Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Input can be exploited to cause denial of service.
- Policy enforcement vulnerability in Autofill can be exploited to cause denial of service.
- Implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
- Implementation vulnerability in Intents can be exploited to cause denial of service.
- Implementation vulnerability in Prompts can be exploited to cause denial of service.
- Policy enforcement vulnerability in Downloads can be exploited to cause denial of service.
- Implementation vulnerability in Picture can be exploited to cause denial of service.
- Implementation vulnerability in Interstitials can be exploited to cause denial of service.
- Implementation vulnerability in Custom Mobile Tabs can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
- Insufficient data validation vulnerability in Permission Prompts can be exploited to bypass security restrictions or execute arbitrary code.
- Out of bounds write vulnerability in SwiftShader can be exploited to cause denial of service.
Original advisories
Related products
CVE list
- CVE-2023-4902 warning
- CVE-2023-4906 warning
- CVE-2023-4900 warning
- CVE-2023-4907 warning
- CVE-2023-4905 warning
- CVE-2023-4904 warning
- CVE-2023-4901 warning
- CVE-2023-4908 warning
- CVE-2023-4909 warning
- CVE-2023-4903 warning
- CVE-2023-7010 unknown
- CVE-2023-7012 unknown
- CVE-2024-3176 unknown
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!