![]() (Chromium security severity: High) Published: 6:15:10 PM -0400 Use after free in PDF in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. Out of bounds memory access in Mojo in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Type Confusion in V8 in Google Chrome prior to 1.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Published: 6:15:10 PM -0400 Inappropriate implementation in Picture In Picture in Google Chrome prior to 1.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. Insufficient data validation in Installer in Google Chrome on Windows prior to 1.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. Inappropriate implementation in Downloads in Google Chrome prior to 1.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. ![]() ![]() (Chromium security severity: Low) Published: 6:15:10 PM -0400 Inappropriate implementation in Extensions API in Google Chrome prior to 1.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: High) Published: J6:15:12 PM -0400 Type confusion in V8 in Google Chrome prior to 1.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |