Beschreibung
Multiple critical vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions or inject arbitrary code.
Below is a complete list of vulnerabilities
- Name conflict can be exploited remotely via a specially designed JavaScript;
- An use-after-free vulnerability can be exploited remotely via incorrect operating with Web SQL Database, a specially designed GIF image, moving SCIPT element to different documents, vectors related to caching notifiers, vectors related to read-only fields or invalid input, vectors related to frame detachment;
- Lack of parameters check can be exploited remotely via a specially designed VPx video;
- Unknown vulnerability can be exploited remotely via vectors related to PDFium and Skia;
- Improper URL restrictions can be exploited remotely via a specially designed extension;
- Problems with memory initialization can be exploited remotely via a specially designed image;
- Integer overflow can be exploited remotely via vectors related to memory allocation;
- Integer overflow and out-of-bounds write operation can be exploited remotely via vectors related to Skia;
- Improper compile listners can be exploited remotely via vectors related to Blink;
- Lack of realyout operation enforcement and memory initialization can be exploited remotely via specially designed CSS;
- Improper handling of 407 status can be exploited remotely via specially designed response.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-1223 critical
- CVE-2015-1222 critical
- CVE-2015-1218 critical
- CVE-2015-1230 critical
- CVE-2015-1227 critical
- CVE-2015-1226 critical
- CVE-2015-1225 critical
- CVE-2015-1224 critical
- CVE-2015-1221 critical
- CVE-2015-1213 critical
- CVE-2015-1212 critical
- CVE-2015-1228 critical
- CVE-2015-1229 critical
- CVE-2015-1214 critical
- CVE-2015-1220 critical
- CVE-2015-1219 critical
- CVE-2015-1217 critical
- CVE-2015-1215 critical
- CVE-2015-1216 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!