Google Chrome 134.0.6998.117

CPE Details

Google Chrome 134.0.6998.117
134.0.6998.117
2025-04-07
10h49 +00:00
2025-04-07
10h49 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:google:chrome:134.0.6998.117:*:*:*:*:*:*:*

Informations

Vendor

google

Product

chrome

Version

134.0.6998.117

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-3070 2025-04-02 00h42 +00:00 Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
6.5
Moyen
CVE-2025-3069 2025-04-02 00h42 +00:00 Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
8.8
Haute
CVE-2025-3068 2025-04-02 00h42 +00:00 Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
8.8
Haute
CVE-2025-3066 2025-04-02 00h42 +00:00 Use after free in Site Isolation in Google Chrome prior to 135.0.7049.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
8.8
Haute
CVE-2025-2783 2025-03-26 16h07 +00:00 Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
8.3
Haute
CVE-2013-6662 2017-04-13 15h00 +00:00 Google Chrome caches TLS sessions before certificate validation occurs.
6.5
Moyen
CVE-2012-4929 2012-09-15 16h00 +00:00 The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
2.6
CVE-2012-4930 2012-09-15 16h00 +00:00 The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
2.6
CVE-2012-2647 2012-07-31 10h00 +00:00 Yahoo! Toolbar 1.0.0.5 and earlier for Chrome and Safari allows remote attackers to modify the configured search URL, and intercept search terms, via a crafted web page.
5.8