Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in WebApp Installs can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Them can be exploited to cause denial of service.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
- Implementation vulnerability in Picture In Picture can be exploited to cause denial of service.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in Mojo can be exploited to cause denial of service.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Notifications can be exploited to cause denial of service.
- Implementation vulnerability in Web API Permission can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Skia can be exploited to cause denial of service.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2023-3733 warning
- CVE-2023-3740 warning
- CVE-2023-3738 warning
- CVE-2023-3736 warning
- CVE-2023-3734 warning
- CVE-2023-3728 critical
- CVE-2023-3732 critical
- CVE-2023-3730 critical
- CVE-2023-3727 critical
- CVE-2023-3737 warning
- CVE-2023-3735 warning
- CVE-2023-4860 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!