Kaspersky ID:
KLA64091
Дата обнаружения:
20/02/2024
Обновлено:
10/06/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
  2. Implementation vulnerability in Navigation can be exploited to cause denial of service.
  3. Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
  4. Policy enforcement vulnerability in Download can be exploited to cause denial of service.
  5. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
  7. Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
  8. Use after free vulnerability in DevTools can be exploited to cause denial of service or execute arbitrary code.
  9. Inappropriate Implementation vulnerability in Sign-In can be exploited to cause denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2024-1672
    warning
  • CVE-2024-1676
    warning
  • CVE-2024-1674
    warning
  • CVE-2024-1670
    warning
  • CVE-2024-1675
    warning
  • CVE-2024-1673
    warning
  • CVE-2024-1671
    warning
  • CVE-2024-1669
    warning
  • CVE-2024-3171
    unknown
  • CVE-2024-3168
    unknown
  • CVE-2024-5500
    unknown

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.