Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in developer tools area can be exploited to bypass security restrictions.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Chrome OS shell can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in full screen can be exploited to cause denial of service.
- Implementation vulnerability in compositing can be exploited to cause denial of service.
- Use after free vulnerability in WebGPU can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2022-1305 critical
- CVE-2022-1313 critical
- CVE-2022-1309 critical
- CVE-2022-1312 critical
- CVE-2022-1314 critical
- CVE-2022-1311 critical
- CVE-2022-1308 critical
- CVE-2022-1310 critical
- CVE-2022-1307 warning
- CVE-2022-1306 warning
- CVE-2022-2399 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!