Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Implementation vulnerability in Extensions can be exploited to cause denial of service.
- Use after free vulnerability in QUIC can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Prompts can be exploited to cause denial of service.
- Object corruption vulnerability in V8 can be exploited to cause denial of service.
- Data validation vulnerability in Downloads can be exploited to cause denial of service.
- Policy enforcement vulnerability in WebUI can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Network can be exploited to cause denial of service.
- Data validation vulnerability in Browser Switcher can be exploited to cause denial of service.
- Object corruption vulnerability in WebAssembly can be exploited to cause denial of service.
- Policy enforcement vulnerability in Site Isolation can be exploited to cause denial of service.
- Out of bounds read vulnerability in Fonts can be exploited to cause denial of service.
- Use after free vulnerability in Downloads can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2024-3838 warning
- CVE-2024-3844 warning
- CVE-2024-3837 warning
- CVE-2024-3846 warning
- CVE-2024-3832 warning
- CVE-2024-3843 warning
- CVE-2024-3847 warning
- CVE-2024-3914 warning
- CVE-2024-3845 warning
- CVE-2024-3841 warning
- CVE-2024-3833 warning
- CVE-2024-3840 warning
- CVE-2024-3839 warning
- CVE-2024-3834 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!