High
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds memory access in WebXR. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Chrome OS Shell. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Autofill. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to obtain sensitive information, caused by a data leak in Canvas. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Browser Switcher. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Full screen mode. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Permissions. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Full screen mode. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in HTML parser. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by Cast UI. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in MediaStream. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds memory access in Mojo. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Media. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion in Blink Layout. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in WebShare. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Views. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in ANGLE. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Omnibox. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by ANGLE. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Upgrade to the latest version of Chrome, available from the Google Chrome Releases Web site.