Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Service Worker API can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in PDFium can be exploited to execute arbitrary code or cause denial of service.
- Use after free vulnerability in web packaging can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Scheduling can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in site isolation can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Printing can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Optimization Guide can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Task Manager can be exploited to execute arbitrary code or cause denial of service.
- Use after free vulnerability in Data Transfer can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in push messaging can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in DevTools can be exploited to execute arbitrary code or cause denial of service.
- Use after free vulnerability in safe browsing can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Fenced Frames can be exploited to cause denial of service.
- Use after free vulnerability in Text Input Method Editor can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Storage can be exploited to cause denial of service.
- Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2022-0305 unknown
- CVE-2022-0306 unknown
- CVE-2022-0293 unknown
- CVE-2022-0298 unknown
- CVE-2022-0290 unknown
- CVE-2022-0296 unknown
- CVE-2022-0307 unknown
- CVE-2022-0304 unknown
- CVE-2022-0302 unknown
- CVE-2022-0310 unknown
- CVE-2022-0308 unknown
- CVE-2022-0294 unknown
- CVE-2022-0301 unknown
- CVE-2022-0289 unknown
- CVE-2022-0311 unknown
- CVE-2022-0295 unknown
- CVE-2022-0292 unknown
- CVE-2022-0300 unknown
- CVE-2022-0291 unknown
- CVE-2022-0297 unknown
- CVE-2022-0309 unknown
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!