
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity use-after-free vulnerability in FileAPI was discovered in Google Chrome versions prior to 72.0.3626.81. The vulnerability, identified as CVE-2019-13768, was reported by Mark Brand of Google Project Zero on January 16, 2019. This security flaw could potentially allow remote attackers to perform sandbox escape attacks through specially crafted HTML pages (Chrome Release, NVD).
The vulnerability is classified as a use-after-free flaw specifically affecting the FileAPI component of Google Chrome. Use-after-free vulnerabilities occur when a program continues to use a pointer after it has been freed, which can lead to arbitrary code execution. The issue was deemed high severity by the Chrome security team (Chrome Release).
The vulnerability could allow remote attackers to potentially escape the Chrome sandbox environment through a specially crafted HTML page. Sandbox escape vulnerabilities are particularly serious as they can potentially lead to broader system access beyond the browser's confined environment (NVD).
Google addressed this vulnerability in Chrome version 72.0.3626.81. Users were advised to update their Chrome browsers to this version or later to receive the security fix. The update was rolled out for Windows, Mac, and Linux platforms (Chrome Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."