Descripción
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
- Implementation vulnerability in Navigation can be exploited to cause denial of service.
- Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Download can be exploited to cause denial of service.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
- Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate Implementation vulnerability in Sign-In can be exploited to cause denial of service.
Notas informativas originales
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2024-1672 high
- CVE-2024-1676 high
- CVE-2024-1674 critical
- CVE-2024-1670 critical
- CVE-2024-1675 critical
- CVE-2024-1673 critical
- CVE-2024-1671 high
- CVE-2024-1669 critical
- CVE-2024-3171 critical
- CVE-2024-3168 critical
- CVE-2024-5500 high
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!