{"id":"CVE-2019-13722","details":"Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","modified":"2026-05-04T08:23:40.933749Z","published":"2020-01-14T19:15:13Z","withdrawn":"2026-05-04T08:23:40.933749Z","related":["SUSE-SU-2019:14260-1","SUSE-SU-2019:3337-1","SUSE-SU-2019:3339-1","SUSE-SU-2019:3347-1","openSUSE-SU-2020:0002-1","openSUSE-SU-2020:0003-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"https://crbug.com/1025089"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/"},{"type":"ARTICLE","url":"https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"79.0.3945.79"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-13722.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}