Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Integer underflow vulnerability in WebUI can be exploited to cause execute arbitrary code and denial of service.
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- Use after free vulnerability in WebAudio can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
- Policy enforcement vulnerability in iOS Security UI can be exploited to cause denial of service.
- Use after free vulnerability in Passwords can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Use after free vulnerability in Reading Mode can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Accessibility can be exploited to cause denial of service.
- Security UI vulnerability in Payments can be exploited to spoof user interface.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Insufficient data validation vulnerability in DevTools can be exploited to bypass security restrictions or execute execute arbitrary code.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2024-0808 critical
- CVE-2024-0805 warning
- CVE-2024-0807 critical
- CVE-2024-0810 warning
- CVE-2024-0804 critical
- CVE-2024-0806 critical
- CVE-2024-0811 warning
- CVE-2024-0813 critical
- CVE-2024-0812 critical
- CVE-2024-0814 high
- CVE-2024-0809 warning
- CVE-2024-3172 critical
- CVE-2024-3170 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!