Beschreibung
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in QUIC Networking component can be exploited to execute arbitrary code;
- Inappropriate implementation vulnerability in V8 component can be exploited to execute arbitrary code;
- Use after free vulnerability in PDFium component can be exploited remotely to execute arbitrary code;
- Type Confusion vulnerability in SVG component can be exploited remotely to execute arbitrary code;
- Use after free vulnerability in Blink component can be exploited remotely to execute arbitrary code;
- Use after free vulnerability in HTML select elements can be exploited remotely to execute arbitrary code;
- Use after free vulnerability in WebRTC component can be exploited remotely to execute arbitrary code;
- Use after free vulnerability in SwiftShader component can be exploited remotely to execute arbitrary code;
- Insufficient validation vulnerability in V8 component can be exploited remotely to execute arbitrary code;
- Insufficient policy enforcement vulnerability in browser can be exploited remotely to execute arbitrary code;
- Stack buffer overflow vulnerability in Skia component can be exploited remotely to bypass security restrictions;
- Insufficient policy enforcement vulnerability in Canvas component can be exploited remotely to execute arbitrary code;
- Incorrect security vulnerability of UI in WebAPKs component can be exploited remotely to execute arbitrary code;
- Insufficient policy enforcement vulnerability in DevTools component can be exploited remotely to execute arbitrary code;
- Insufficient validation of untrusted input vulnerability in Blink component can be exploited remotely to execute arbitrary code;
- Heap buffer overflow vulnerability in WebGL component can be exploited remotely to execute arbitrary code;
- Heap buffer overflow vulnerability in SwiftShader component can be exploited remotely to execute arbitrary code;
- Insufficient data validation vulnerability in IndexedDB component can be exploited remotely to execute arbitrary code;
- Insufficient validation of untrusted input vulnerability in SafeBrowsing component can be exploited remotely to execute arbitrary code;
- Insufficient policy enforcement vulnerability in Omnibox component can be exploited remotely to execute arbitrary code;
- Insufficient policy enforcement vulnerability in Extensions component can be exploited remotely to execute arbitrary code;
- Insufficient policy enforcement vulnerability in ServiceWorker component can be exploited remotely to execute arbitrary code;
- Insufficient validation of untrusted input vulnerability in DevTools component can be exploited remotely to execute arbitrary code;
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2019-5754 critical
- CVE-2019-5782 critical
- CVE-2019-5755 critical
- CVE-2019-5756 critical
- CVE-2019-5757 critical
- CVE-2019-5758 critical
- CVE-2019-5759 critical
- CVE-2019-5760 critical
- CVE-2019-5761 critical
- CVE-2019-5762 critical
- CVE-2019-5763 critical
- CVE-2019-5764 critical
- CVE-2019-5765 critical
- CVE-2019-5785 critical
- CVE-2019-5766 critical
- CVE-2019-5767 critical
- CVE-2019-5768 critical
- CVE-2019-5769 critical
- CVE-2019-5770 critical
- CVE-2019-5771 critical
- CVE-2019-5772 critical
- CVE-2019-5773 critical
- CVE-2019-5774 critical
- CVE-2019-5775 critical
- CVE-2019-5776 critical
- CVE-2019-5777 critical
- CVE-2019-5778 critical
- CVE-2019-5779 critical
- CVE-2019-5780 critical
- CVE-2019-5783 critical
- CVE-2019-5781 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!