Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-07-27 | CVE-2022-1863 | Use After Free vulnerability in Google Chrome Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1864 | Use After Free vulnerability in Google Chrome Use after free in WebApp Installs in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1865 | Use After Free vulnerability in Google Chrome Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1866 | Use After Free vulnerability in Google Chrome Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions. | 8.8 |
2022-07-27 | CVE-2022-1870 | Use After Free vulnerability in Google Chrome Use after free in App Service in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | 8.8 |
2022-07-26 | CVE-2022-1496 | Use After Free vulnerability in Google Chrome Use after free in File Manager in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction. | 8.8 |
2022-07-26 | CVE-2022-1633 | Use After Free vulnerability in Google Chrome Use after free in Sharesheet in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interactions. | 8.8 |
2022-07-26 | CVE-2022-1634 | Use After Free vulnerability in Google Chrome Use after free in Browser UI in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who had convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific user interactions. | 8.8 |
2022-07-26 | CVE-2022-1635 | Use After Free vulnerability in Google Chrome Use after free in Permission Prompts in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interactions. | 8.8 |
2022-07-26 | CVE-2022-1636 | Use After Free vulnerability in Google Chrome Use after free in Performance APIs in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |