CVE-2019-13685 – chromium-browser: Use-after-free in UI
https://notcve.org/view.php?id=CVE-2019-13685
Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de la memoria previamente liberada en sharing view en Google Chrome versiones anteriores a 77.0.3865.90, permitió a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada. • https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html https://crbug.com/1000934 https://access.redhat.com/security/cve/CVE-2019-13685 https://bugzilla.redhat.com/show_bug.cgi?id=1762473 • CWE-416: Use After Free •
CVE-2019-13683 – chromium-browser: Exceptions leaked by devtools
https://notcve.org/view.php?id=CVE-2019-13683
Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page. Una aplicación de política insuficiente en developer tools en Google Chrome versiones anteriores a 77.0.3865.75, permitió a un atacante remoto filtrar datos de origen cruzado por medio de una página HTML diseñada. • https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop.html https://crbug.com/987502 https://access.redhat.com/security/cve/CVE-2019-13683 https://bugzilla.redhat.com/show_bug.cgi?id=1762403 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2019-13720 – Google Chrome WebAudio Use-After-Free Vulnerability
https://notcve.org/view.php?id=CVE-2019-13720
Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de la memoria previamente liberada en WebAudio en Google Chrome versiones anteriores a 78.0.3904.87, permitió a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada. Google Chrome version 78.0.3904.70 suffers from a use-after-free vulnerability that allows for remote code execution. Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. • https://www.exploit-db.com/exploits/50917 https://github.com/ChoKyuWon/CVE-2019-13720 http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html https://crbug.com/1019226 https://security.gentoo.org/glsa/202004-04 https://access.redhat.com/security/cve/CVE-2019-13720 https://bugzilla.redh • CWE-416: Use After Free •
CVE-2019-13721 – chromium-browser: use-after-free in PDFium
https://notcve.org/view.php?id=CVE-2019-13721
Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso de la memoria previamente liberada en PDFium en Google Chrome versiones anteriores a 78.0.3904.87, permitió a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada. • http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html https://crbug.com/1013868 https://access.redhat.com/security/cve/CVE-2019-13721 https://bugzilla.redhat.com/show_bug.cgi?id=1768578 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •
CVE-2019-13718 – chromium-browser: IDN spoof
https://notcve.org/view.php?id=CVE-2019-13718
Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. Una comprobación de datos insuficiente en Omnibox en Google Chrome versiones anteriores a 78.0.3904.70, permitió a un atacante remoto realizar una suplantación de dominios mediante homógrafos IDN por medio de un nombre de dominio diseñado. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html https://crbug.com/866162 https://access.redhat.com/security/cve/CVE-2019-13718 https://bugzilla.redhat.com/show_bug.cgi?id=1764774 •