Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- Use-after-free vulnerability in media component can be exploited to execute arbitrary code;
- Heap overflow vulnerability in Mojo component can be exploited to execute arbitrary code;
- Unspecified vulnerability can be exploited via trigger other browser to bypass security restrictions;
- URL bar spoof vulnerability can be exploited via download redirect to spoof user interface;
- Out-of-bounds access vulnerability in V8 component can be exploited to bypass security restrictions;
- Use-after-free vulnerability in V8 component can be exploited to execute arbitrary code;
- Unspecified vulnerability can be exploited via bypass same origin policy to bypass security restrictions;
- Unspecified vulnerability can be exploited via SameSite cookie bypass to bypass security restrictions;
- Unspecified vulnerability in SwiftShader component can be exploited via arbitrary read to bypass security restrictions;
- Unspecified vulnerability can be exploited via URL spoof to spoof user interface;
- Unspecified vulnerability can be exploited via full screen notification overlap to bypass security restrictions;
- Unspecified vulnerability can be exploited via CSP spoof to spoof user interface;
- Unspecified vulnerability can be exploited via full screen notification spoof to spoof user interface;
- Unspecified vulnerability can be exploited via IDN spoof to spoof user interface;
- Unspecified vulnerability can be exploited via CSRF bypass to bypass security restrictions;
- Unspecified vulnerability can be exploited via multiple file download to bypass security restrictions;
- Unspecified vulnerability can be exploited via using storage size estimate by side channel to bypass security restrictions;
- URI bar spoofing vulnerability can be exploited via using external app URIs to spoof user interface;
- Unspecified vulnerability can be exploited via global window leak via console to bypass security restrictions;
- Unspecified vulnerability can be exploited via HTTP authentication spoof to spoof user interface;
- Memory corruption vulnerability in V8 component can be exploited to execute arbitrary code;
- Unspecified vulnerability can be exploited via dialog box failing to show origin to bypass security restrictions;
- Unspecified vulnerability can be exploited via cross-origin information leak using devtools to bypass security restrictions;
- Unspecified vulnerability can be exploited via extensions disable by trailing slash to bypass security restrictions;
- Unspecified vulnerability can be exploited via shown for certificate warning to bypass security restrictions;
- Unspecified vulnerability can be exploited to bypass security restrictions;
- Unspecified vulnerability can be exploited via download dialog spoofing to spoof user interface;
- Unspecified vulnerability can be exploited via IP address spoofing to servers to spoof user interface;
- Unspecified vulnerability can be exploited via downloading to bypass security restrictions;
- Unspecified vulnerability can be exploited via site isolation bypass to bypass security restrictions;
- Unspecified vulnerability can be exploited via exceptions leaked by devtools to bypass security restrictions;
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2019-5870 high
- CVE-2019-5871 high
- CVE-2019-5872 warning
- CVE-2019-5873 warning
- CVE-2019-5874 high
- CVE-2019-5875 warning
- CVE-2019-5876 high
- CVE-2019-5877 high
- CVE-2019-5878 high
- CVE-2019-5879 warning
- CVE-2019-5880 warning
- CVE-2019-5881 high
- CVE-2019-13659 warning
- CVE-2019-13660 warning
- CVE-2019-13661 warning
- CVE-2019-13662 warning
- CVE-2019-13663 warning
- CVE-2019-13664 warning
- CVE-2019-13665 warning
- CVE-2019-13666 warning
- CVE-2019-13667 warning
- CVE-2019-13668 warning
- CVE-2019-13669 warning
- CVE-2019-13670 warning
- CVE-2019-13671 warning
- CVE-2019-13673 warning
- CVE-2019-13674 warning
- CVE-2019-13675 warning
- CVE-2019-13676 warning
- CVE-2019-13677 warning
- CVE-2019-13678 warning
- CVE-2019-13679 warning
- CVE-2019-13680 warning
- CVE-2019-13681 warning
- CVE-2019-13682 high
- CVE-2019-13683 warning
- CVE-2019-13691 warning
- CVE-2019-13692 high
- CVE-2019-13766 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!