説明
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Validation of untrusted input vulnerability in Intents can be exploited to cause denial of service.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Sign-In Flow can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Downloads can be exploited to cause denial of service.
- Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in FedCM can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Chrome OS Shell can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Cookies can be exploited to bypass security restrictions.
- Use after free vulnerability in Browser Creation can be exploited to cause denial of service or execute arbitrary code.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2022-2856 high
- CVE-2022-2855 critical
- CVE-2022-2858 critical
- CVE-2022-2861 high
- CVE-2022-2853 critical
- CVE-2022-2854 critical
- CVE-2022-2852 critical
- CVE-2022-2857 critical
- CVE-2022-2859 critical
- CVE-2022-2860 high
- CVE-2022-2998 critical
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!