説明
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Extensions Platform can be exploited to cause denial of service.
- Use after free vulnerability in Web Search can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Reader Mode can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Full Screen Mode can be exploited to cause denial of service.
- Use after free vulnerability in Thumbnail Tab Strip can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Payments can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Windows Dialog can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in V8 can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
- Use after free vulnerability in Safe Browsing can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Screen Capture can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Implementation vulnerability in Scroll can be exploited to cause denial of service.
- Policy bypass vulnerability in COOP can be exploited to bypass security restrictions.
- Implementation vulnerability in Paint can be exploited to cause denial of service.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2022-0466 critical
- CVE-2022-0456 critical
- CVE-2022-0453 critical
- CVE-2022-0455 high
- CVE-2022-0458 critical
- CVE-2022-0464 critical
- CVE-2022-0469 critical
- CVE-2022-0468 critical
- CVE-2022-0463 critical
- CVE-2022-0460 critical
- CVE-2022-0470 critical
- CVE-2022-0454 critical
- CVE-2022-0467 critical
- CVE-2022-0452 critical
- CVE-2022-0459 critical
- CVE-2022-0465 critical
- CVE-2022-0457 critical
- CVE-2022-0462 high
- CVE-2022-0461 high
- CVE-2022-4025 warning
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!