Popis
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in V8 can be exploited to potentially cause denial of service.
- Heap buffer overflow vulnerability in UI on Windows can be exploited to cause denial of service.
- Data validation vulnerability in installer component can be exploited to potentially cause denial of service.
- Policy enforcement vulnerability in ANGLE can be exploited to bypass security restrictions.
- Stack buffer overflow vulnerability in WebRTC can be exploited to potentially caouse denial of service.
- Use after free vulnerability in UI can be exploited to spoof user interface.
Oficiální doporučení
Vykořisťování
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Související produkty
seznam CVE
- CVE-2020-16009 critical
- CVE-2020-16011 critical
- CVE-2020-16007 critical
- CVE-2020-16005 critical
- CVE-2020-16006 critical
- CVE-2020-16008 critical
- CVE-2020-16004 critical
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!