Page 20 of 3364 results (0.013 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Insufficient validation of untrusted input in Extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to access local files via a crafted Chrome Extension. (Chromium security severity: Medium) • https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium) • https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html • CWE-416: Use After Free •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low) • https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) • https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) • https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) • https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) • https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html • CWE-416: Use After Free •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Inappropriate implementation in Cast UI in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to spoof browser UI via a crafted HTML page. (Chromium security severity: Low) • https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Insufficient validation of untrusted input in QUIC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform header splitting via malicious network traffic. (Chromium security severity: Low) • https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html • CWE-20: Improper Input Validation •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 1

28 Jul 2023 — Use after free in WebRTC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) • https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html • CWE-416: Use After Free •