Page 74 of 3370 results (0.007 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

Out of bounds read in WebUI Settings in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chrome security severity: Low) • https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html https://crbug.com/1164816 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chrome security severity: Medium) • https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html https://crbug.com/916326 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 4

Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High) • https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera https://github.com/maldev866/ChExp-CVE-2022-0337- https://github.com/zer0ne1/CVE-2022-0337-RePoC https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html https://crbug.com/1247389 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Use after free in Aura in Google Chrome on Windows prior to 108.0.5359.124 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. (Chromium security severity: High) Use after free en Aura en Google Chrome en Windows anterior a 108.0.5359.124 permitía a un atacante remoto convencer al usuario de participar en interacciones específicas de la interfaz de usuario para explotar potencialmente la corrupción del montón a través de interacciones específicas de la interfaz de usuario. (Severidad de seguridad de Chrome: alta) • https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html https://crbug.com/1392661 https://security.gentoo.org/glsa/202305-10 https://security.gentoo.org/glsa/202311-11 • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Use after free in Blink Media in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Use after free en Blink Media en Google Chrome anterior a 108.0.5359.124 permitía a un atacante remoto explotar potencialmente la corrupción del montón a través de una página HTML manipulada. (Severidad de seguridad de Chrome: alta) • https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html https://crbug.com/1383991 https://security.gentoo.org/glsa/202305-10 https://security.gentoo.org/glsa/202311-11 • CWE-416: Use After Free •