The host is installed with Google Chrome before 22.0.1229.79 and is prone to multiple unspecified vulnerabilities. The flaw are present in the application, which fails to handle a crafted document. Successful exploitation allows remote attackers to crash the service.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle SSE2 optimization functionality. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle modal dialogs. Successful exploitation allows remote attackers to cause a denial of service (application crash).
The host is installed with Google Chrome before 22.0.1229.79 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to plug-in. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle DOM topology. Successful exploitation allows remote attackers to cause a denial of service (DOM topology corruption).
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related to the plug-in paint buffer. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle plug-ins. Successful exploitation allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle OGG containers. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds write operation. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.
The host is installed with Google Chrome before 22.0.1229.79 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle out-of-bounds read operation. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read).