Описание
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, conduct cross-scripting attack, cause denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via vectors related to sandbox, DOM, Editing, URL bar;
- Use-after-free vulnerability can be exploited remotely via vectors related to WebAudio, SVG, WebRTC and Speech;
- Container-overflow can be exploited remotely via vectors related to SVG;
- Negative-size parameter can be exploited remotely via vectors related to Libvpx;
- Uninitialized value can be exploited remotely via vectors related to PDFium and Blink;
- Insecure download can be exploited remotely via vectors related to spellcheck dictionary;
- XSS vulnerability can be exploited remotely via vectors related to bookmarks.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2015-1258 critical
- CVE-2015-1259 critical
- CVE-2015-1265 critical
- CVE-2015-1251 high
- CVE-2015-1262 critical
- CVE-2015-1264 warning
- CVE-2015-1252 critical
- CVE-2015-3910 critical
- CVE-2015-1263 warning
- CVE-2015-1260 critical
- CVE-2015-1261 warning
- CVE-2015-1255 high
- CVE-2015-1257 critical
- CVE-2015-1256 critical
- CVE-2015-1254 warning
- CVE-2015-1253 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!