Vulnerabilities > Google > Chrome > 11.0.696.68
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-05 | CVE-2022-0458 | Use After Free vulnerability in Google Chrome Use after free in Thumbnail Tab Strip in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0459 | Use After Free vulnerability in Google Chrome Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0460 | Use After Free vulnerability in Google Chrome Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-04-05 | CVE-2022-0461 | Unspecified vulnerability in Google Chrome Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page. | 6.5 |
2022-04-05 | CVE-2022-0462 | Unspecified vulnerability in Google Chrome Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 6.5 |
2022-04-05 | CVE-2022-0463 | Use After Free vulnerability in Google Chrome Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | 8.8 |
2022-04-05 | CVE-2022-0464 | Use After Free vulnerability in Google Chrome Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | 8.8 |
2022-04-05 | CVE-2022-0465 | Use After Free vulnerability in Google Chrome Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction. | 8.8 |
2022-04-05 | CVE-2022-0466 | Unspecified vulnerability in Google Chrome Inappropriate implementation in Extensions Platform in Google Chrome prior to 98.0.4758.80 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page. | 9.6 |
2022-04-05 | CVE-2022-0467 | Unspecified vulnerability in Google Chrome Inappropriate implementation in Pointer Lock in Google Chrome on Windows prior to 98.0.4758.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 8.8 |