Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-09-26 | CVE-2022-2852 | Use After Free vulnerability in multiple products Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-2855 | Use After Free vulnerability in multiple products Use after free in ANGLE in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-2858 | Use After Free vulnerability in multiple products Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. | 8.8 |
2022-09-26 | CVE-2022-2859 | Use After Free vulnerability in multiple products Use after free in Chrome OS Shell in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions. | 8.8 |
2022-09-26 | CVE-2022-3038 | Use After Free vulnerability in multiple products Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-3039 | Use After Free vulnerability in multiple products Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-3041 | Use After Free vulnerability in multiple products Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-3046 | Use After Free vulnerability in multiple products Use after free in Browser Tag in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-3055 | Use After Free vulnerability in multiple products Use after free in Passwords in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-09-26 | CVE-2022-3058 | Use After Free vulnerability in multiple products Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction. | 8.8 |