Descripción
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in PDFium can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Browser UI can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Memory Allocator can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in CORS can be exploited to bypass security restrictions.
- Inappropriate implementation vulnerability in Dawn can be exploited to cause denial of service.
- Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in DevTools can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Tab Strip can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Tab Groups can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Downloads can be exploited to cause denial of service.
- Use after free vulnerability in Audio can be exploited to cause denial of service or execute arbitrary code.
Notas informativas originales
Productos relacionados
Lista CVE
- CVE-2024-5847 unknown
- CVE-2024-5846 unknown
- CVE-2024-5842 unknown
- CVE-2024-5838 unknown
- CVE-2024-5839 unknown
- CVE-2024-5841 unknown
- CVE-2024-5833 unknown
- CVE-2024-5840 unknown
- CVE-2024-5837 unknown
- CVE-2024-5834 unknown
- CVE-2024-5831 unknown
- CVE-2024-5836 unknown
- CVE-2024-5844 unknown
- CVE-2024-5835 unknown
- CVE-2024-5830 unknown
- CVE-2024-5832 unknown
- CVE-2024-5843 unknown
- CVE-2024-5845 unknown
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!