Vulnerabilities > Google > Chrome > 18.0.1019.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-07-27 | CVE-2022-1859 | Use After Free vulnerability in Google Chrome Use after free in Performance Manager in Google Chrome prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-27 | CVE-2022-1860 | Use After Free vulnerability in Google Chrome Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions. | 8.8 |
2022-07-27 | CVE-2022-1861 | Use After Free vulnerability in Google Chrome Use after free in Sharing in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1862 | Unspecified vulnerability in Google Chrome Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page. | 6.5 |
2022-07-27 | CVE-2022-1863 | Use After Free vulnerability in Google Chrome Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1864 | Use After Free vulnerability in Google Chrome Use after free in WebApp Installs in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1865 | Use After Free vulnerability in Google Chrome Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction. | 8.8 |
2022-07-27 | CVE-2022-1866 | Use After Free vulnerability in Google Chrome Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions. | 8.8 |
2022-07-27 | CVE-2022-1867 | Unspecified vulnerability in Google Chrome Insufficient validation of untrusted input in Data Transfer in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass same origin policy via a crafted clipboard content. | 6.5 |
2022-07-27 | CVE-2022-1868 | Unspecified vulnerability in Google Chrome Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. | 6.5 |