![]() ![]() ![]() Inappropriate implementation in Autofill in Google Chrome prior to 1.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. Inappropriate implementation in Web Browser UI in Google Chrome prior to 1.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. Type confusion in V8 in Google Chrome prior to 1.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in Blink in Google Chrome prior to 1.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in libavif in Google Chrome prior to 1.109 allowed a remote attacker to potentially exploit heap corruption via a crafted image file. Use after free in WebRTC in Google Chrome prior to 1.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in FedCM in Google Chrome prior to 1.109 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. Use after free in CSS in Google Chrome prior to 1.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Heap buffer overflow in WebRTC in Google Chrome prior to 1.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]() Use after free in ANGLE in Google Chrome prior to 1.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. ![]() Heap buffer overflow in ANGLE in Google Chrome prior to 1.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in WebAudio in Google Chrome prior to 1.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Use after free in WebGPU in Google Chrome prior to 1.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |