Описание
Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 87.0.4280.66-0ubuntu0.18.04.1 |
| devel | not-affected | code not present |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | DNE | focal was not-affected [code not present] |
| focal | not-affected | code not present |
| groovy | not-affected | code not present |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | |
| upstream | released | 87.0.4280.66 |
Показывать по
Ссылки на источники
EPSS
6.8 Medium
CVSS2
9.6 Critical
CVSS3
Связанные уязвимости
Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed ...
Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Уязвимость реализации PPAPI веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
EPSS
6.8 Medium
CVSS2
9.6 Critical
CVSS3