Kaspersky ID:
KLA20104
Detect Date:
11/29/2022
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  2. Use after free vulnerability in Forms can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Live Caption can be exploited to cause denial of service or execute arbitrary code.
  5. Data validation vulnerability in Directory can be exploited to cause denial of service.
  6. Policy enforcement vulnerability in Popup Blocker can be exploited to cause denial of service.
  7. Validation of untrusted input vulnerability in CORS can be exploited to cause denial of service.
  8. Implementation vulnerability in Navigation can be exploited to cause denial of service.
  9. Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
  10. Policy enforcement vulnerability in Safe Browsing can be exploited to cause denial of service.
  11. Use after free vulnerability in Audio can be exploited to cause denial of service or execute arbitrary code.
  12. Use after free vulnerability in Sign-In can be exploited to cause denial of service or execute arbitrary code.
  13. Implementation vulnerability in Fenced Frames can be exploited to cause denial of service.
  14. Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
  15. Validation of untrusted input vulnerability in Downloads can be exploited to cause denial of service.
  16. Policy enforcement vulnerability in File System API can be exploited to cause denial of service.
  17. Out of bounds write vulnerability in Lacros Graphics can be exploited to cause denial of service.
  18. Use after free vulnerability in Camera Capture can be exploited to cause denial of service or execute arbitrary code.
  19. Policy enforcement vulnerability in Autofill can be exploited to cause denial of service.
  20. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  21. Uninitialized use vulnerability in FFmpeg can be exploited to execute arbitrary code.
  22. Implementation vulnerability in Blink can be exploited to cause denial of service.
  23. Implementation vulnerability in DevTools can be exploited to cause denial of service.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2022-4174
    critical
  • CVE-2022-4181
    critical
  • CVE-2022-4180
    critical
  • CVE-2022-4192
    critical
  • CVE-2022-4190
    critical
  • CVE-2022-4183
    warning
  • CVE-2022-4188
    warning
  • CVE-2022-4185
    warning
  • CVE-2022-4177
    critical
  • CVE-2022-4195
    warning
  • CVE-2022-4179
    critical
  • CVE-2022-4191
    critical
  • CVE-2022-4182
    warning
  • CVE-2022-4189
    warning
  • CVE-2022-4186
    warning
  • CVE-2022-4187
    high
  • CVE-2022-4193
    critical
  • CVE-2022-4176
    critical
  • CVE-2022-4175
    critical
  • CVE-2022-4178
    critical
  • CVE-2022-4184
    warning
  • CVE-2022-4194
    critical
  • CVE-2022-4907
    critical
  • CVE-2022-4906
    critical
  • CVE-2022-4955
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.