![]() ![]() Use after free in WebAudio in Google Chrome prior to 1.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Garbage Collection in Google Chrome prior to 1.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Navigation in Google Chrome prior to 1.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Integer overflow in Skia in Google Chrome prior to 1.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. Use after free in WebAudio in Google Chrome prior to 1.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Mojo in Google Chrome prior to 1.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Type Confusion in Spellcheck in Google Chrome prior to 1.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Use after free in libavif in Google Chrome prior to 1.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. ![]() Use after free in Media Stream in Google Chrome prior to 1.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Side Panel Search in Google Chrome prior to 1.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. Use after free in Media Capture in Google Chrome prior to 1.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. Inappropriate implementation in Autofill in Google Chrome prior to 1.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. Inappropriate implementation in Web Browser UI in Google Chrome prior to 1.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |