Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Integer underflow vulnerability in WebUI can be exploited to cause execute arbitrary code and denial of service.
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- Use after free vulnerability in WebAudio can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
- Policy enforcement vulnerability in iOS Security UI can be exploited to cause denial of service.
- Use after free vulnerability in Passwords can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Use after free vulnerability in Reading Mode can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Accessibility can be exploited to cause denial of service.
- Security UI vulnerability in Payments can be exploited to spoof user interface.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Insufficient data validation vulnerability in DevTools can be exploited to bypass security restrictions or execute execute arbitrary code.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2024-0808 warning
- CVE-2024-0805 warning
- CVE-2024-0807 warning
- CVE-2024-0810 warning
- CVE-2024-0804 warning
- CVE-2024-0806 warning
- CVE-2024-0811 warning
- CVE-2024-0813 warning
- CVE-2024-0812 warning
- CVE-2024-0814 warning
- CVE-2024-0809 warning
- CVE-2024-3172 unknown
- CVE-2024-3170 unknown
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!