..
Click anywhere to stop
Click anywhere to stop
Detect date
?
|
04/17/2018 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface, gain privileges, execute arbitrary code and perform unspecified attacks. Below is a complete list of vulnerabilities:
|
Affected products
|
Google Chrome earlier than 66.0.3359.117 |
Solution
|
Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. |
Original advisories
|
|
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] PE [?] SUI [?] |
Related products
|
Google Chrome |
CVE-IDS
?
|
CVE-2018-60856.8High
CVE-2018-60866.8High CVE-2018-60876.8High CVE-2018-60886.8High CVE-2018-60894.3Warning CVE-2018-60906.8High CVE-2018-60914.3Warning CVE-2018-60926.8High CVE-2018-60934.3Warning CVE-2018-60946.8High CVE-2018-60954.3Warning CVE-2018-60964.3Warning CVE-2018-60974.3Warning CVE-2018-60984.3Warning CVE-2018-60994.3Warning CVE-2018-61004.3Warning CVE-2018-61015.1High CVE-2018-61024.3Warning CVE-2018-61034.3Warning CVE-2018-61044.3Warning CVE-2018-61054.3Warning CVE-2018-61066.8High CVE-2018-61074.3Warning CVE-2018-61084.3Warning CVE-2018-61094.3Warning CVE-2018-61105.8High CVE-2018-61116.8High CVE-2018-61124.3Warning CVE-2018-61134.3Warning CVE-2018-61144.3Warning CVE-2018-61154.3Warning CVE-2018-61164.3Warning CVE-2018-61174.3Warning CVE-2018-60847.2High |
Exploitation
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Find out the statistics of the vulnerabilities spreading in your region |