Page 306 of 2648 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Una doble liberación en DOMStorage en Google Chrome versiones anteriores a 73.0.3683.75, permitía a un atacante remoto explotar potencialmente la corrupción de la pila por medio de una página HTML diseñada There's a race condition in the destruction of the BindingState for bindings to the StoragePartitionService in Chrome. It looks like the root cause of the issue is that since we can get two concurrent calls to callbacks returned from mojo::BindingSet::GetBadMessageCallback() from the same BindingSet, which results in a data race destroying the same BindingState. • https://www.exploit-db.com/exploits/46565 https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/916523 https://access.redhat.com/security/cve/CVE-2019-5797 https://bugzilla.redhat.com/show_bug.cgi?id=1688199 • CWE-415: Double Free •

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 1

An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Un desbordamiento de enteros que provoca un uso de memoria previamente liberada (use-after-free) en WebMIDI en Google Chrome en Windows antes de la versión 73.0.3683.75, permitió que un atacante remoto que había comprometido el proceso del renderizador ejecutara código arbitrario por medio de una página HTML creada. Chrome suffers from a use-after-free vulnerability in MidiManagerWin. • https://www.exploit-db.com/exploits/46570 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/921581 https://access.redhat.com/security/cve/CVE-2019-5789 https://bugzilla.redhat.com/show_bug.cgi?id=1688191 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 1

An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Un desbordamiento de enteros que provoca un uso de memoria previamente liberada (use-after-free) en Blink Storage en Google Chrome sobre Linux antes de la versión 73.0.3683.75, permitió que un atacante remoto que había comprometido el proceso del renderizador ejecutara código arbitrario por medio de una página HTML creada. Chrome suffers from a use-after-free vulnerability in FileSystemOperationRunner. • https://www.exploit-db.com/exploits/46571 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/925864 https://access.redhat.com/security/cve/CVE-2019-5788 https://bugzilla.redhat.com/show_bug.cgi?id=1688190 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 7.5EPSS: 33%CPEs: 5EXPL: 1

Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. La carrera de datos en Extensions Guest View en Google Chrome antes de la versión 73.0.3683.75, permitió a un atacante remoto explotar potencialmente una corrupción de pila por medio de una página HTML creada. There appears to be a race condition in the destruction of the ExtensionsGuestViewMessageFilter if the ProcessIdToFilterMap is modified concurrently in Chrome. • https://www.exploit-db.com/exploits/46566 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/918861 https://access.redhat.com/security/cve/CVE-2019-5796 https://bugzilla.redhat.com/show_bug.cgi?id=1688198 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 97%CPEs: 1EXPL: 4

Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. El problema de la vida útil del objeto en Blink en Google Chrome antes del 72.0.3626.121 permitió que un atacante remoto pudiera realizar un acceso a la memoria fuera de límites a través de una página HTML diseñada. Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page. • https://www.exploit-db.com/exploits/46812 https://github.com/exodusintel/CVE-2019-5786 https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html https://crbug.com/936448 https://access.redhat.com/security/cve/CVE-2019-5786 https://bugzilla.redhat.com/show_bug.cgi?id=1685162 https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786 htt • CWE-416: Use After Free •