{"id":"CVE-2024-10827","details":"Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","modified":"2026-03-12T02:18:49.084458Z","published":"2024-11-06T17:15:14.030Z","related":["CGA-qc6c-73wq-4jxw","openSUSE-SU-2024:0356-1","openSUSE-SU-2024:0357-1","openSUSE-SU-2024:14469-1","openSUSE-SU-2024:14510-1","openSUSE-SU-2025:15531-1"],"references":[{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html"},{"type":"REPORT","url":"https://issues.chromium.org/issues/375065084"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-10827.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"130.0.6723.116"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}