![]() ![]() Use after free in WebRTC in Google Chrome prior to 1.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session Insufficient data validation in Extensions in Google Chrome prior to 1.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability Microsoft Edge (Chromium-based) Information Disclosure Vulnerability Out of bounds memory access in FedCM in Google Chrome prior to 1.179 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page ![]() Incorrect security UI in BFCache in Google Chrome prior to 1.179 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page Use after free in Networks in Google Chrome prior to 1.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Type Confusion in V8 in Google Chrome prior to 1.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished Heap buffer overflow in libwebp in Google Chrome prior to 1.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |