Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition,remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.