Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-05 | CVE-2022-0452 | Use After Free vulnerability in Google Chrome Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | 9.6 |
2022-04-05 | CVE-2022-0453 | Use After Free vulnerability in Google Chrome Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0456 | Use After Free vulnerability in Google Chrome Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction. | 8.8 |
2022-04-05 | CVE-2022-0458 | Use After Free vulnerability in Google Chrome Use after free in Thumbnail Tab Strip in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0459 | Use After Free vulnerability in Google Chrome Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0460 | Use After Free vulnerability in Google Chrome Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0463 | Use After Free vulnerability in Google Chrome Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | 8.8 |
2022-04-05 | CVE-2022-0464 | Use After Free vulnerability in Google Chrome Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | 8.8 |
2022-04-05 | CVE-2022-0465 | Use After Free vulnerability in Google Chrome Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction. | 8.8 |
2022-04-05 | CVE-2022-0468 | Use After Free vulnerability in Google Chrome Use after free in Payments in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |