Use after free in Navigation in Google Chrome prior to 1.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Autofill UI in Google Chrome on Android prior to 1.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in DevTools in Google Chrome prior to 1.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Type confusion in V8 in Google Chrome prior to 1.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Guest View in Google Chrome prior to 1.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. Inappropriate implementation in WebApp Installs in Google Chrome prior to 1.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. Out of bounds write in Swiftshader in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]() Use after free in Extensions in Google Chrome prior to 1.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. Use after free in PDF in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. Out of bounds memory access in Mojo in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Type Confusion in V8 in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Inappropriate implementation in Picture In Picture in Google Chrome prior to 1.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. Insufficient data validation in Installer in Google Chrome on Windows prior to 1.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. Inappropriate implementation in Downloads in Google Chrome prior to 1.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. ![]() Inappropriate implementation in Extensions API in Google Chrome prior to 1.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. Type confusion in V8 in Google Chrome prior to 1.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Autofill payments in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in WebRTC in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]() Type confusion in V8 in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]() Use after free in WebXR in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |