Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in extensions component can be exploited to cause denial of service and execute arbitrary code.
- Uninitialized use vulnerability in V8 can be exploited to obtain sensitive informtaion and bypass security restrictions.
- Use after free vulnerability in clipboard component can be exploited to cause denial of service and execute arbitrary code.
- Use after free vulnerability in media component can be exploited to cause denial of service and execute arbitrary code.
- Out of bounds read vulnerability in networking component can be exploited to cause denial of service.
- Data validation vulnerability in V8 can be exploited to cause denial of service and bypass security restrictions.
Первичный источник обнаружения
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2020-16039 critical
- CVE-2020-16042 high
- CVE-2020-16037 critical
- CVE-2020-16038 critical
- CVE-2020-16041 critical
- CVE-2020-16040 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!