrome:16.0.912.38
  • cpe:2.3:a:google:chrome:16.0.912.39
  • Google Chrome 16.0.912.40
    cpe:2.3:a:google:chrome:16.0.912.40
  • cpe:2.3:a:google:chrome:16.0.912.41
  • Google Chrome 16.0.912.42
    cpe:2.3:a:google:chrome:16.0.912.42
  • cpe:2.3:a:google:chrome:16.0.912.43
  • cpe:2.3:a:google:chrome:16.0.912.62
  • Google Chrome 16.0.912.63
    cpe:2.3:a:google:chrome:16.0.912.63
  • Google Chrome 16.0.912.66
    cpe:2.3:a:google:chrome:16.0.912.66
  • cpe:2.3:a:google:chrome:16.0.912.74
  • cpe:2.3:a:google:chrome:16.0.912.75
  • Google Chrome 16.0.912.76
    cpe:2.3:a:google:chrome:16.0.912.76
  • Google Chrome 16.0.912.77
    cpe:2.3:a:google:chrome:16.0.912.77
  • cpe:2.3:a:google:chrome:17.0.921.3
  • Google Chrome 17.0.922.0
    cpe:2.3:a:google:chrome:17.0.922.0
  • cpe:2.3:a:google:chrome:17.0.923.0
  • cpe:2.3:a:google:chrome:17.0.923.1
  • cpe:2.3:a:google:chrome:17.0.924.0
  • Google Chrome 17.0.925.0
    cpe:2.3:a:google:chrome:17.0.925.0
  • cpe:2.3:a:google:chrome:17.0.926.0
  • cpe:2.3:a:google:chrome:17.0.927.0
  • cpe:2.3:a:google:chrome:17.0.928.0
  • Google Chrome 17.0.928.1
    cpe:2.3:a:google:chrome:17.0.928.1
  • Google Chrome 17.0.928.2
    cpe:2.3:a:google:chrome:17.0.928.2
  • cpe:2.3:a:google:chrome:17.0.928.3
  • cpe:2.3:a:google:chrome:17.0.929.0
  • cpe:2.3:a:google:chrome:17.0.930.0
  • cpe:2.3:a:google:chrome:17.0.931.0
  • cpe:2.3:a:google:chrome:17.0.932.0
  • Google Chrome 17.0.933.0
    cpe:2.3:a:google:chrome:17.0.933.0
  • cpe:2.3:a:google:chrome:17.0.933.1
  • Google Chrome 17.0.934.0
    cpe:2.3:a:google:chrome:17.0.934.0
  • cpe:2.3:a:google:chrome:17.0.935.0
  • cpe:2.3:a:google:chrome:17.0.935.1
  • Google Chrome 17.0.936.0
    cpe:2.3:a:google:chrome:17.0.936.0
  • Google Chrome 17.0.936.1
    cpe:2.3:a:google:chrome:17.0.936.1
  • Google Chrome 17.0.937.0
    cpe:2.3:a:google:chrome:17.0.937.0
  • Google Chrome 17.0.938.0
    cpe:2.3:a:google:chrome:17.0.938.0
  • Google Chrome 17.0.939.0
    cpe:2.3:a:google:chrome:17.0.939.0
  • Google Chrome 17.0.939.1
    cpe:2.3:a:google:chrome:17.0.939.1
  • Google Chrome 17.0.940.0
    cpe:2.3:a:google:chrome:17.0.940.0
  • cpe:2.3:a:google:chrome:17.0.941.0
  • Google Chrome 17.0.942.0
    cpe:2.3:a:google:chrome:17.0.942.0
  • cpe:2.3:a:google:chrome:17.0.943.0
  • cpe:2.3:a:google:chrome:17.0.944.0
  • Google Chrome 17.0.945.0
    cpe:2.3:a:google:chrome:17.0.945.0
  • cpe:2.3:a:google:chrome:17.0.946.0
  • cpe:2.3:a:google:chrome:17.0.947.0
  • Google Chrome 17.0.948.0
    cpe:2.3:a:google:chrome:17.0.948.0
  • Google Chrome 17.0.949.0
    cpe:2.3:a:google:chrome:17.0.949.0
  • cpe:2.3:a:google:chrome:17.0.950.0
  • cpe:2.3:a:google:chrome:17.0.951.0
  • Google Chrome 17.0.952.0
    cpe:2.3:a:google:chrome:17.0.952.0
  • cpe:2.3:a:google:chrome:17.0.953.0
  • Google Chrome 17.0.954.0
    cpe:2.3:a:google:chrome:17.0.954.0
  • Google Chrome 17.0.954.1
    cpe:2.3:a:google:chrome:17.0.954.1
  • cpe:2.3:a:google:chrome:17.0.954.2
  • Google Chrome 17.0.954.3
    cpe:2.3:a:google:chrome:17.0.954.3
  • Google Chrome 17.0.955.0
    cpe:2.3:a:google:chrome:17.0.955.0
  • cpe:2.3:a:google:chrome:17.0.956.0
  • cpe:2.3:a:google:chrome:17.0.957.0
  • Google Chrome 17.0.958.0
    cpe:2.3:a:google:chrome:17.0.958.0
  • cpe:2.3:a:google:chrome:17.0.958.1
  • cpe:2.3:a:google:chrome:17.0.959.0
  • Google Chrome 17.0.960.0
    cpe:2.3:a:google:chrome:17.0.960.0
  • Google Chrome 17.0.961.0
    cpe:2.3:a:google:chrome:17.0.961.0
  • Google Chrome 17.0.962.0
    cpe:2.3:a:google:chrome:17.0.962.0
  • cpe:2.3:a:google:chrome:17.0.963.0
  • Google Chrome 17.0.963.1
    cpe:2.3:a:google:chrome:17.0.963.1
  • cpe:2.3:a:google:chrome:17.0.963.2
  • cpe:2.3:a:google:chrome:17.0.963.3
  • cpe:2.3:a:google:chrome:17.0.963.4
  • cpe:2.3:a:google:chrome:17.0.963.5
  • Google Chrome 17.0.963.6
    cpe:2.3:a:google:chrome:17.0.963.6
  • cpe:2.3:a:google:chrome:17.0.963.7
  • cpe:2.3:a:google:chrome:17.0.963.8
  • cpe:2.3:a:google:chrome:17.0.963.9
  • Google Chrome 17.0.963.10
    cpe:2.3:a:google:chrome:17.0.963.10
  • cpe:2.3:a:google:chrome:17.0.963.11
  • cpe:2.3:a:google:chrome:17.0.963.12
  • Google Chrome 17.0.963.13
    cpe:2.3:a:google:chrome:17.0.963.13
  • Google Chrome 17.0.963.14
    cpe:2.3:a:google:chrome:17.0.963.14
  • cpe:2.3:a:google:chrome:17.0.963.15
  • cpe:2.3:a:google:chrome:17.0.963.16
  • cpe:2.3:a:google:chrome:17.0.963.17
  • cpe:2.3:a:google:chrome:17.0.963.18
  • Google Chrome 17.0.963.19
    cpe:2.3:a:google:chrome:17.0.963.19
  • Google Chrome 17.0.963.20
    cpe:2.3:a:google:chrome:17.0.963.20
  • Google Chrome 17.0.963.21
    cpe:2.3:a:google:chrome:17.0.963.21
  • cpe:2.3:a:google:chrome:17.0.963.22
  • cpe:2.3:a:google:chrome:17.0.963.23
  • cpe:2.3:a:google:chrome:17.0.963.24
  • cpe:2.3:a:google:chrome:17.0.963.25
  • Google Chrome 17.0.963.26
    cpe:2.3:a:google:chrome:17.0.963.26
  • Google Chrome 17.0.963.27
    cpe:2.3:a:google:chrome:17.0.963.27
  • Google Chrome 17.0.963.28
    cpe:2.3:a:google:chrome:17.0.963.28
  • cpe:2.3:a:google:chrome:17.0.963.29
  • Google Chrome 17.0.963.30
    cpe:2.3:a:google:chrome:17.0.963.30
  • Google Chrome 17.0.963.31
    cpe:2.3:a:google:chrome:17.0.963.31
  • cpe:2.3:a:google:chrome:17.0.963.32
  • Google Chrome 17.0.963.33
    cpe:2.3:a:google:chrome:17.0.963.33
  • Google Chrome 17.0.963.34
    cpe:2.3:a:google:chrome:17.0.963.34
  • cpe:2.3:a:google:chrome:17.0.963.35
  • Google Chrome 17.0.963.36
    cpe:2.3:a:google:chrome:17.0.963.36
  • cpe:2.3:a:google:chrome:17.0.963.37
  • Google Chrome 17.0.963.38
    cpe:2.3:a:google:chrome:17.0.963.38
  • Google Chrome 17.0.963.39
    cpe:2.3:a:google:chrome:17.0.963.39
  • Google Chrome 17.0.963.40
    cpe:2.3:a:google:chrome:17.0.963.40
  • cpe:2.3:a:google:chrome:17.0.963.41
  • Google Chrome 17.0.963.42
    cpe:2.3:a:google:chrome:17.0.963.42
  • cpe:2.3:a:google:chrome:17.0.963.43
  • cpe:2.3:a:google:chrome:17.0.963.44
  • cpe:2.3:a:google:chrome:17.0.963.45
  • cpe:2.3:a:google:chrome:17.0.963.46
  • cpe:2.3:a:google:chrome:17.0.963.47
  • cpe:2.3:a:google:chrome:17.0.963.48
  • Google Chrome 17.0.963.49
    cpe:2.3:a:google:chrome:17.0.963.49
  • Google Chrome 17.0.963.50
    cpe:2.3:a:google:chrome:17.0.963.50
  • Google Chrome 17.0.963.51
    cpe:2.3:a:google:chrome:17.0.963.51
  • Google Chrome 17.0.963.52
    cpe:2.3:a:google:chrome:17.0.963.52
  • cpe:2.3:a:google:chrome:17.0.963.53
  • cpe:2.3:a:google:chrome:17.0.963.54
  • cpe:2.3:a:google:chrome:17.0.963.55
  • Red Hat libpng
    cpe:2.3:a:redhat:libpng
CVSS
Base: 7.5 (as of 21-10-2016 - 12:53)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_7_5.NASL
    description The remote host is running a version of Mac OS X 10.7.x that is prior to 10.7.5. The newer version contains multiple security-related fixes for the following components : - Apache - BIND - CoreText - Data Security - ImageIO - Installer - International Components for Unicode - Kernel - Mail - PHP - Profile Manager - QuickLook - QuickTime - Ruby - USB
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 62214
    published 2012-09-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62214
    title Mac OS X 10.7.x < 10.7.5 Multiple Vulnerabilities (BEAST)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2012-004.NASL
    description The remote host is running a version of Mac OS X 10.6 that does not have Security Update 2012-004 applied. This update contains multiple security-related fixes for the following components : - Apache - Data Security - DirectoryService - ImageIO - International Components for Unicode - Mail - PHP - QuickLook - QuickTime - Ruby
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 62213
    published 2012-09-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62213
    title Mac OS X Multiple Vulnerabilities (Security Update 2012-004) (BEAST)
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_3627.NASL
    description The installed version of Firefox 3.6.x is earlier than 3.6.27 and is, therefore, potentially affected by an integer overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 58006
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58006
    title Firefox 3.6.x < 3.6.27 'png_decompress_chunk' Integer Overflow
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0142.NASL
    description An updated firefox package that fixes one security issue is now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Mozilla Firefox is an open source web browser. A heap-based buffer overflow flaw was found in the way Firefox handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3026) All Firefox users should upgrade to this updated package, which corrects this issue. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57994
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57994
    title RHEL 4 : firefox (RHSA-2012:0142)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1800.NASL
    description Fix for the libpng security flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58189
    published 2012-03-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58189
    title Fedora 17 : xulrunner-10.0.1-3.fc17 (2012-1800)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-5068.NASL
    description - Fixes an issue that may cause hangs when handling IMAP mail (mozbz#733731) - Fixes an issue that may cause filters that move mail to specific folders to be erronously changed (mozbz#735940) Fixes a libpng flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58634
    published 2012-04-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58634
    title Fedora 15 : thunderbird-11.0.1-1.fc15 (2012-5068)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-137.NASL
    description libpng was prone to a heap based buffer overflow vulnerability (bnc#747311)
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 74559
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74559
    title openSUSE Security Update : libpng12 / libpng14 (openSUSE-2012-137)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1367-3.NASL
    description USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Thunderbird. Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 58035
    published 2012-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58035
    title Ubuntu 10.04 LTS / 10.10 / 11.04 : thunderbird vulnerability (USN-1367-3)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2410.NASL
    description Jueri Aedla discovered an integer overflow in the libpng PNG library, which could lead to the execution of arbitrary code if a malformed image is processed.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57964
    published 2012-02-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57964
    title Debian DSA-2410-1 : libpng - integer overflow
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0140.NASL
    description An updated thunderbird package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. A heap-based buffer overflow flaw was found in the way Thunderbird handled PNG (Portable Network Graphics) images. An HTML mail message or remote content containing a specially crafted PNG image could cause Thunderbird to crash or, possibly, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3026) All Thunderbird users should upgrade to this updated package, which corrects this issue. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57992
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57992
    title RHEL 6 : thunderbird (RHSA-2012:0140)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-142.NASL
    description Chromium version 19.0.1046 and v8 version 3.9.7.0 fix several security issues.
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 74563
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74563
    title openSUSE Security Update : chromium / v8 (openSUSE-2012-142)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1369-1.NASL
    description Nicolas Gregoire and Aki Helin discovered that when processing a malformed embedded XSLT stylesheet, Thunderbird can crash due to memory corruption. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2012-0449) It was discovered that memory corruption could occur during the decoding of Ogg Vorbis files. If the user were tricked into opening a specially crafted file, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2012-0444) Tim Abraldes discovered that when encoding certain image types the resulting data was always a fixed size. There is the possibility of sensitive data from uninitialized memory being appended to these images. (CVE-2012-0447) It was discovered that Thunderbird did not properly perform XPConnect security checks. An attacker could exploit this to conduct cross-site scripting (XSS) attacks through web pages and Thunderbird extensions. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0446) It was discovered that Thunderbird did not properly handle node removal in the DOM. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2011-3659) Alex Dvorov discovered that Thunderbird did not properly handle sub-frames in form submissions. An attacker could exploit this to conduct phishing attacks using HTML5 frames. (CVE-2012-0445) Ben Hawkes, Christian Holler, Honza Bombas, Jason Orendorff, Jesse Ruderman, Jan Odvarko, Peter Van Der Beken, Bob Clary, and Bill McCloskey discovered memory safety issues affecting Thunderbird. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2012-0442, CVE-2012-0443) Andrew McCreight and Olli Pettay discovered a use-after-free vulnerability in the XBL bindings. An attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2012-0452) Jueri Aedla discovered that libpng, which is in Thunderbird, did not properly verify the size used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 58037
    published 2012-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58037
    title Ubuntu 11.10 : thunderbird vulnerabilities (USN-1369-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1367-1.NASL
    description It was discovered that libpng did not properly verify the embedded profile length of iCCP chunks. An attacker could exploit this to cause a denial of service via application crash. This issue only affected Ubuntu 8.04 LTS. (CVE-2009-5063) Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 57998
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57998
    title Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libpng vulnerabilities (USN-1367-1)
  • NASL family Windows
    NASL id GOOGLE_CHROME_17_0_963_56.NASL
    description The version of Google Chrome installed on the remote host is earlier than 17.0.963.56 and is, therefore, affected by the following vulnerabilities: - Integer overflow errors exist related to PDF codecs and libpng. (CVE-2011-3015, CVE-2011-3026) - A read-after-free error exists related to 'counter nodes'. (CVE-2011-3016) - Use-after-free errors exist related to database handling, subframe loading, and drag-and-drop functionality. (CVE-2011-3017, CVE-2011-3021, CVE-2011-3023) - Heap-overflow errors exist related to path rendering and 'MKV' handling. (CVE-2011-3018, CVE-2011-3019) - Unspecified errors exist related to the native client validator and HTTP use with translation scripts. (CVE-2011-3020, CVE-2011-3022) - Empty x509 certificates can cause browser crashes. (CVE-2011-3024) - An out-of-bounds read error exists related to h.264 parsing. (CVE-2011-3025) - A bad variable cast exists related to column handling. (CVE-2011-3027)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 57974
    published 2012-02-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57974
    title Google Chrome < 17.0.963.56 Multiple Vulnerabilities
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_2F5FF968582911E1828800262D5ED8EE.NASL
    description Google Chrome Releases reports : [105803] High CVE-2011-3015: Integer overflows in PDF codecs. Credit to Google Chrome Security Team (scarybeasts). [106336] Medium CVE-2011-3016: Read-after-free with counter nodes. Credit to miaubiz. [108695] High CVE-2011-3017: Possible use-after-free in database handling. Credit to miaubiz. [110172] High CVE-2011-3018: Heap overflow in path rendering. Credit to Aki Helin of OUSPG. [110849] High CVE-2011-3019: Heap buffer overflow in MKV handling. Credit to Google Chrome Security Team (scarybeasts) and Mateusz Jurczyk of the Google Security Team. [111575] Medium CVE-2011-3020: Native client validator error. Credit to Nick Bray of the Chromium development community. [111779] High CVE-2011-3021: Use-after-free in subframe loading. Credit to Arthur Gerkis. [112236] Medium CVE-2011-3022: Inappropriate use of http for translation script. Credit to Google Chrome Security Team (Jorge Obes). [112259] Medium CVE-2011-3023: Use-after-free with drag and drop. Credit to pa_kt. [112451] Low CVE-2011-3024: Browser crash with empty x509 certificate. Credit to chrometot. [112670] Medium CVE-2011-3025: Out-of-bounds read in h.264 parsing. Credit to Slawomir Blazek. [112822] High CVE-2011-3026: Integer overflow / truncation in libpng. Credit to Juri Aedla. [112847] Medium CVE-2011-3027: Bad cast in column handling. Credit to miaubiz.
    last seen 2019-02-21
    modified 2013-06-21
    plugin id 57968
    published 2012-02-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57968
    title FreeBSD : chromium -- multiple vulnerabilities (2f5ff968-5829-11e1-8288-00262d5ed8ee)
  • NASL family Gain a shell remotely
    NASL id APPLETV_5_1.NASL
    description According to its banner, the remote Apple TV 2nd generation or later device has a version of iOS that is prior to 5.1. It is, therefore, reportedly affected by several vulnerabilities : - An uninitialized memory access issue in the handling of Sorenson encoded movie files could lead to arbitrary code execution. (CVE-2012-3722) - Following the DNAv4 protocol, the device may broadcast MAC addresses of previously accessed networks when connecting to a Wi-Fi network. (CVE-2012-3725) - A buffer overflow in libtiff's handling of ThunderScan encoded TIFF images could lead to arbitrary code execution. (CVE-2011-1167) - Multiple memory corruption issues in libpng's handling of PNG images could lead to arbitrary code execution. (CVE-2011-3026 / CVE-2011-3048 / CVE-2011-3328) - A double free issue in ImageIO's handling of JPEG images could lead to arbitrary code execution. (CVE-2012-3726) - An integer overflow issue in libTIFF's handling of TIFF images could lead to arbitrary code execution. (CVE-2012-1173) - A stack-based buffer overflow in the handling of ICU locale IDs could lead to arbitrary code execution. (CVE-2011-4599) - Multiple vulnerabilities in libxml could have a variety of impacts, including arbitrary code execution. (CVE-2011-1944 / CVE-2011-2821 / CVE-2011-2834 / CVE-2011-3919) - Multiple memory corruption issues in JavaScriptCore could lead to arbitrary code execution. (CVE-2012-0682 / CVE-2012-0683 / CVE-2012-3589 / CVE-2012-3590 / CVE-2012-3591 / CVE-2012-3592 / CVE-2012-3678 / CVE-2012-3679)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 62357
    published 2012-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62357
    title Apple TV < 5.1 Multiple Vulnerabilities
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_LIBPNG_20130313.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation. (CVE-2011-3026) - The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow. (CVE-2011-3048)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80674
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80674
    title Oracle Solaris Third-Party Patch Update : libpng (multiple_vulnerabilities_in_libpng2)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120220_LIBPNG_ON_SL4_X.NASL
    description The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A heap-based buffer overflow flaw was found in libpng. An attacker could create a specially crafted PNG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) Users of libpng and libpng10 should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61254
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61254
    title Scientific Linux Security Update : libpng on SL4.x, SL5.x, SL6.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0317.NASL
    description Updated libpng and libpng10 packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A heap-based buffer overflow flaw was found in libpng. An attacker could create a specially crafted PNG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) Users of libpng and libpng10 should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58042
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58042
    title CentOS 4 / 5 / 6 : libpng / libpng10 (CESA-2012:0317)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0142.NASL
    description An updated firefox package that fixes one security issue is now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Mozilla Firefox is an open source web browser. A heap-based buffer overflow flaw was found in the way Firefox handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3026) All Firefox users should upgrade to this updated package, which corrects this issue. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57984
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57984
    title CentOS 4 : firefox (CESA-2012:0142)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1794.NASL
    description Fixes a libpng flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58149
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58149
    title Fedora 17 : thunderbird-10.0.1-2.fc17 (2012-1794)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-120.NASL
    description the embedded copy of libpng was prone to a heap based buffer overflow
    last seen 2018-09-01
    modified 2014-06-13
    plugin id 74549
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74549
    title openSUSE Security Update : MozillaFirefox / MozillaThunderbird / mozilla-xulrunner192 / etc (openSUSE-2012-120)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1922.NASL
    description Fix nasty buffer overrun bug, CVE-2011-3026 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58051
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58051
    title Fedora 16 : libpng-1.2.46-2.fc16 (2012-1922)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1367-4.NASL
    description USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Xulrunner. Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 58036
    published 2012-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58036
    title Ubuntu 10.04 LTS / 10.10 : xulrunner-1.9.2 vulnerability (USN-1367-4)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_MOZILLAFIREFOX-7981.NASL
    description Mozilla Firefox was updated to 3.6.27 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 58116
    published 2012-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58116
    title SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 7981)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0141.NASL
    description From Red Hat Security Advisory 2012:0141 : Updated SeaMonkey packages that fix one security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SeaMonkey is an open source web browser, e-mail and newsgroup client, IRC chat client, and HTML editor. A heap-based buffer overflow flaw was found in the way SeaMonkey handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause SeaMonkey to crash or, possibly, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-3026) All SeaMonkey users should upgrade to these updated packages, which correct this issue. After installing the update, SeaMonkey must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-08-13
    plugin id 68463
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68463
    title Oracle Linux 4 : seamonkey (ELSA-2012-0141)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_MOZILLA-XULRUNNER192-120220.NASL
    description Mozilla XULRunner was updated to 1.9.2.27 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 58114
    published 2012-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58114
    title SuSE 11.1 Security Update : Mozilla XULrunner (SAT Patch Number 5840)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_THUNDERBIRD_3_1_19.NASL
    description The installed version of Thunderbird 3.1.x is earlier than 3.1.19 and is, therefore, potentially affected by an integer overflow vulnerability in libpng, a library used by this application. When decompressing certain PNG image files, this could be exploited to crash the application or even execute arbitrary code.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 58073
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58073
    title Thunderbird 3.1.x < 3.1.19 png_decompress_chunk Integer Overflow (Mac OS X)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_MOZILLAFIREFOX-120217.NASL
    description MozillaFirefox was updated to 10.0.2 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75953
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75953
    title openSUSE Security Update : MozillaFirefox (MozillaFirefox-5825)
  • NASL family Windows
    NASL id IBM_INFORMIX_GENERO_2_41.NASL
    description The installed version of IBM Informix Genero is earlier than 2.41 and is, therefore, potentially affected by an integer overflow vulnerability in the libpng library used by this application. When decompressing certain PNG image files, this could be exploited to crash the application or even execute arbitrary code.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 64379
    published 2013-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64379
    title IBM Informix Genero < 2.41 png_decompress_chunk Integer Overflow
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0143.NASL
    description Updated xulrunner packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. XULRunner provides the XUL Runtime environment for applications using the Gecko layout engine. A heap-based buffer overflow flaw was found in the way XULRunner handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause an application linked against XULRunner (such as Firefox) to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) All XULRunner users should upgrade to these updated packages, which correct this issue. After installing the update, applications using XULRunner must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57985
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57985
    title CentOS 5 / 6 : xulrunner (CESA-2012:0143)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0317.NASL
    description From Red Hat Security Advisory 2012:0317 : Updated libpng and libpng10 packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A heap-based buffer overflow flaw was found in libpng. An attacker could create a specially crafted PNG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) Users of libpng and libpng10 should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68485
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68485
    title Oracle Linux 4 / 5 / 6 : libpng (ELSA-2012-0317)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0317.NASL
    description Updated libpng and libpng10 packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A heap-based buffer overflow flaw was found in libpng. An attacker could create a specially crafted PNG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) Users of libpng and libpng10 should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 58068
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58068
    title RHEL 4 / 5 / 6 : libpng (RHSA-2012:0317)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_D7DBD2DB599C11E1A2FB14DAE9EBCF89.NASL
    description The Mozilla Project reports : MFSA 2012-11 libpng integer overflow
    last seen 2018-11-24
    modified 2018-11-23
    plugin id 58022
    published 2012-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58022
    title FreeBSD : mozilla -- heap-buffer overflow (d7dbd2db-599c-11e1-a2fb-14dae9ebcf89)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0143.NASL
    description From Red Hat Security Advisory 2012:0143 : Updated xulrunner packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. XULRunner provides the XUL Runtime environment for applications using the Gecko layout engine. A heap-based buffer overflow flaw was found in the way XULRunner handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause an application linked against XULRunner (such as Firefox) to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) All XULRunner users should upgrade to these updated packages, which correct this issue. After installing the update, applications using XULRunner must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-08-13
    plugin id 68465
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68465
    title Oracle Linux 5 / 6 : xulrunner (ELSA-2012-0143)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120216_XULRUNNER_ON_SL5_X.NASL
    description XULRunner provides the XUL Runtime environment for applications using the Gecko layout engine. A heap-based buffer overflow flaw was found in the way XULRunner handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause an application linked against XULRunner (such as Firefox) to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) All XULRunner users should upgrade to these updated packages, which correct this issue. After installing the update, applications using XULRunner must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61253
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61253
    title Scientific Linux Security Update : xulrunner on SL5.x, SL6.x i386/x86_64
  • NASL family Windows
    NASL id MOZILLA_FIREFOX_1002.NASL
    description The installed version of Firefox 10.x is earlier than 10.0.2 and is, therefore, potentially affected by an integer overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 58005
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58005
    title Firefox 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1367-2.NASL
    description USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Firefox. Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 58034
    published 2012-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58034
    title Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerability (USN-1367-2)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_MOZILLA-JS192-120217.NASL
    description Mozilla XULRunner was updated to 1.9.2.27 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75962
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75962
    title openSUSE Security Update : mozilla-js192 (mozilla-js192-5832)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201301-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201301-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL’s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser’s font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-11-19
    plugin id 63402
    published 2013-01-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63402
    title GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201206-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-201206-15 (libpng: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in libpng: The “embedded_profile_len()” function in pngwutil.c does not check for negative values, resulting in a memory leak (CVE-2009-5063). The “png_format_buffer()” function in pngerror.c contains an off-by-one error (CVE-2011-2501). The “png_rgb_to_gray()” function in pngrtran.c contains an integer overflow error (CVE-2011-2690). The “png_err()” function in pngerror.c contains a NULL pointer dereference error (CVE-2011-2691). The “png_handle_sCAL()” function in pngrutil.c improperly handles malformed sCAL chunks(CVE-2011-2692). The “png_decompress_chunk()” function in pngrutil.c contains an integer overflow error (CVE-2011-3026). The “png_inflate()” function in pngrutil.c contains and out of bounds error (CVE-2011-3045). The “png_set_text_2()” function in pngset.c contains an error which could result in memory corruption (CVE-2011-3048). The “png_formatted_warning()” function in pngerror.c contains an off-by-one error (CVE-2011-3464). Impact : An attacker could exploit these vulnerabilities to execute arbitrary code with the permissions of the user running the vulnerable program, which could be the root user, or to cause programs linked against the library to crash. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 59668
    published 2012-06-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59668
    title GLSA-201206-15 : libpng: Multiple vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-2028.NASL
    description This update addresses an integer overflow in the libpng10 PNG library, which could lead to the execution of arbitrary code if a malformed image is processed. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58156
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58156
    title Fedora 16 : libpng10-1.0.57-1.fc16 (2012-2028)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1930.NASL
    description Fix nasty buffer overrun bug, CVE-2011-3026 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58152
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58152
    title Fedora 15 : libpng-1.2.46-2.fc15 (2012-1930)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0141.NASL
    description Updated SeaMonkey packages that fix one security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SeaMonkey is an open source web browser, e-mail and newsgroup client, IRC chat client, and HTML editor. A heap-based buffer overflow flaw was found in the way SeaMonkey handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause SeaMonkey to crash or, possibly, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-3026) All SeaMonkey users should upgrade to these updated packages, which correct this issue. After installing the update, SeaMonkey must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57993
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57993
    title RHEL 4 : seamonkey (RHSA-2012:0141)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_LIBPNG14-120220.NASL
    description A heap-based buffer overflow in libpng was fixed that could potentially be exploited by attackers to execute arbitrary code or cause an application to crash (CVE-2011-3026).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75914
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75914
    title openSUSE Security Update : libpng14 (libpng14-5847)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_THUNDERBIRD_10_0_2.NASL
    description The installed version of Thunderbird 10.x is earlier than 10.0.2 and is, therefore, potentially affected by an integer overflow vulnerability in libpng, a library used by this application. When decompressing certain PNG image files, this could be exploited to crash the application or even execute arbitrary code.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 58075
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58075
    title Thunderbird 10.x < 10.0.2 png_decompress_chunk Integer Overflow (Mac OS X)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FIREFOX_10_0_2.NASL
    description The installed version of Firefox is earlier than 10.0.2 and is, therefore, potentially affected by an integer overflow vulnerability in libpng, a library used by this application. When decompressing certain PNG image files, this could be exploited to crash the application or even execute arbitrary code.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 58074
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58074
    title Firefox < 10.0.2 png_decompress_chunk Integer Overflow (Mac OS X)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0142.NASL
    description From Red Hat Security Advisory 2012:0142 : An updated firefox package that fixes one security issue is now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Mozilla Firefox is an open source web browser. A heap-based buffer overflow flaw was found in the way Firefox handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3026) All Firefox users should upgrade to this updated package, which corrects this issue. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-08-13
    plugin id 68464
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68464
    title Oracle Linux 4 : firefox (ELSA-2012-0142)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120216_FIREFOX_ON_SL4_X.NASL
    description Mozilla Firefox is an open source web browser. A heap-based buffer overflow flaw was found in the way Firefox handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3026) All Firefox users should upgrade to this updated package, which corrects this issue. After installing the update, Firefox must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61251
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61251
    title Scientific Linux Security Update : firefox on SL4.x i386/x86_64
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FIREFOX_3_6_27.NASL
    description The installed version of Firefox 3.6.x is earlier than 3.6.27 and is, therefore, potentially affected by an integer overflow vulnerability in libpng, a library used by this application. When decompressing certain PNG image files, this could be exploited to crash the application or even execute arbitrary code.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 58072
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58072
    title Firefox 3.6.x < 3.6.27 png_decompress_chunk Integer Overflow (Mac OS X)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1892.NASL
    description Fix nasty buffer overrun bug, CVE-2011-3026 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58150
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58150
    title Fedora 17 : libpng-1.5.8-2.fc17 (2012-1892)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1856.NASL
    description Fix for the libpng security flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58020
    published 2012-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58020
    title Fedora 16 : xulrunner-10.0.1-3.fc16 (2012-1856)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-2003.NASL
    description This update addresses an integer overflow in the libpng10 PNG library, which could lead to the execution of arbitrary code if a malformed image is processed. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58154
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58154
    title Fedora 17 : libpng10-1.0.57-1.fc17 (2012-2003)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-5028.NASL
    description - Fixes an issue that may cause hangs when handling IMAP mail (mozbz#733731) - Fixes an issue that may cause filters that move mail to specific folders to be erronously changed (mozbz#735940) Fixes a libpng flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58555
    published 2012-04-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58555
    title Fedora 16 : thunderbird-11.0.1-1.fc16 (2012-5028)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_MOZILLATHUNDERBIRD-120217.NASL
    description Mozilla Thunderbird was updated to 3.1.19 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75970
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75970
    title openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-5826)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_LIBPNG12-120220.NASL
    description A heap-based buffer overflow in libpng was fixed that could potentially be exploited by attackers to execute arbitrary code or cause an application to crash (CVE-2011-3026). libpng 1.2 was updated to 1.2.47 to fix this issue.
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75912
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75912
    title openSUSE Security Update : libpng12 (libpng12-5846)
  • NASL family Windows
    NASL id SEAMONKEY_272.NASL
    description The installed version of SeaMonkey is earlier than 2.7.2. Such versions are potentially affected by an integer overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.
    last seen 2019-02-21
    modified 2018-07-27
    plugin id 58009
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58009
    title SeaMonkey < 2.7.2 'png_decompress_chunk' Integer Overflow
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0143.NASL
    description Updated xulrunner packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. XULRunner provides the XUL Runtime environment for applications using the Gecko layout engine. A heap-based buffer overflow flaw was found in the way XULRunner handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause an application linked against XULRunner (such as Firefox) to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026) All XULRunner users should upgrade to these updated packages, which correct this issue. After installing the update, applications using XULRunner must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57995
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57995
    title RHEL 5 / 6 : xulrunner (RHSA-2012:0143)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0140.NASL
    description An updated thunderbird package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. A heap-based buffer overflow flaw was found in the way Thunderbird handled PNG (Portable Network Graphics) images. An HTML mail message or remote content containing a specially crafted PNG image could cause Thunderbird to crash or, possibly, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3026) All Thunderbird users should upgrade to this updated package, which corrects this issue. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58041
    published 2012-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58041
    title CentOS 6 : thunderbird (CESA-2012:0140)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBPNG-7980.NASL
    description A heap-based buffer overflow in libpng was fixed that could potentially be exploited by attackers to execute arbitrary code or cause an application to crash. (CVE-2011-3026)
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 58167
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58167
    title SuSE 10 Security Update : libpng (ZYPP Patch Number 7980)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBPNG-DEVEL-120221.NASL
    description A heap-based buffer overflow in libpng was fixed that could potentially be exploited by attackers to execute arbitrary code or cause an application to crash. (CVE-2011-3026)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 58165
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58165
    title SuSE 11.1 Security Update : libpng (SAT Patch Number 5857)
  • NASL family Windows
    NASL id MOZILLA_THUNDERBIRD_1002.NASL
    description The installed version of Thunderbird 10.x is earlier than 10.0.2 and is, therefore, potentially affected by an integer overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 58007
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58007
    title Mozilla Thunderbird 10.x < 10.0.2 'png_decompress_chunk' Integer Overflow
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2012-49.NASL
    description A heap-based buffer overflow flaw was found in libpng. An attacker could create a specially crafted PNG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3026)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 69656
    published 2013-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69656
    title Amazon Linux AMI : libpng (ALAS-2012-49)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_MOZILLAFIREFOX-120220.NASL
    description Mozilla Firefox was updated to 10.0.2 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 58112
    published 2012-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58112
    title SuSE 11.1 Security Update : Mozilla Firefox (SAT Patch Number 5838)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1844.NASL
    description Fixes a libpng flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58098
    published 2012-02-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58098
    title Fedora 16 : thunderbird-10.0.1-2.fc16 (2012-1844)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0140.NASL
    description From Red Hat Security Advisory 2012:0140 : An updated thunderbird package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. A heap-based buffer overflow flaw was found in the way Thunderbird handled PNG (Portable Network Graphics) images. An HTML mail message or remote content containing a specially crafted PNG image could cause Thunderbird to crash or, possibly, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3026) All Thunderbird users should upgrade to this updated package, which corrects this issue. After installing the update, Thunderbird must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-08-13
    plugin id 68462
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68462
    title Oracle Linux 6 : thunderbird (ELSA-2012-0140)
  • NASL family Windows
    NASL id MOZILLA_THUNDERBIRD_3119.NASL
    description The installed version of Thunderbird 3.1.x is earlier than 3.1.19 and is, therefore, potentially affected by an integer overflow vulnerability. An integer overflow error exists in 'libpng', a library used by this application. When decompressing certain PNG image files, this error can allow a heap-based buffer overflow which can crash the application or potentially allow code execution.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 58008
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58008
    title Mozilla Thunderbird 3.1.x < 3.1.19 'png_decompress_chunk' Integer Overflow
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-4910.NASL
    description - Fixes an issue that may cause hangs when handling IMAP mail (mozbz#733731) - Fixes an issue that may cause filters that move mail to specific folders to be erronously changed (mozbz#735940) Fixes a libpng flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58706
    published 2012-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58706
    title Fedora 17 : thunderbird-11.0.1-1.fc17 (2012-4910)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-2008.NASL
    description This update addresses an integer overflow in the libpng10 PNG library, which could lead to the execution of arbitrary code if a malformed image is processed. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58155
    published 2012-02-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58155
    title Fedora 15 : libpng10-1.0.57-1.fc15 (2012-2008)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-1845.NASL
    description Fix for the libpng security flaw. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58253
    published 2012-03-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58253
    title Fedora 15 : xulrunner-10.0.1-3.fc15 (2012-1845)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_SEAMONKEY-120217.NASL
    description Mozilla SeaMonkey was updated to 2.7.2 to fix a security issue with the embedded libpng, where a integer overflow could allow remote attackers to crash the browser or potentially execute code (CVE-2011-3026),
    last seen 2019-02-21
    modified 2014-08-21
    plugin id 76028
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76028
    title openSUSE Security Update : seamonkey (seamonkey-5834)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2012-022.NASL
    description Security issues were identified and fixed in mozilla firefox and thunderbird : An integer overflow in the libpng library can lead to a heap-buffer overflow when decompressing certain PNG images. This leads to a crash, which may be potentially exploitable (CVE-2011-3026). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions whish is not affecte dby this security flaw. Additionally the rootcerts packages (root CA cerificates bundle) has been upgraded to the latest version as of 2012/02/18 and the NSS library has been rebuilt accordingly to pickup the changes. Update : This is a symbolic advisory correction because there was a clash with MDVSA-2012:022 that addressed libpng.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 58082
    published 2012-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58082
    title Mandriva Linux Security Advisory : mozilla (MDVSA-2012:022-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0141.NASL
    description Updated SeaMonkey packages that fix one security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. SeaMonkey is an open source web browser, e-mail and newsgroup client, IRC chat client, and HTML editor. A heap-based buffer overflow flaw was found in the way SeaMonkey handled PNG (Portable Network Graphics) images. A web page containing a malicious PNG image could cause SeaMonkey to crash or, possibly, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-3026) All SeaMonkey users should upgrade to these updated packages, which correct this issue. After installing the update, SeaMonkey must be restarted for the changes to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57983
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57983
    title CentOS 4 : seamonkey (CESA-2012:0141)
oval via4
accepted 2014-04-07T04:01:54.963-04:00
class vulnerability
contributors
  • name Scott Quint
    organization DTCC
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
  • comment Google Chrome is installed
    oval oval:org.mitre.oval:def:11914
description Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
family windows
id oval:org.mitre.oval:def:15032
status accepted
submitted 2012-02-22T08:20:58.000-05:00
title Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
version 50
redhat via4
advisories
  • bugzilla
    id 790737
    title CVE-2011-3026 libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
    oval
    AND
    • comment thunderbird is earlier than 0:3.1.18-2.el6_2
      oval oval:com.redhat.rhsa:tst:20120140005
    • comment thunderbird is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20100896006
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    rhsa
    id RHSA-2012:0140
    released 2012-02-16
    severity Critical
    title RHSA-2012:0140: thunderbird security update (Critical)
  • bugzilla
    id 790737
    title CVE-2011-3026 libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
    oval
    AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhsa:tst:20060016001
    • OR
      • AND
        • comment seamonkey is earlier than 0:1.0.9-79.el4
          oval oval:com.redhat.rhsa:tst:20120141002
        • comment seamonkey is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060734003
      • AND
        • comment seamonkey-chat is earlier than 0:1.0.9-79.el4
          oval oval:com.redhat.rhsa:tst:20120141010
        • comment seamonkey-chat is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060734021
      • AND
        • comment seamonkey-devel is earlier than 0:1.0.9-79.el4
          oval oval:com.redhat.rhsa:tst:20120141004
        • comment seamonkey-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060734005
      • AND
        • comment seamonkey-dom-inspector is earlier than 0:1.0.9-79.el4
          oval oval:com.redhat.rhsa:tst:20120141012
        • comment seamonkey-dom-inspector is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060734011
      • AND
        • comment seamonkey-js-debugger is earlier than 0:1.0.9-79.el4
          oval oval:com.redhat.rhsa:tst:20120141006
        • comment seamonkey-js-debugger is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060734013
      • AND
        • comment seamonkey-mail is earlier than 0:1.0.9-79.el4
          oval oval:com.redhat.rhsa:tst:20120141008
        • comment seamonkey-mail is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060734019
    rhsa
    id RHSA-2012:0141
    released 2012-02-16
    severity Critical
    title RHSA-2012:0141: seamonkey security update (Critical)
  • bugzilla
    id 790737
    title CVE-2011-3026 libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
    oval
    AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhsa:tst:20060016001
    • comment firefox is earlier than 0:3.6.26-3.el4
      oval oval:com.redhat.rhsa:tst:20120142002
    • comment firefox is signed with Red Hat master key
      oval oval:com.redhat.rhsa:tst:20060733003
    rhsa
    id RHSA-2012:0142
    released 2012-02-16
    severity Critical
    title RHSA-2012:0142: firefox security update (Critical)
  • bugzilla
    id 790737
    title CVE-2011-3026 libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhsa:tst:20070055001
      • OR
        • AND
          • comment xulrunner is earlier than 0:1.9.2.26-2.el5_7
            oval oval:com.redhat.rhsa:tst:20120143002
          • comment xulrunner is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080569003
        • AND
          • comment xulrunner-devel is earlier than 0:1.9.2.26-2.el5_7
            oval oval:com.redhat.rhsa:tst:20120143004
          • comment xulrunner-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080569005
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhsa:tst:20100842001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhsa:tst:20100842002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20100842003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20100842004
      • OR
        • AND
          • comment xulrunner is earlier than 0:1.9.2.26-2.el6_2
            oval oval:com.redhat.rhsa:tst:20120143010
          • comment xulrunner is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100861006
        • AND
          • comment xulrunner-devel is earlier than 0:1.9.2.26-2.el6_2
            oval oval:com.redhat.rhsa:tst:20120143012
          • comment xulrunner-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100861008
    rhsa
    id RHSA-2012:0143
    released 2012-02-16
    severity Critical
    title RHSA-2012:0143: xulrunner security update (Critical)
  • bugzilla
    id 790737
    title CVE-2011-3026 libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhsa:tst:20060016001
      • OR
        • AND
          • comment libpng is earlier than 2:1.2.7-9.el4
            oval oval:com.redhat.rhsa:tst:20120317002
          • comment libpng is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070356003
        • AND
          • comment libpng-devel is earlier than 2:1.2.7-9.el4
            oval oval:com.redhat.rhsa:tst:20120317004
          • comment libpng-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070356005
        • AND
          • comment libpng10 is earlier than 0:1.0.16-10.el4
            oval oval:com.redhat.rhsa:tst:20120317006
          • comment libpng10 is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070356007
        • AND
          • comment libpng10-devel is earlier than 0:1.0.16-10.el4
            oval oval:com.redhat.rhsa:tst:20120317008
          • comment libpng10-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20070356009
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhsa:tst:20070055001
      • OR
        • AND
          • comment libpng is earlier than 2:1.2.10-15.el5_7
            oval oval:com.redhat.rhsa:tst:20120317011
          • comment libpng is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070356017
        • AND
          • comment libpng-devel is earlier than 2:1.2.10-15.el5_7
            oval oval:com.redhat.rhsa:tst:20120317013
          • comment libpng-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070356019
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhsa:tst:20100842001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhsa:tst:20100842002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20100842003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20100842004
      • OR
        • AND
          • comment libpng is earlier than 2:1.2.46-2.el6_2
            oval oval:com.redhat.rhsa:tst:20120317019
          • comment libpng is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111105006
        • AND
          • comment libpng-devel is earlier than 2:1.2.46-2.el6_2
            oval oval:com.redhat.rhsa:tst:20120317021
          • comment libpng-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111105010
        • AND
          • comment libpng-static is earlier than 2:1.2.46-2.el6_2
            oval oval:com.redhat.rhsa:tst:20120317023
          • comment libpng-static is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111105008
    rhsa
    id RHSA-2012:0317
    released 2012-02-20
    severity Important
    title RHSA-2012:0317: libpng security update (Important)
rpms
  • thunderbird-0:3.1.18-2.el6_2
  • seamonkey-0:1.0.9-79.el4
  • seamonkey-chat-0:1.0.9-79.el4
  • seamonkey-devel-0:1.0.9-79.el4
  • seamonkey-dom-inspector-0:1.0.9-79.el4
  • seamonkey-js-debugger-0:1.0.9-79.el4
  • seamonkey-mail-0:1.0.9-79.el4
  • firefox-0:3.6.26-3.el4
  • xulrunner-0:1.9.2.26-2.el5_7
  • xulrunner-devel-0:1.9.2.26-2.el5_7
  • xulrunner-0:1.9.2.26-2.el6_2
  • xulrunner-devel-0:1.9.2.26-2.el6_2
  • libpng-2:1.2.7-9.el4
  • libpng-devel-2:1.2.7-9.el4
  • libpng10-0:1.0.16-10.el4
  • libpng10-devel-0:1.0.16-10.el4
  • libpng-2:1.2.10-15.el5_7
  • libpng-devel-2:1.2.10-15.el5_7
  • libpng-2:1.2.46-2.el6_2
  • libpng-devel-2:1.2.46-2.el6_2
  • libpng-static-2:1.2.46-2.el6_2
refmap via4
apple
  • APPLE-SA-2012-09-19-1
  • APPLE-SA-2012-09-19-2
confirm
gentoo GLSA-201206-15
secunia
  • 48016
  • 48110
  • 49660
suse
  • SUSE-SU-2012:0303
  • openSUSE-SU-2012:0297
Last major update 15-11-2013 - 00:32
Published 16-02-2012 - 15:55
Last modified 09-01-2018 - 21:29
Back to Top