296,515
Total vulnerabilities in the database
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
Software | From | Fixed in |
---|---|---|
google / chrome | 0.3.154.3 | 0.3.154.3.x |
google / chrome | 0.2.149.30 | 0.2.149.30.x |
google / chrome | 0.4.154.31 | 0.4.154.31.x |
google / chrome | 1.0.154.39 | 1.0.154.39.x |
google / chrome | 0.4.154.33 | 0.4.154.33.x |
google / chrome | 1.0.154.43 | 1.0.154.43.x |
google / chrome | 1.0.154.42 | 1.0.154.42.x |
google / chrome | 0.4.154.18 | 0.4.154.18.x |
google / chrome | 0.2.149.29 | 0.2.149.29.x |
google / chrome | 0.2.152.1 | 0.2.152.1.x |
google / chrome | 0.3.154.0 | 0.3.154.0.x |
google / chrome | 0.2.153.1 | 0.2.153.1.x |
google / chrome | 1.0.154.36 | 1.0.154.36.x |
google / chrome | 1.0.154.46 | 1.0.154.46.x |
google / chrome | 0.4.154.22 | 0.4.154.22.x |
google / chrome | - | 1.0.154.52.x |