Kaspersky ID:
KLA12500
検出日:
04/11/2022
更新日:
01/28/2026

説明

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
  2. Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
  3. Security vulnerability in developer tools area can be exploited to bypass security restrictions.
  4. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  5. Use after free vulnerability in Chrome OS shell can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
  7. Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
  8. Implementation vulnerability in full screen can be exploited to cause denial of service.
  9. Implementation vulnerability in compositing can be exploited to cause denial of service.
  10. Use after free vulnerability in WebGPU can be exploited to cause denial of service or execute arbitrary code.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

関連製品

CVEリスト

  • CVE-2022-1305
    critical
  • CVE-2022-1313
    critical
  • CVE-2022-1309
    critical
  • CVE-2022-1312
    critical
  • CVE-2022-1314
    critical
  • CVE-2022-1311
    critical
  • CVE-2022-1308
    critical
  • CVE-2022-1310
    critical
  • CVE-2022-1307
    warning
  • CVE-2022-1306
    warning
  • CVE-2022-2399
    critical

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.