mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
32 lines
1.3 KiB
JSON
32 lines
1.3 KiB
JSON
{
|
|
"id": "CVE-2024-0222",
|
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
|
"published": "2024-01-04T02:15:28.933",
|
|
"lastModified": "2024-01-05T02:15:08.177",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El use after free en ANGLE en Google Chrome anterior a 120.0.6099.199 permiti\u00f3 a un atacante remoto que hab\u00eda comprometido el proceso de renderizado explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "https://crbug.com/1501798",
|
|
"source": "chrome-cve-admin@google.com"
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/",
|
|
"source": "chrome-cve-admin@google.com"
|
|
}
|
|
]
|
|
} |