Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Vulnerability related to Content Security Policy can be exploited via a crafted HTML page to bypass security restrictions;
- Buffer overflow vulnerability can be exploited to execute arbitrary code;
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2018-6148 warning
- CVE-2018-5002 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!