Popis
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- Object lifecycle issue in V8 can be exploited to bypass security restrictions.
- Out of bounds read vulnerability in Swiftshader can be exploited to cause denial of service.
- Security UI vulnerability in iOS can be exploited to spoof user interface.
- Implementation vulnerability in iOS can be exploited to cause denial of service.
- Use after free vulnerability in Canvas can be exploited to cause denial of service or execute arbitrary code.
Oficiální doporučení
Související produkty
seznam CVE
- CVE-2024-2629 warning
- CVE-2024-2627 critical
- CVE-2024-2628 warning
- CVE-2024-2626 high
- CVE-2024-2631 warning
- CVE-2024-2630 high
- CVE-2024-2625 critical
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!