Kaspersky ID:
KLA20150
検出日:
01/10/2023
更新日:
03/28/2025

説明

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Heap buffer overflow vulnerability in Network Service can be exploited to cause denial of service.
  2. Implementation vulnerability in Permission prompts can be exploited to cause denial of service.
  3. Implementation vulnerability in Fullscreen API can be exploited to cause denial of service.
  4. Implementation vulnerability in File System API can be exploited to cause denial of service.
  5. Implementation vulnerability in iframe Sandbox can be exploited to cause denial of service.
  6. Use after free vulnerability in Overview Mode can be exploited to cause denial of service or execute arbitrary code.
  7. Heap buffer overflow vulnerability in libphonenumber can be exploited to cause denial of service.
  8. Use after free vulnerability in Cart can be exploited to cause denial of service or execute arbitrary code.
  9. Heap buffer overflow vulnerability in Platform Apps can be exploited to cause denial of service.
  10. Policy enforcement vulnerability in CORS can be exploited to cause denial of service.
  11. Validation of untrusted input vulnerability in Downloads can be exploited to cause denial of service.

オリジナルアドバイザリー

関連製品

CVEリスト

  • CVE-2023-0128
    critical
  • CVE-2023-0129
    critical
  • CVE-2023-0132
    high
  • CVE-2023-0136
    critical
  • CVE-2023-0133
    high
  • CVE-2023-0140
    high
  • CVE-2023-0131
    high
  • CVE-2023-0138
    critical
  • CVE-2023-0135
    critical
  • CVE-2023-0134
    critical
  • CVE-2023-0130
    high
  • CVE-2023-0137
    critical
  • CVE-2023-0141
    warning
  • CVE-2023-0139
    high

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.