Vulnerabilities > Google > Chrome > 27.0.1453.108
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-07-25 | CVE-2022-1309 | Incorrect Authorization vulnerability in Google Chrome Insufficient policy enforcement in developer tools in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | 9.6 |
2022-07-25 | CVE-2022-1310 | Use After Free vulnerability in Google Chrome Use after free in regular expressions in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-25 | CVE-2022-1311 | Use After Free vulnerability in Google Chrome Use after free in shell in Google Chrome on ChromeOS prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-25 | CVE-2022-1312 | Use After Free vulnerability in Google Chrome Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. | 9.6 |
2022-07-25 | CVE-2022-1313 | Use After Free vulnerability in Google Chrome Use after free in tab groups in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-25 | CVE-2022-1314 | Type Confusion vulnerability in Google Chrome Type confusion in V8 in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-23 | CVE-2022-1096 | Type Confusion vulnerability in Google Chrome Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-23 | CVE-2022-1125 | Use After Free vulnerability in Google Chrome Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | 8.8 |
2022-07-23 | CVE-2022-1127 | Use After Free vulnerability in Google Chrome Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction. | 8.8 |
2022-07-23 | CVE-2022-1128 | Path Traversal vulnerability in Google Chrome Inappropriate implementation in Web Share API in Google Chrome on Windows prior to 100.0.4896.60 allowed an attacker on the local network segment to leak cross-origin data via a crafted HTML page. | 6.5 |