296,720
Total vulnerabilities in the database
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
| Software | From | Fixed in |
|---|---|---|
| google / chrome | - | 86.0.4240.183 |
| microsoft / edge_chromium | - | 86.0.4240.183 |
| microsoft / edge | - | 86.0.622.63 |
| opensuse / leap | 15.1 | 15.1.x |
| opensuse / backports_sle | 15.0-sp1 | 15.0-sp1.x |
| opensuse / leap | 15.2 | 15.2.x |
| opensuse / backports_sle | 15.0-sp2 | 15.0-sp2.x |
| fedoraproject / fedora | 32 | 32.x |
| fedoraproject / fedora | 33 | 33.x |
| debian / debian_linux | 10.0 | 10.0.x |
CefSharp.Common
|
- | 86.0.241 |
CefSharp.Wpf
|
- | 86.0.241 |
CefSharp.WinForms
|
- | 86.0.241 |
CefSharp.Wpf.HwndHost
|
- | 86.0.241 |
| cefsharp / cefsharp | - | 86.0.241 |