Total vulnerabilities in the database
The implementation of unspecified DOM methods in Google Chrome before 5.0.375.70 allows remote attackers to bypass the Same Origin Policy via unknown vectors.
Software | From | Fixed in |
---|---|---|
google / chrome | - | 5.0.375.70 |