Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Heap buffer overflow vulnerability in WebUI can be exploited to cause denial of service.
- Use after free in WebRTC vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in File Manager can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Virtual Keyboard can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Implementation vulnerability in Web Cursor can be exploited to cause denial of service.
- Use after free vulnerability in Tab Strip can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in QR Code Generator can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Shopping Cart can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Full Screen Mode can be exploited to cause denial of service.
- Implementation vulnerability in Background Fetch API can be exploited to cause denial of service.
- Implementation in Extensions can be exploited to cause denial of service.
- Insufficient validation of untrusted input in WebOTP can be exploited to cause denial of service.
- Implementation vulnerability in Web Share API can be exploited to cause denial of service.
- Use after free vulnerability in Portals can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Resource Timing can be exploited to cause denial of service.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Cast UI can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebUI can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2022-1143 critical
- CVE-2022-1133 critical
- CVE-2022-1141 critical
- CVE-2022-1132 high
- CVE-2022-1134 critical
- CVE-2022-1138 high
- CVE-2022-1136 critical
- CVE-2022-1127 critical
- CVE-2022-1135 critical
- CVE-2022-1129 high
- CVE-2022-1139 high
- CVE-2022-1137 high
- CVE-2022-1130 critical
- CVE-2022-1128 high
- CVE-2022-1142 critical
- CVE-2022-1125 critical
- CVE-2022-1146 high
- CVE-2022-1145 critical
- CVE-2022-1131 critical
- CVE-2022-1144 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!