Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Integer underflow vulnerability in WebUI can be exploited to cause execute arbitrary code and denial of service.
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- Use after free vulnerability in WebAudio can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
- Policy enforcement vulnerability in iOS Security UI can be exploited to cause denial of service.
- Use after free vulnerability in Passwords can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Use after free vulnerability in Reading Mode can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Accessibility can be exploited to cause denial of service.
- Security UI vulnerability in Payments can be exploited to spoof user interface.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Insufficient data validation vulnerability in DevTools can be exploited to bypass security restrictions or execute execute arbitrary code.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2024-0808 critical
- CVE-2024-0805 warning
- CVE-2024-0807 critical
- CVE-2024-0810 warning
- CVE-2024-0804 critical
- CVE-2024-0806 critical
- CVE-2024-0811 warning
- CVE-2024-0813 critical
- CVE-2024-0812 critical
- CVE-2024-0814 high
- CVE-2024-0809 warning
- CVE-2024-3172 critical
- CVE-2024-3170 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!