Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Adobe Flash can be exploited to obtain sensitive information.
- A use after free vulnerability in WebCodecs can be exploited to execute arbitrary code or cause denial of service.
- An implementation vulnerability in cookies can be exploited to cause denial of service.
- A side-channel information leakage vulnerability in graphics component can be exploited to obtain sensitive information.
- A policy enforcement vulnerability in developer tools can be exploited to bypass security restrictions.
- An implementation vulnerability in filesystem component can be exploited to cause denial of service.
- A heap buffer overflow vulnerability in WebRTC can be exploited to cause denial of service.
- A use after free vulnerability in WebRTC can be exploited to execute arbitrary code or cause denial of service.
- An implementation vulnerability in WebRTC can be exploited to cause denial of service.
- A security UI vulnerability in tab preview component can be exploited to spoof user interface.
- A security UI vulnerability in WebUSB can be exploited to spoof user interface.
- A race condition vulnerability in ImageBurner can be exploited to cause denial of service.
- A use after free vulnerability in PPAPI can be exploited to execute arbitrary code or cause denial of service.
- A data validation vulnerability in cros-disks can be exploited to cause denial of service or bypass security restrictions.
- A data validation vulnerability in Blink can be exploited to cause denial of service or obtain sensitive information.
- An implementation vulnerability in cryptohome component can be exploited to cause denial of service.
- A data validation vulnerability in WASM can be exploited to cause denial of service or bypass security restrictions.
- A heap buffer overflow vulnerability in UI can be exploited to cause denial of service or spoof user interface.
- An implementation vulnerability in PDFium can be exploited to cause denial of service.
- A use after free vulnerability in payments component can be exploited to execute arbitrary code or cause denial of service.
- A heap buffer overflow vulnerability in clipboard can be exploited to cause denial of service.
- A security UI vulnerability in sharing component can be exploited to spoof user interface.
- A policy enforcement vulnerability in networking component can be exploited to bypass security restrictions.
Original advisories
Related products
CVE list
- CVE-2019-8075 critical
- CVE-2020-16023 critical
- CVE-2020-16036 high
- CVE-2020-16012 warning
- CVE-2020-16027 high
- CVE-2020-16019 critical
- CVE-2020-16028 critical
- CVE-2020-16026 critical
- CVE-2020-16034 warning
- CVE-2020-16031 warning
- CVE-2020-16033 warning
- CVE-2020-16021 critical
- CVE-2020-16014 critical
- CVE-2020-16035 critical
- CVE-2020-16030 high
- CVE-2020-16020 critical
- CVE-2020-16015 critical
- CVE-2020-16024 critical
- CVE-2020-16029 critical
- CVE-2020-16018 critical
- CVE-2020-16025 critical
- CVE-2020-16032 warning
- CVE-2020-16022 critical
- CVE-2020-16045 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!