Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- Use-after-free vulnerability in media component can be exploited to execute arbitrary code;
- Heap overflow vulnerability in Mojo component can be exploited to execute arbitrary code;
- Unspecified vulnerability can be exploited via trigger other browser to bypass security restrictions;
- URL bar spoof vulnerability can be exploited via download redirect to spoof user interface;
- Out-of-bounds access vulnerability in V8 component can be exploited to bypass security restrictions;
- Use-after-free vulnerability in V8 component can be exploited to execute arbitrary code;
- Unspecified vulnerability can be exploited via bypass same origin policy to bypass security restrictions;
- Unspecified vulnerability can be exploited via SameSite cookie bypass to bypass security restrictions;
- Unspecified vulnerability in SwiftShader component can be exploited via arbitrary read to bypass security restrictions;
- Unspecified vulnerability can be exploited via URL spoof to spoof user interface;
- Unspecified vulnerability can be exploited via full screen notification overlap to bypass security restrictions;
- Unspecified vulnerability can be exploited via CSP spoof to spoof user interface;
- Unspecified vulnerability can be exploited via full screen notification spoof to spoof user interface;
- Unspecified vulnerability can be exploited via IDN spoof to spoof user interface;
- Unspecified vulnerability can be exploited via CSRF bypass to bypass security restrictions;
- Unspecified vulnerability can be exploited via multiple file download to bypass security restrictions;
- Unspecified vulnerability can be exploited via using storage size estimate by side channel to bypass security restrictions;
- URI bar spoofing vulnerability can be exploited via using external app URIs to spoof user interface;
- Unspecified vulnerability can be exploited via global window leak via console to bypass security restrictions;
- Unspecified vulnerability can be exploited via HTTP authentication spoof to spoof user interface;
- Memory corruption vulnerability in V8 component can be exploited to execute arbitrary code;
- Unspecified vulnerability can be exploited via dialog box failing to show origin to bypass security restrictions;
- Unspecified vulnerability can be exploited via cross-origin information leak using devtools to bypass security restrictions;
- Unspecified vulnerability can be exploited via extensions disable by trailing slash to bypass security restrictions;
- Unspecified vulnerability can be exploited via shown for certificate warning to bypass security restrictions;
- Unspecified vulnerability can be exploited to bypass security restrictions;
- Unspecified vulnerability can be exploited via download dialog spoofing to spoof user interface;
- Unspecified vulnerability can be exploited via IP address spoofing to servers to spoof user interface;
- Unspecified vulnerability can be exploited via downloading to bypass security restrictions;
- Unspecified vulnerability can be exploited via site isolation bypass to bypass security restrictions;
- Unspecified vulnerability can be exploited via exceptions leaked by devtools to bypass security restrictions;
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2019-5870 critical
- CVE-2019-5871 critical
- CVE-2019-5872 high
- CVE-2019-5873 warning
- CVE-2019-5874 critical
- CVE-2019-5875 warning
- CVE-2019-5876 critical
- CVE-2019-5877 critical
- CVE-2019-5878 critical
- CVE-2019-5879 high
- CVE-2019-5880 high
- CVE-2019-5881 critical
- CVE-2019-13659 warning
- CVE-2019-13660 high
- CVE-2019-13661 warning
- CVE-2019-13662 high
- CVE-2019-13663 warning
- CVE-2019-13664 high
- CVE-2019-13665 high
- CVE-2019-13666 high
- CVE-2019-13667 warning
- CVE-2019-13668 high
- CVE-2019-13669 warning
- CVE-2019-13670 high
- CVE-2019-13671 warning
- CVE-2019-13673 high
- CVE-2019-13674 warning
- CVE-2019-13675 warning
- CVE-2019-13676 warning
- CVE-2019-13677 high
- CVE-2019-13678 high
- CVE-2019-13679 warning
- CVE-2019-13680 high
- CVE-2019-13681 warning
- CVE-2019-13682 critical
- CVE-2019-13683 high
- CVE-2019-13691 warning
- CVE-2019-13692 critical
- CVE-2019-13766 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!