These vulnerabilities exist due toa use-after-free error in Safe Browsing and V8 browser engine component of the affected software. A remote attacker could exploit these vulnerabilities by creating a specially crafted web page and persuading an unsuspected user to visit the page, triggering a use-after-free error. Successful exploitation of these vulnerabilities could allow the attacker to execute arbitrary code on the targeted system.
The information provided herein is on "as is" basis, without warranty of any kind.