{"uuid": "6294018a-672c-4aef-ba89-893b39a052ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-5786", "type": "exploited", "source": "https://t.me/secinfosex/33", "content": "\u26a0\ufe0f\u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435 Google Chrome \u0434\u043e 80.0.3987.122\n\nCVE-2020-6418: type confusion vulnerability in V8, Google Chrome\u2019s open-source JavaScript and WebAssembly engine. It was discovered and reported by Cl\u00e9ment Lecigne, security engineer of Google\u2019s Threat Analysis Group (TAG). Last year, Lecigne was credited with finding and reporting CVE-2019-5786, a use-after-free vulnerability in Google Chrome that was also exploited in the wild.\n\nhttps://www.tenable.com/blog/cve-2020-6418-google-chrome-type-confusion-vulnerability-exploited-in-the-wild\n\nhttps://bugs.chromium.org/p/chromium/issues/detail?id=1053604\n\n#chrome #exploit #in_the_wild", "creation_timestamp": "2020-02-26T02:58:18.000000Z"}