{"id":"CVE-2017-15395","details":"A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference.","modified":"2026-03-15T14:26:31.761884Z","published":"2018-02-07T23:29:00.780Z","related":["MGASA-2017-0423","openSUSE-SU-2017:3245-1","openSUSE-SU-2024:10681-1","openSUSE-SU-2024:12948-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/101482"},{"type":"WEB","url":"https://crbug.com/759457"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-24"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4020"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2997"},{"type":"ARTICLE","url":"https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15395.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"62.0.3202.62"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}