Kaspersky ID:
KLA10886
Дата обнаружения:
12/10/2016
Обновлено:
07/06/2024

Описание

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, conduct XSS attack, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An unknown vulnerabilities at Blink and Bookmarks could be exploited remotely to conduct XSS attack;
  2. Heap overflow at Blink can be exploited remotely to cause denial of service or possible execute arbitrary code;
  3. Use-after-free vulnerabilities at PDFium, Internals and Blink could be exploited remotely to cause denial of service or possibly execute arbitrary code;
  4. An unknown vulnerabilities could be exploited remotely to spoof URL and other unknown UI elements;
  5. An unknown vulnerability can be exploited remotely to bypass cross-origin restrictions;
  6. Out-of-bounds-read at DevTools can be exploited remotely to cause denial of service or execute arbitrary code;
  7. An unknown vulnerability can be exploited remotely to bypass security restrictions.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2016-5193
    warning
  • CVE-2016-5192
    high
  • CVE-2016-5191
    high
  • CVE-2016-5190
    high
  • CVE-2016-5189
    high
  • CVE-2016-5187
    high
  • CVE-2016-5186
    high
  • CVE-2016-5185
    critical
  • CVE-2016-5184
    critical
  • CVE-2016-5183
    critical
  • CVE-2016-5182
    critical
  • CVE-2016-5181
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Узнай больше об угрозах и векторах атаки на Энциклопедии Kaspersky
Бесплатно
Читать
Kaspersky Premium
Комплексное решение для защиты вашей цифровой жизни
Премиум
Скачать
Confirm changes?
Your message has been sent successfully.