Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html | Release Notes |
https://issues.chromium.org/issues/375065084 | Permissions Required |
Configurations
History
02 Jan 2025, 18:07
Type | Values Removed | Values Added |
---|---|---|
First Time |
Google
Google chrome |
|
References | () https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html - Release Notes | |
References | () https://issues.chromium.org/issues/375065084 - Permissions Required | |
Summary |
|
|
CPE | cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* |
06 Nov 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
06 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-06 17:15
Updated : 2025-01-02 18:07
NVD link : CVE-2024-10827
Mitre link : CVE-2024-10827
CVE.ORG link : CVE-2024-10827
JSON object : View
Products Affected
- chrome
CWE
CWE-416
Use After Free