Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Input can be exploited to cause denial of service.
- Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in File Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebGL can be exploited to cause denial of service.
- Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in UI Shelf can be exploited to cause denial of service.
- Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
- Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
- Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in iframe can be exploited to cause denial of service.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
- Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
- Use after free vulnerability in Codecs can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
- Use after free vulnerability in Base Internals can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2022-1497 high
- CVE-2022-1490 critical
- CVE-2022-1496 critical
- CVE-2022-1477 critical
- CVE-2022-1482 high
- CVE-2022-1487 critical
- CVE-2022-1488 warning
- CVE-2022-1489 critical
- CVE-2022-1478 critical
- CVE-2022-1485 critical
- CVE-2022-1500 high
- CVE-2022-1491 critical
- CVE-2022-1492 high
- CVE-2022-1495 warning
- CVE-2022-1481 critical
- CVE-2022-1483 critical
- CVE-2022-1486 critical
- CVE-2022-1494 high
- CVE-2022-1484 critical
- CVE-2022-1493 critical
- CVE-2022-1501 high
- CVE-2022-1479 critical
- CVE-2022-1498 warning
- CVE-2022-1480 warning
- CVE-2022-1499 high
- CVE-2022-1919 critical
- CVE-2022-4920 critical
- CVE-2022-4919 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!