説明
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
- Implementation vulnerability in Navigation can be exploited to cause denial of service.
- Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Download can be exploited to cause denial of service.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
- Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate Implementation vulnerability in Sign-In can be exploited to cause denial of service.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2024-1672 high
- CVE-2024-1676 high
- CVE-2024-1674 critical
- CVE-2024-1670 critical
- CVE-2024-1675 critical
- CVE-2024-1673 critical
- CVE-2024-1671 high
- CVE-2024-1669 critical
- CVE-2024-3171 critical
- CVE-2024-3168 critical
- CVE-2024-5500 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!