Description
Multiple serious vulnerabilities have been found in Google Chrome. By exploiting these vulnerabilities malicious users can gain privilleges, bypass security and cause denial of service.
Below is a complete list of vulnerabilities
- Improper URI restrictions can be exploited via a URI filesystem;
- Vectors related to exceptionas can be exploited remotely via a specially designed web site;
- A use-after-free vulnerability can be exploited remotely via a specially designed JavaScript.
Original advisories
Related products
CVE list
- CVE-2015-1211 critical
- CVE-2015-1209 critical
- CVE-2015-1210 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!