Kaspersky ID:
KLA12531
Дата обнаружения:
10/05/2022
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Performance APIs can be exploited to cause denial of service or execute arbitrary code.
  2. Heap buffer overflow vulnerability in V8 can be exploited to cause denial of service.
  3. Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free vulnerability in Web UI Diagnostics can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in Web Contents can be exploited to cause denial of service.
  7. Use after free vulnerability in Browser UI can be exploited to cause denial of service or execute arbitrary code.
  8. Use after free vulnerability in Permission Prompts can be exploited to cause denial of service or execute arbitrary code.
  9. Use after free vulnerability in Sharesheet can be exploited to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2022-1636
    warning
  • CVE-2022-1638
    warning
  • CVE-2022-1640
    warning
  • CVE-2022-1639
    warning
  • CVE-2022-1641
    warning
  • CVE-2022-1637
    warning
  • CVE-2022-1634
    warning
  • CVE-2022-1635
    warning
  • CVE-2022-1633
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.