Kaspersky ID:
KLA12462
Fecha de detección:
02/14/2022
Actualizado:
01/28/2026

Descripción

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in File Manager can be exploited to cause denial of service or execute arbitrary code.
  2. Use after free vulnerability in Webstore API can be exploited to cause denial of service or execute arbitrary code.
  3. Integer overflow vulnerability in Mojo can be exploited to cause denial of service.
  4. Heap buffer overflow vulnerability in Tab Groups can be exploited to cause denial of service.
  5. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in Gamepad API can be exploited to bypass security restrictions.
  7. Use after free vulnerability in GPU can be exploited to cause denial of service or execute arbitrary code.
  8. Use after free vulnerability in Animation can be exploited to cause denial of service or execute arbitrary code.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Productos relacionados

Lista CVE

  • CVE-2022-0603
    critical
  • CVE-2022-0605
    critical
  • CVE-2022-0608
    critical
  • CVE-2022-0604
    critical
  • CVE-2022-0606
    critical
  • CVE-2022-0610
    critical
  • CVE-2022-0607
    critical
  • CVE-2022-0609
    critical

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.