Vulnerabilities > Google > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-08-21 | CVE-2024-7967 | Out-of-bounds Write vulnerability in Google Chrome Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-08-21 | CVE-2024-7968 | Use After Free vulnerability in Google Chrome Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-08-21 | CVE-2024-7969 | Type Confusion vulnerability in Google Chrome Type Confusion in V8 in Google Chrome prior to 128.0.6613.113 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2024-08-21 | CVE-2024-7971 | Type Confusion vulnerability in Google Chrome Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. | 8.8 |
2024-08-21 | CVE-2024-7972 | Unspecified vulnerability in Google Chrome Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | 8.8 |
2024-08-21 | CVE-2024-7973 | Out-of-bounds Write vulnerability in Google Chrome Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | 8.8 |
2024-08-21 | CVE-2024-7974 | Unspecified vulnerability in Google Chrome Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. | 8.8 |
2024-08-21 | CVE-2024-7977 | Unspecified vulnerability in Google Chrome Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a malicious file. | 7.8 |
2024-08-21 | CVE-2024-7979 | Insufficient Verification of Data Authenticity vulnerability in Google Chrome Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. | 7.8 |
2024-08-21 | CVE-2024-7980 | Insufficient Verification of Data Authenticity vulnerability in Google Chrome Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. | 7.8 |