Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in WebApp Installs can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Them can be exploited to cause denial of service.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
- Implementation vulnerability in Picture In Picture can be exploited to cause denial of service.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in Mojo can be exploited to cause denial of service.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Notifications can be exploited to cause denial of service.
- Implementation vulnerability in Web API Permission can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Skia can be exploited to cause denial of service.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2023-3733 warning
- CVE-2023-3740 warning
- CVE-2023-3738 warning
- CVE-2023-3736 warning
- CVE-2023-3734 warning
- CVE-2023-3728 warning
- CVE-2023-3732 warning
- CVE-2023-3730 warning
- CVE-2023-3727 warning
- CVE-2023-3737 warning
- CVE-2023-3735 warning
- CVE-2023-4860 unknown
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!