Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
- Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Use after free in Sharing vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
- Insufficient policy enforcement in File System API can be exploited to cause denial of service.
- Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
- Insufficient policy enforcement in COOP can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
- Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tablet Mode can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI Foundations can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2022-1862 high
- CVE-2022-1865 critical
- CVE-2022-1861 critical
- CVE-2022-1867 high
- CVE-2022-1871 warning
- CVE-2022-1857 critical
- CVE-2022-1872 warning
- CVE-2022-1873 high
- CVE-2022-1868 high
- CVE-2022-1858 high
- CVE-2022-1859 critical
- CVE-2022-1863 critical
- CVE-2022-1874 critical
- CVE-2022-1855 critical
- CVE-2022-1876 critical
- CVE-2022-1869 high
- CVE-2022-1870 critical
- CVE-2022-1853 critical
- CVE-2022-1854 critical
- CVE-2022-1856 critical
- CVE-2022-1866 critical
- CVE-2022-1860 critical
- CVE-2022-1875 warning
- CVE-2022-1864 critical
- CVE-2022-4918 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!