Page 306 of 2459 results (0.010 seconds)

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 1

An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Un desbordamiento de enteros que provoca un uso de memoria previamente liberada (use-after-free) en WebMIDI en Google Chrome en Windows antes de la versión 73.0.3683.75, permitió que un atacante remoto que había comprometido el proceso del renderizador ejecutara código arbitrario por medio de una página HTML creada. Chrome suffers from a use-after-free vulnerability in MidiManagerWin. • https://www.exploit-db.com/exploits/46570 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/921581 https://access.redhat.com/security/cve/CVE-2019-5789 https://bugzilla.redhat.com/show_bug.cgi?id=1688191 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 1

An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. Un desbordamiento de enteros que provoca un uso de memoria previamente liberada (use-after-free) en Blink Storage en Google Chrome sobre Linux antes de la versión 73.0.3683.75, permitió que un atacante remoto que había comprometido el proceso del renderizador ejecutara código arbitrario por medio de una página HTML creada. Chrome suffers from a use-after-free vulnerability in FileSystemOperationRunner. • https://www.exploit-db.com/exploits/46571 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/925864 https://access.redhat.com/security/cve/CVE-2019-5788 https://bugzilla.redhat.com/show_bug.cgi?id=1688190 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 7.5EPSS: 33%CPEs: 5EXPL: 1

Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. La carrera de datos en Extensions Guest View en Google Chrome antes de la versión 73.0.3683.75, permitió a un atacante remoto explotar potencialmente una corrupción de pila por medio de una página HTML creada. There appears to be a race condition in the destruction of the ExtensionsGuestViewMessageFilter if the ProcessIdToFilterMap is modified concurrently in Chrome. • https://www.exploit-db.com/exploits/46566 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/918861 https://access.redhat.com/security/cve/CVE-2019-5796 https://bugzilla.redhat.com/show_bug.cgi?id=1688198 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 97%CPEs: 1EXPL: 3

Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. El problema de la vida útil del objeto en Blink en Google Chrome antes del 72.0.3626.121 permitió que un atacante remoto pudiera realizar un acceso a la memoria fuera de límites a través de una página HTML diseñada. Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page. • https://www.exploit-db.com/exploits/46812 https://github.com/exodusintel/CVE-2019-5786 https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html https://crbug.com/936448 https://access.redhat.com/security/cve/CVE-2019-5786 https://bugzilla.redhat.com/show_bug.cgi?id=1685162 https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786 htt • CWE-416: Use After Free •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. El manejo incorrecto del código diferido en V8 en Google Chrome antes de 72.0.3626.96 permitió que un atacante remoto pudiera explotar la corrupción del montón a través de una página HTML diseñada • https://github.com/agenericapple/CVE-2019-5784-PoC https://chromereleases.googleblog.com/2019/02/stable-channel-update-for-desktop.html https://crbug.com/915975 https://access.redhat.com/security/cve/CVE-2019-5784 https://bugzilla.redhat.com/show_bug.cgi?id=1676527 • CWE-787: Out-of-bounds Write •