Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, inject malicious code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in developer tools can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in web apps can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in extensions can be exploited to cause denial of service.
- Use after free vulnerability in screen capture can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI can be exploited to cause denial of service or execute arbitrary code.
- Data validation vulnerability in loader can be exploited to bypass security restrictions.
- Use after free vulnerability in file API can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in new tab page can be exploited to bypass security restrictions.
- Integer underflow vulnerability in ANGLE can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Security UI vulnerability in autofill can be exploited to spoof user interface.
- Use after free vulnerability in windows manager can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in BFCache can be exploited to cause denial of service.
- Type confusion vulnerability in loader can be exploited to cause denial of service.
- Use after free vulnerability in autofill can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds write vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2021-4063 unknown
- CVE-2021-4052 unknown
- CVE-2021-4055 unknown
- CVE-2021-4064 unknown
- CVE-2021-4053 unknown
- CVE-2021-4059 unknown
- CVE-2021-4057 unknown
- CVE-2021-4061 unknown
- CVE-2021-4068 unknown
- CVE-2021-4066 unknown
- CVE-2021-4058 unknown
- CVE-2021-4054 unknown
- CVE-2021-4067 unknown
- CVE-2021-4062 unknown
- CVE-2021-4056 unknown
- CVE-2021-4065 unknown
- CVE-2021-4079 unknown
- CVE-2021-4078 unknown
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!