Popis
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
- Implementation vulnerability in Navigation can be exploited to cause denial of service.
- Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Download can be exploited to cause denial of service.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
- Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate Implementation vulnerability in Sign-In can be exploited to cause denial of service.
Oficiální doporučení
Vykořisťování
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Související produkty
seznam CVE
- CVE-2024-1672 high
- CVE-2024-1676 high
- CVE-2024-1674 critical
- CVE-2024-1670 critical
- CVE-2024-1675 critical
- CVE-2024-1673 critical
- CVE-2024-1671 high
- CVE-2024-1669 critical
- CVE-2024-3171 critical
- CVE-2024-3168 critical
- CVE-2024-5500 high
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!