Kaspersky ID:
KLA20104
Дата обнаружения:
29/11/2022
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  2. Use after free vulnerability in Forms can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Live Caption can be exploited to cause denial of service or execute arbitrary code.
  5. Data validation vulnerability in Directory can be exploited to cause denial of service.
  6. Policy enforcement vulnerability in Popup Blocker can be exploited to cause denial of service.
  7. Validation of untrusted input vulnerability in CORS can be exploited to cause denial of service.
  8. Implementation vulnerability in Navigation can be exploited to cause denial of service.
  9. Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
  10. Policy enforcement vulnerability in Safe Browsing can be exploited to cause denial of service.
  11. Use after free vulnerability in Audio can be exploited to cause denial of service or execute arbitrary code.
  12. Use after free vulnerability in Sign-In can be exploited to cause denial of service or execute arbitrary code.
  13. Implementation vulnerability in Fenced Frames can be exploited to cause denial of service.
  14. Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
  15. Validation of untrusted input vulnerability in Downloads can be exploited to cause denial of service.
  16. Policy enforcement vulnerability in File System API can be exploited to cause denial of service.
  17. Out of bounds write vulnerability in Lacros Graphics can be exploited to cause denial of service.
  18. Use after free vulnerability in Camera Capture can be exploited to cause denial of service or execute arbitrary code.
  19. Policy enforcement vulnerability in Autofill can be exploited to cause denial of service.
  20. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  21. Uninitialized use vulnerability in FFmpeg can be exploited to execute arbitrary code.
  22. Implementation vulnerability in Blink can be exploited to cause denial of service.
  23. Implementation vulnerability in DevTools can be exploited to cause denial of service.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2022-4174
    critical
  • CVE-2022-4181
    critical
  • CVE-2022-4180
    critical
  • CVE-2022-4192
    critical
  • CVE-2022-4190
    critical
  • CVE-2022-4183
    warning
  • CVE-2022-4188
    warning
  • CVE-2022-4185
    warning
  • CVE-2022-4177
    critical
  • CVE-2022-4195
    warning
  • CVE-2022-4179
    critical
  • CVE-2022-4191
    critical
  • CVE-2022-4182
    warning
  • CVE-2022-4189
    warning
  • CVE-2022-4186
    warning
  • CVE-2022-4187
    high
  • CVE-2022-4193
    critical
  • CVE-2022-4176
    critical
  • CVE-2022-4175
    critical
  • CVE-2022-4178
    critical
  • CVE-2022-4184
    warning
  • CVE-2022-4194
    critical
  • CVE-2022-4907
    critical
  • CVE-2022-4906
    critical
  • CVE-2022-4955
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.