Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A heap buffer overflow vulnerability in OpenJPEG can be exploited to cause denial of service.
- A heap buffer overflow vulnerability in TabStrip can be exploited to cause denial of service.
- A heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
- A use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- A data validation vulnerability in Reader Mode can be exploited to bypass security restrictions.
- A data validation vulnerability in Chrome for iOS can be exploited to bypass security restrictions.
- An object lifecycle vulnerability in audio component can be exploited to bypass security restrictions.
- A use after free vulnerability in bookmarks can be exploited to cause denial of service or execute arbitrary code.
- A policy enforcement vulnerability in appcache component can be exploited to bypass security restrictions.
- An out of bounds memory access vulnerability in V8 can be exploited to bypass security restrictions.
- A security UI vulnerability in Loader canbe exploited to spoof user interface.
- A security UI vulnerability in TabStrip and Navigation canbe exploited to spoof user interface.
- A policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
- An information leakage vulnerability in Network Internals can be exploited to obtain sensitive information.
- An implementation vulnerability in Referrer can be exploited to cause denial of service.
- An implementation vulnerability in Site isolation can be exploited to cause denial of service.
- An implementation vulnerability in full screen mode can be exploited to cause denial of service.
- A policy enforcement vulnerability in autofill component can be exploited to bypass security restrictions.
- An implementation vulnerability in Compositing can be exploited to cause denial of service.
- A use after free vulnerability in Network Internals can be exploited to cause denial of service or execute arbitrary code.
- A use after free vulnerability in tab search component can be exploited to cause denial of service or execute arbitrary code.
- An information leakage vulnerability in autofill component can be exploited to obtain sensitive information.
- A policy enforcement vulnerability in navigations can be exploited to bypass security restrictions.
- An implementation vulnerability in performance APIs can be exploited to cause denial of service.
- A policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
- A policy enforcement vulnerability in QR can be exploited to bypass security restrictions.
- A data validation vulnerability in URL formatting can be exploited to bypass security restrictions.
- A use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- A policy enforcement vulnerability in payments can be exploited to bypass security restrictions.
- An uninitialized use vulnerability in PDFium can be exploited to obtain sensitive information.
- A out of bounds read in WebUI Settings can be exploited to cause denial of service.
Original advisories
Related products
CVE list
- CVE-2020-27844 unknown
- CVE-2021-21159 unknown
- CVE-2021-21160 unknown
- CVE-2021-21161 unknown
- CVE-2021-21162 unknown
- CVE-2021-21163 unknown
- CVE-2021-21164 unknown
- CVE-2021-21165 unknown
- CVE-2021-21166 unknown
- CVE-2021-21167 unknown
- CVE-2021-21168 unknown
- CVE-2021-21169 unknown
- CVE-2021-21170 unknown
- CVE-2021-21171 unknown
- CVE-2021-21172 unknown
- CVE-2021-21173 unknown
- CVE-2021-21174 unknown
- CVE-2021-21175 unknown
- CVE-2021-21176 unknown
- CVE-2021-21177 unknown
- CVE-2021-21178 unknown
- CVE-2021-21179 unknown
- CVE-2021-21180 unknown
- CVE-2021-21181 unknown
- CVE-2021-21182 unknown
- CVE-2021-21183 unknown
- CVE-2021-21184 unknown
- CVE-2021-21185 unknown
- CVE-2021-21186 unknown
- CVE-2021-21187 unknown
- CVE-2021-21188 unknown
- CVE-2021-21189 unknown
- CVE-2021-21190 unknown
- CVE-2021-21200 unknown
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!