Kaspersky ID:
KLA12517
Date de la détection:
04/26/2022
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Implementation vulnerability in Input can be exploited to cause denial of service.
  2. Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in File Manager can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
  5. Implementation vulnerability in WebGL can be exploited to cause denial of service.
  6. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
  7. Implementation vulnerability in Extensions API can be exploited to cause denial of service.
  8. Out of bounds memory access vulnerability in UI Shelf can be exploited to cause denial of service.
  9. Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
  10. Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
  11. Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
  12. Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
  13. Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
  14. Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
  15. Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
  16. Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
  17. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  18. Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
  19. Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
  20. Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
  21. Implementation vulnerability in iframe can be exploited to cause denial of service.
  22. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  23. Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
  24. Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
  25. Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
  26. Use after free vulnerability in Codecs can be exploited to cause denial of service or execute arbitrary code.
  27. Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
  28. Use after free vulnerability in Base Internals can be exploited to cause denial of service or execute arbitrary code.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2022-1497
    high
  • CVE-2022-1490
    critical
  • CVE-2022-1496
    critical
  • CVE-2022-1477
    critical
  • CVE-2022-1482
    high
  • CVE-2022-1487
    critical
  • CVE-2022-1488
    warning
  • CVE-2022-1489
    critical
  • CVE-2022-1478
    critical
  • CVE-2022-1485
    critical
  • CVE-2022-1500
    high
  • CVE-2022-1491
    critical
  • CVE-2022-1492
    high
  • CVE-2022-1495
    warning
  • CVE-2022-1481
    critical
  • CVE-2022-1483
    critical
  • CVE-2022-1486
    critical
  • CVE-2022-1494
    high
  • CVE-2022-1484
    critical
  • CVE-2022-1493
    critical
  • CVE-2022-1501
    high
  • CVE-2022-1479
    critical
  • CVE-2022-1498
    warning
  • CVE-2022-1480
    warning
  • CVE-2022-1499
    high
  • CVE-2022-1919
    critical
  • CVE-2022-4920
    critical
  • CVE-2022-4919
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.