Vulnerabilities > Google > Chrome > 104.0.5112.103
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-11-09 | CVE-2022-3887 | Use After Free vulnerability in multiple products Use after free in Web Workers in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-09 | CVE-2022-3888 | Use After Free vulnerability in multiple products Use after free in WebCodecs in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-09 | CVE-2022-3889 | Type Confusion vulnerability in multiple products Type confusion in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3652 | Type Confusion vulnerability in Google Chrome Type confusion in V8 in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3653 | Out-of-bounds Write vulnerability in Google Chrome Heap buffer overflow in Vulkan in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3654 | Use After Free vulnerability in Google Chrome Use after free in Layout in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3655 | Out-of-bounds Write vulnerability in Google Chrome Heap buffer overflow in Media Galleries in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3656 | Improper Input Validation vulnerability in Google Chrome Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. | 8.8 |
2022-11-01 | CVE-2022-3657 | Use After Free vulnerability in Google Chrome Use after free in Extensions in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | 8.8 |
2022-11-01 | CVE-2022-3658 | Use After Free vulnerability in Google Chrome Use after free in Feedback service on Chrome OS in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction. | 8.8 |