Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Extensions Platform can be exploited to cause denial of service.
- Use after free vulnerability in Web Search can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Reader Mode can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Full Screen Mode can be exploited to cause denial of service.
- Use after free vulnerability in Thumbnail Tab Strip can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Payments can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Windows Dialog can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in V8 can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
- Use after free vulnerability in Safe Browsing can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Screen Capture can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Implementation vulnerability in Scroll can be exploited to cause denial of service.
- Policy bypass vulnerability in COOP can be exploited to bypass security restrictions.
- Implementation vulnerability in Paint can be exploited to cause denial of service.
Original advisories
Related products
CVE list
- CVE-2022-0466 critical
- CVE-2022-0456 critical
- CVE-2022-0453 critical
- CVE-2022-0455 high
- CVE-2022-0458 critical
- CVE-2022-0464 critical
- CVE-2022-0469 critical
- CVE-2022-0468 critical
- CVE-2022-0463 critical
- CVE-2022-0460 critical
- CVE-2022-0470 critical
- CVE-2022-0454 critical
- CVE-2022-0467 critical
- CVE-2022-0452 critical
- CVE-2022-0459 critical
- CVE-2022-0465 critical
- CVE-2022-0457 critical
- CVE-2022-0462 high
- CVE-2022-0461 high
- CVE-2022-4025 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!