Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Extensions Platform can be exploited to cause denial of service.
- Use after free vulnerability in Web Search can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Reader Mode can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Full Screen Mode can be exploited to cause denial of service.
- Use after free vulnerability in Thumbnail Tab Strip can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Payments can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Windows Dialog can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory access vulnerability in V8 can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
- Use after free vulnerability in Safe Browsing can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Screen Capture can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Implementation vulnerability in Scroll can be exploited to cause denial of service.
- Policy bypass vulnerability in COOP can be exploited to bypass security restrictions.
- Implementation vulnerability in Paint can be exploited to cause denial of service.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2022-0466 high
- CVE-2022-0456 high
- CVE-2022-0453 high
- CVE-2022-0455 warning
- CVE-2022-0458 high
- CVE-2022-0464 high
- CVE-2022-0469 high
- CVE-2022-0468 high
- CVE-2022-0463 high
- CVE-2022-0460 high
- CVE-2022-0470 high
- CVE-2022-0454 high
- CVE-2022-0467 high
- CVE-2022-0452 high
- CVE-2022-0459 high
- CVE-2022-0465 high
- CVE-2022-0457 high
- CVE-2022-0462 warning
- CVE-2022-0461 high
- CVE-2022-4025 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!