Description
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
- Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Use after free in Sharing vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
- Insufficient policy enforcement in File System API can be exploited to cause denial of service.
- Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
- Insufficient policy enforcement in COOP can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
- Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tablet Mode can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI Foundations can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2022-1862 high
- CVE-2022-1865 critical
- CVE-2022-1861 critical
- CVE-2022-1867 high
- CVE-2022-1871 warning
- CVE-2022-1857 critical
- CVE-2022-1872 warning
- CVE-2022-1873 high
- CVE-2022-1868 high
- CVE-2022-1858 high
- CVE-2022-1859 critical
- CVE-2022-1863 critical
- CVE-2022-1874 critical
- CVE-2022-1855 critical
- CVE-2022-1876 critical
- CVE-2022-1869 high
- CVE-2022-1870 critical
- CVE-2022-1853 critical
- CVE-2022-1854 critical
- CVE-2022-1856 critical
- CVE-2022-1866 critical
- CVE-2022-1860 critical
- CVE-2022-1875 warning
- CVE-2022-1864 critical
- CVE-2022-4918 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!