Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code.
Below is a complete list of vulnerabilities:
- Use-after-free vulnerability in IndexedDB can be exploited to execute arbitrary code;
- Use-after-free vulnerability in WebRTC can be exploited to execute arbitrary code;
- Use-after-free vulnerability in audio can be exploited to execute arbitrary code;
- Use-after-free vulnerability in V8 can be exploited to execute arbitrary code;
- Cross-origin size leak vulnerability in IndexedDB can be exploited to execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2019-13694 high
- CVE-2019-13695 high
- CVE-2019-13693 high
- CVE-2019-13697 warning
- CVE-2019-13696 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!