Total vulnerabilities in the database
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Software | From | Fixed in |
---|---|---|
google / chrome | - | 86.0.4240.198 |
![]() |
- | 86.0.241 |
![]() |
- | 86.0.241 |
![]() |
- | 86.0.241 |
![]() |
- | 86.0.241 |