Kaspersky ID:
KLA12544
Дата обнаружения:
24/05/2022
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
  2. Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free in Sharing vulnerability can be exploited to cause denial of service or execute arbitrary code.
  4. Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
  5. Insufficient policy enforcement in File System API can be exploited to cause denial of service.
  6. Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
  7. Insufficient policy enforcement in COOP can be exploited to cause denial of service.
  8. Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
  9. Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
  10. Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
  11. Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
  12. Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
  13. Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
  14. Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
  15. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  16. Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
  17. Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  19. Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
  20. Use after free vulnerability in Tablet Mode can be exploited to cause denial of service or execute arbitrary code.
  21. Use after free vulnerability in UI Foundations can be exploited to cause denial of service or execute arbitrary code.
  22. Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
  23. Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
  24. Use after free vulnerability in UI can be exploited to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2022-1862
    warning
  • CVE-2022-1865
    warning
  • CVE-2022-1861
    warning
  • CVE-2022-1867
    warning
  • CVE-2022-1871
    warning
  • CVE-2022-1857
    warning
  • CVE-2022-1872
    warning
  • CVE-2022-1873
    warning
  • CVE-2022-1868
    warning
  • CVE-2022-1858
    warning
  • CVE-2022-1859
    warning
  • CVE-2022-1863
    warning
  • CVE-2022-1874
    warning
  • CVE-2022-1855
    warning
  • CVE-2022-1876
    warning
  • CVE-2022-1869
    warning
  • CVE-2022-1870
    warning
  • CVE-2022-1853
    warning
  • CVE-2022-1854
    warning
  • CVE-2022-1856
    warning
  • CVE-2022-1866
    warning
  • CVE-2022-1860
    warning
  • CVE-2022-1875
    warning
  • CVE-2022-1864
    warning
  • CVE-2022-4918
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.