Vulnerabilities > Google > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-25 | CVE-2019-5858 | Improper Input Validation vulnerability in Google Chrome Incorrect security UI in MacOS services integration in Google Chrome on OS X prior to 76.0.3809.87 allowed a local attacker to execute arbitrary code via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5856 | Improper Input Validation vulnerability in Google Chrome Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5854 | Integer Overflow or Wraparound vulnerability in Google Chrome Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 8.8 |
2019-11-25 | CVE-2019-5853 | Incorrect Calculation vulnerability in Google Chrome Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5851 | Use After Free vulnerability in Google Chrome Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-5849 | Out-of-bounds Read vulnerability in Google Chrome Out of bounds read in Skia in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | 8.1 |
2019-11-25 | CVE-2019-13724 | Out-of-bounds Write vulnerability in Google Chrome Out of bounds memory access in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-13723 | Use After Free vulnerability in multiple products Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-13721 | Use After Free vulnerability in Google Chrome Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2019-11-25 | CVE-2019-13720 | Use After Free vulnerability in multiple products Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |