cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2010-0647,https://securityvulnerability.io/vulnerability/CVE-2010-0647,,"WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a > sequence.",Apple,"Webkit,Chrome",,,0.07790999859571457,false,,false,false,false,,,false,false,,2010-02-18T17:19:00.000Z,0 CVE-2010-0656,https://securityvulnerability.io/vulnerability/CVE-2010-0656,,"WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document.",Apple,"Webkit,Chrome",,,0.004819999914616346,false,,false,false,false,,,false,false,,2010-02-18T17:19:00.000Z,0 CVE-2010-0659,https://securityvulnerability.io/vulnerability/CVE-2010-0659,,"The image decoder in WebKit before r52833, as used in Google Chrome before 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large size.",Apple,"Webkit,Chrome",,,0.08828999847173691,false,,false,false,false,,,false,false,,2010-02-18T17:19:00.000Z,0 CVE-2010-0661,https://securityvulnerability.io/vulnerability/CVE-2010-0661,,"WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome before 4.0.249.78, allows remote attackers to bypass the Same Origin Policy via vectors involving the window.open method.",Apple,"Webkit,Chrome",,,0.009970000013709068,false,,false,false,false,,,false,false,,2010-02-18T17:19:00.000Z,0 CVE-2009-2816,https://securityvulnerability.io/vulnerability/CVE-2009-2816,,"The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page.",Apple,"iPhone OS,Safari,Chrome",,,0.005770000163465738,false,,false,false,false,,,false,false,,2009-11-13T15:00:00.000Z,0