Descripción
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- Security UI vulnerability in Navigation can be exploited to spoof user interface.
- Out of bounds memory access vulnerability in DOM Bindings can be exploited to cause denial of service.
- Implementation vulnerability in Extensions can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Browser History can be exploited to cause denial of service.
- Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in FedCM can be exploited to cause denial of service.
- Use after free vulnerability in Frames can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in Accessibility can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Safe can be exploited to cause denial of service.
- Policy enforcement vulnerability in Intents can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Visuals can be exploited to cause denial of service.
- Use after free vulnerability in Networking APIs can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebShare can be exploited to cause denial of service.
- Security UI vulnerability in Picture In Picture can be exploited to spoof user interface.
- Implementation vulnerability in Sandbox can be exploited to cause denial of service.
Notas informativas originales
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2023-1822 high
- CVE-2023-1812 critical
- CVE-2023-1813 high
- CVE-2023-1820 critical
- CVE-2023-1818 critical
- CVE-2023-1823 high
- CVE-2023-1811 critical
- CVE-2023-1819 high
- CVE-2023-1814 high
- CVE-2023-1817 high
- CVE-2023-1810 critical
- CVE-2023-1815 critical
- CVE-2023-1821 high
- CVE-2023-1816 high
- CVE-2023-2313 critical
- CVE-2023-2311 high
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!