E19-0v621
CVSS:
8.3 (AV:N/AC:M/Au:N/C:C/I:P/A:P)
False Positive:
t
Variants:
4
Year:
2019
Description
This strike replicates a use-after-free exploit for Chromium browser engine. The vulnerability can be triggered via the FileReader JS API by creating two array references to the same file reader result then using another mechanism to free the underlying memory. By successfully exploiting this flaw, an attacker can execute arbitrary code in the context or the Chrome's 'renderer' process.