Kaspersky ID:
KLA12327
Date de la détection:
10/19/2021
Mis à jour:
04/06/2026

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Heap buffer overflow vulnerability in Settings can be exploited to cause denial of service.
  2. Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
  3. Use after free vulnerability in PDF Accessibility can be exploited to cause denial of service or execute arbitrary code.
  4. Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
  5. Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in WebApp Installer can be exploited to cause denial of service.
  7. Race condition vulnerability in V8 can be exploited to cause denial of service.
  8. Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
  9. Implementation vulnerability in Blink can be exploited to cause denial of service.
  10. Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
  11. Implementation vulnerability in WebView can be exploited to cause denial of service.
  12. Implementation vulnerability in iFrame Sandbox can be exploited to cause denial of service.
  13. Use after free vulnerability in Incognito can be exploited to cause denial of service or execute arbitrary code.
  14. Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
  15. Out of bounds read vulnerability in WebAudio can be exploited to cause denial of service or obtain sensitive information.
  16. Use after free vulnerability in Network APIs can be exploited to cause denial of service or execute arbitrary code.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2021-37986
    critical
  • CVE-2021-37984
    critical
  • CVE-2021-37993
    critical
  • CVE-2021-37981
    critical
  • CVE-2021-37985
    critical
  • CVE-2021-37995
    high
  • CVE-2021-37991
    critical
  • CVE-2021-37983
    critical
  • CVE-2021-37989
    high
  • CVE-2021-37988
    critical
  • CVE-2021-37990
    high
  • CVE-2021-37994
    high
  • CVE-2021-37982
    critical
  • CVE-2021-37996
    high
  • CVE-2021-37992
    critical
  • CVE-2021-37987
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.