Vulnerabilities > Fedoraproject
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-12 | CVE-2022-2612 | Information Exposure Through Discrepancy vulnerability in multiple products Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. | 6.5 |
2022-08-12 | CVE-2022-2613 | Use After Free vulnerability in multiple products Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions. | 8.8 |
2022-08-12 | CVE-2022-2614 | Use After Free vulnerability in multiple products Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2615 | Reliance on Cookies without Validation and Integrity Checking vulnerability in multiple products Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 6.5 |
2022-08-12 | CVE-2022-2616 | Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension. | 6.5 |
2022-08-12 | CVE-2022-2617 | Race Condition vulnerability in multiple products Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions. | 8.8 |
2022-08-12 | CVE-2022-2618 | Improper Input Validation vulnerability in multiple products Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file . | 6.5 |
2022-08-12 | CVE-2022-2619 | Improper Encoding or Escaping of Output vulnerability in multiple products Insufficient validation of untrusted input in Settings in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted HTML page. | 4.3 |
2022-08-12 | CVE-2022-2620 | Improper Initialization vulnerability in multiple products Use after free in WebUI in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions. | 8.8 |
2022-08-12 | CVE-2022-2621 | Use After Free vulnerability in multiple products Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions. | 8.8 |