Popis
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in audio component can be exploited to obtain sensitive information.
- Policy enforcement vulnerability in extensions component can be exploited to bypass same origin policy.
- Use after free vulnerability in media component can be exploited to obtain sensitive information.
- Inappropriate implementation vulnerability in V8 component can be exploited to execute arbitrary code.
- Use after free vulnerability in WebGL can be exploited to obtain sensitive information.
- Out of bounds vulnerability can be exploited to cause denial of service.
Oficiální doporučení
Vykořisťování
Public exploits exist for this vulnerability.
Související produkty
seznam CVE
- CVE-2019-20503 high
- CVE-2020-6429 critical
- CVE-2020-6425 high
- CVE-2020-6424 critical
- CVE-2020-6428 critical
- CVE-2020-6427 critical
- CVE-2020-6426 high
- CVE-2020-6422 critical
- CVE-2020-6449 critical
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!