Kaspersky ID:
KLA64091
Detect Date:
02/20/2024
Updated:
03/26/2025

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
  2. Implementation vulnerability in Navigation can be exploited to cause denial of service.
  3. Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
  4. Policy enforcement vulnerability in Download can be exploited to cause denial of service.
  5. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
  7. Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
  8. Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  9. Inappropriate Implementation vulnerability in Sign-In can be exploited to cause denial of service.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2024-1672
    high
  • CVE-2024-1676
    high
  • CVE-2024-1674
    critical
  • CVE-2024-1670
    critical
  • CVE-2024-1675
    critical
  • CVE-2024-1673
    critical
  • CVE-2024-1671
    high
  • CVE-2024-1669
    critical
  • CVE-2024-3171
    critical
  • CVE-2024-3168
    critical
  • CVE-2024-5500
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.