Vulnerabilities > Google > Chrome > 30.0.1599.15

DATE CVE VULNERABILITY TITLE RISK
2022-08-12 CVE-2022-2615 Reliance on Cookies without Validation and Integrity Checking vulnerability in multiple products
Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
network
low complexity
google fedoraproject CWE-565
6.5
2022-08-12 CVE-2022-2616 Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.
network
low complexity
google fedoraproject
6.5
2022-08-12 CVE-2022-2617 Race Condition vulnerability in multiple products
Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-362
8.8
2022-08-12 CVE-2022-2618 Improper Input Validation vulnerability in multiple products
Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file .
network
low complexity
google fedoraproject CWE-20
6.5
2022-08-12 CVE-2022-2619 Improper Encoding or Escaping of Output vulnerability in multiple products
Insufficient validation of untrusted input in Settings in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted HTML page.
network
low complexity
google fedoraproject CWE-116
4.3
2022-08-12 CVE-2022-2620 Improper Initialization vulnerability in multiple products
Use after free in WebUI in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-665
8.8
2022-08-12 CVE-2022-2621 Use After Free vulnerability in multiple products
Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2622 Insufficient validation of untrusted input in Safe Browsing in Google Chrome on Windows prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a crafted file.
network
low complexity
google fedoraproject
6.5
2022-08-12 CVE-2022-2623 Race Condition vulnerability in multiple products
Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-362
8.8
2022-08-12 CVE-2022-2624 Out-of-bounds Write vulnerability in multiple products
Heap buffer overflow in PDF in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file.
network
low complexity
google fedoraproject CWE-787
8.8