![]() ![]() Inappropriate implementation in Autofill in Google Chrome prior to 1.85 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page ![]() Integer underflow in WebUI in Google Chrome prior to 1.85 allowed a remote attacker to potentially exploit heap corruption via a malicious file Use after free in Web Audio in Google Chrome prior to 1.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Use after free in Passwords in Google Chrome prior to 1.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction Inappropriate implementation in Downloads in Google Chrome prior to 1.85 allowed a remote attacker to perform domain spoofing via a crafted domain name Use after free in Peer Connection in Google Chrome prior to 1.139 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page ![]() Use after free in Canvas in Google Chrome prior to 1.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Use after free in Network in Google Chrome prior to 1.139 allowed a remote attacker to potentially exploit heap corruption via a malicious file ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |