Beschreibung
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via vectors related to sandbox, DOM, Editing, URL bar;
 - Use-after-free vulnerability can be exploited remotely via vectors related to WebAudio, SVG, WebRTC and Speech;
 - Container-overflow can be exploited remotely via vectors related to SVG;
 - Negative-size parameter can be exploited remotely via vectors related to Libvpx;
 - Uninitialized value can be exploited remotely via vectors related to PDFium and Blink;
 - Insecure download can be exploited remotely via vectors related to spellcheck dictionary;
 - XSS vulnerability can be exploited remotely via vectors related to bookmarks.
 
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-1258 critical
 - CVE-2015-1259 critical
 - CVE-2015-1265 critical
 - CVE-2015-1251 critical
 - CVE-2015-1262 critical
 - CVE-2015-1264 critical
 - CVE-2015-1252 critical
 - CVE-2015-3910 critical
 - CVE-2015-1263 critical
 - CVE-2015-1260 critical
 - CVE-2015-1261 critical
 - CVE-2015-1255 critical
 - CVE-2015-1257 critical
 - CVE-2015-1256 critical
 - CVE-2015-1254 critical
 - CVE-2015-1253 critical
 
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
                                    Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!