Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Policy enforcement vulnerability in downloads component can be exploited to security bypass restrictions.
- Data validation vulnerability in WebUI can be exploited to potentially cause denial of service.
- Policy enforcement vulnerability in networking component can be exploited to security bypass restrictions.
- Implementation vulnerability in V8 can be exploited to cause denial of service.
- Integer overflow vulnerability in SwiftShader can be exploited to cause denial of service.
- Use after free vulnerability in NFC can be exploited to cause denial of service and bypass security restrictions.
- Use after free vulnerability in WebXR can be exploited to cause denial of service and bypass security restrictions.
- Use after free vulnerability in printing component can be exploited to cause denial of service and bypass security restrictions.
- Uninitialized Use vulnerability in PDFium can be exploited to potentially cause denial of service and security bypass restrictions.
- Data validation vulnerability in dialogs component can be exploited to potentially cause denial of service.
- Use after free vulnerability in password manager can be exploited to cause denial of service and bypass security restrictions.
- Out of bounds read vulnerability in audio component can be exploited to cause denial of service.
- Side-channel information leakage vulnerability in cache can be exploited to obtain sensitive information.
- Policy enforcement vulnerability in Intents can be exploited to security bypass restrictions.
- Use after free vulnerability in autofill can be exploited to cause denial of service and bypass security restrictions.
- Use after free vulnerability in audio component can be exploited to cause denial of service and bypass security restrictions.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in networking component can be exploited to cause denial of service.
- Integer overflow vulnerability in media component can be exploited to cause denial of service.
- Use after free vulnerability in payments can be exploited to cause denial of service and bypass security restrictions.
- Integer overflow vulnerability in Blink can be exploited to cause denial of service.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service and bypass security restrictions.
- Data validation vulnerability in navigation component can be exploited to potentially cause denial of service.
- Policy enforcement vulnerability in extensions can be exploited to security bypass restrictions.
- Use after free vulnerability in Blink can be exploited to cause denial of service and bypass security restrictions.
- Policy enforcement vulnerability in Omnibox can be exploited to security bypass restrictions.
Original advisories
Related products
CVE list
- CVE-2020-15988 high
- CVE-2020-15983 critical
- CVE-2020-15992 critical
- CVE-2020-15979 critical
- CVE-2020-15975 critical
- CVE-2020-15970 critical
- CVE-2020-15976 critical
- CVE-2020-15971 critical
- CVE-2020-15989 high
- CVE-2020-15977 high
- CVE-2020-15991 critical
- CVE-2020-15981 high
- CVE-2020-15982 high
- CVE-2020-15980 critical
- CVE-2020-15990 critical
- CVE-2020-15972 critical
- CVE-2020-15985 high
- CVE-2020-6557 high
- CVE-2020-15986 high
- CVE-2020-15967 critical
- CVE-2020-15974 critical
- CVE-2020-15969 critical
- CVE-2020-15987 critical
- CVE-2020-15978 critical
- CVE-2020-15973 high
- CVE-2020-15968 critical
- CVE-2020-15984 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!