Beschreibung
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via vectors related to sandbox, DOM, Editing, URL bar;
- Use-after-free vulnerability can be exploited remotely via vectors related to WebAudio, SVG, WebRTC and Speech;
- Container-overflow can be exploited remotely via vectors related to SVG;
- Negative-size parameter can be exploited remotely via vectors related to Libvpx;
- Uninitialized value can be exploited remotely via vectors related to PDFium and Blink;
- Insecure download can be exploited remotely via vectors related to spellcheck dictionary;
- XSS vulnerability can be exploited remotely via vectors related to bookmarks.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-1258 critical
- CVE-2015-1259 critical
- CVE-2015-1265 critical
- CVE-2015-1251 critical
- CVE-2015-1262 critical
- CVE-2015-1264 critical
- CVE-2015-1252 critical
- CVE-2015-3910 critical
- CVE-2015-1263 critical
- CVE-2015-1260 critical
- CVE-2015-1261 critical
- CVE-2015-1255 critical
- CVE-2015-1257 critical
- CVE-2015-1256 critical
- CVE-2015-1254 critical
- CVE-2015-1253 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!