Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Web Authentication can be exploited to cause denial of service.
- Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in AI can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Web Authentication can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in PictureInPicture can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Permissions can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Navigations can be exploited to cause denial of service.
- Insufficient data validation vulnerability in DevTools can be exploited to bypass security restrictions.
- Use after free vulnerability in UI can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in Payments can be exploited to cause denial of service.
- Use after free vulnerability in Parcel Tracking can be exploited to cause denial of service or execute arbitrary code.
- Insufficient data validation vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2024-9956 warning
- CVE-2024-9959 warning
- CVE-2024-9954 warning
- CVE-2024-9955 warning
- CVE-2024-9958 warning
- CVE-2024-9962 warning
- CVE-2024-9966 warning
- CVE-2024-9965 warning
- CVE-2024-9957 warning
- CVE-2024-9964 warning
- CVE-2024-9961 warning
- CVE-2024-9963 warning
- CVE-2024-9960 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!