High
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Resource Timing. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Extensions. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in WebUI. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by WebUI. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by WebUI. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in File Manager. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Background Fetch API. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Extensions. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Tab Strip. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Shopping Cart. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion in V8. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in WebRTC. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Virtual Keyboard. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Cast UI. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient validation of untrusted input in WebOTP. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Full Screen Mode. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in QR Code Generator. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Upgrade to the latest version of Chrome, available from the Google Chrome Releases Web site.