Описание
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
- Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Use after free in Sharing vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
- Insufficient policy enforcement in File System API can be exploited to cause denial of service.
- Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
- Insufficient policy enforcement in COOP can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
- Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tablet Mode can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI Foundations can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in UI can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2022-1862 warning
- CVE-2022-1865 warning
- CVE-2022-1861 warning
- CVE-2022-1867 warning
- CVE-2022-1871 warning
- CVE-2022-1857 warning
- CVE-2022-1872 warning
- CVE-2022-1873 warning
- CVE-2022-1868 warning
- CVE-2022-1858 warning
- CVE-2022-1859 warning
- CVE-2022-1863 warning
- CVE-2022-1874 warning
- CVE-2022-1855 warning
- CVE-2022-1876 warning
- CVE-2022-1869 warning
- CVE-2022-1870 warning
- CVE-2022-1853 warning
- CVE-2022-1854 warning
- CVE-2022-1856 warning
- CVE-2022-1866 warning
- CVE-2022-1860 warning
- CVE-2022-1875 warning
- CVE-2022-1864 warning
- CVE-2022-4918 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!