CVE-2024-10827

Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

History

02 Jan 2025, 18:07

Type Values Removed Values Added
First Time Google
Google chrome
References () https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html - () https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html - Release Notes
References () https://issues.chromium.org/issues/375065084 - () https://issues.chromium.org/issues/375065084 - Permissions Required
Summary
  • (es) Use after free en Serial en Google Chrome anterior a la versión 130.0.6723.116 permitía a un atacante remoto explotar potencialmente la corrupción del montón a través de una página HTML manipulada. (Gravedad de seguridad de Chromium: Alta)
CPE cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

06 Nov 2024, 17:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

06 Nov 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-06 17:15

Updated : 2025-01-02 18:07


NVD link : CVE-2024-10827

Mitre link : CVE-2024-10827

CVE.ORG link : CVE-2024-10827


JSON object : View

Products Affected

google

  • chrome
CWE
CWE-416

Use After Free