Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Input can be exploited to cause denial of service.
- Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in File Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebGL can be exploited to cause denial of service.
- Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in UI Shelf can be exploited to cause denial of service.
- Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
- Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
- Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in iframe can be exploited to cause denial of service.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
- Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
- Use after free vulnerability in Codecs can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
- Use after free vulnerability in Base Internals can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2022-1497 warning
- CVE-2022-1490 warning
- CVE-2022-1496 warning
- CVE-2022-1477 warning
- CVE-2022-1482 warning
- CVE-2022-1487 warning
- CVE-2022-1488 warning
- CVE-2022-1489 warning
- CVE-2022-1478 warning
- CVE-2022-1485 warning
- CVE-2022-1500 warning
- CVE-2022-1491 warning
- CVE-2022-1492 warning
- CVE-2022-1495 warning
- CVE-2022-1481 warning
- CVE-2022-1483 warning
- CVE-2022-1486 warning
- CVE-2022-1494 warning
- CVE-2022-1484 warning
- CVE-2022-1493 warning
- CVE-2022-1501 warning
- CVE-2022-1479 warning
- CVE-2022-1498 warning
- CVE-2022-1480 warning
- CVE-2022-1499 warning
- CVE-2022-1919 warning
- CVE-2022-4920 warning
- CVE-2022-4919 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!