Beschreibung
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in HTML can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Safe can be exploited to bypass security restrictions.
- Use after free vulnerability in Downloads can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in ANGLE can be exploited to cause denial of service.
- Use after free vulnerability in Loader can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tabs can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in Frames can be exploited remotely to cause denial of service.
- Use after free vulnerability in CSS can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in Canvas can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in FedCM can be exploited to cause denial of service.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Layout can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Fullscreen can be exploited to cause denial of service.
Ursprüngliche Informationshinweise
Betroffene Produkte
CVE Liste
- CVE-2024-7001 unknown
- CVE-2024-7005 unknown
- CVE-2024-6988 unknown
- CVE-2024-6992 unknown
- CVE-2024-6989 unknown
- CVE-2024-6997 unknown
- CVE-2024-6996 unknown
- CVE-2024-7000 unknown
- CVE-2024-6993 unknown
- CVE-2024-6999 unknown
- CVE-2024-7004 unknown
- CVE-2024-6998 unknown
- CVE-2024-6991 unknown
- CVE-2024-7003 unknown
- CVE-2024-6994 unknown
- CVE-2024-6995 unknown
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!