Vulnerabilities > Google > Chrome > High

DATE CVE VULNERABILITY TITLE RISK
2024-06-11 CVE-2024-5836 Inappropriate Implementation in DevTools in Google Chrome prior to 126.0.6478.54 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
network
low complexity
google fedoraproject
8.8
2024-06-11 CVE-2024-5837 Type Confusion vulnerability in multiple products
Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
network
low complexity
google fedoraproject CWE-843
8.8
2024-06-11 CVE-2024-5838 Type Confusion vulnerability in multiple products
Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
network
low complexity
google fedoraproject CWE-843
8.8
2024-06-11 CVE-2024-5841 Use After Free vulnerability in multiple products
Use after free in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2024-06-11 CVE-2024-5842 Use After Free vulnerability in multiple products
Use after free in Browser UI in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform an out of bounds memory read via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2024-06-11 CVE-2024-5844 Out-of-bounds Write vulnerability in multiple products
Heap buffer overflow in Tab Strip in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
network
low complexity
google fedoraproject CWE-787
8.8
2024-06-11 CVE-2024-5845 Use After Free vulnerability in multiple products
Use after free in Audio in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
network
low complexity
google fedoraproject CWE-416
8.8
2024-06-11 CVE-2024-5846 Use After Free vulnerability in multiple products
Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
network
low complexity
google fedoraproject CWE-416
8.8
2024-06-11 CVE-2024-5847 Use After Free vulnerability in multiple products
Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
network
low complexity
google fedoraproject CWE-416
8.8
2024-05-22 CVE-2024-5157 Use After Free vulnerability in multiple products
Use after free in Scheduling in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8