Description
Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
References
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
Release NotesVendor Advisory
Permissions RequiredVendor Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2021-10-08T21:15:07.323
3 years agoLast modified
2023-11-07T03:33:22.660
1 year ago