Vulnerabilities > Google > Chrome > 78.0.3904.80
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-11-30 | CVE-2022-4185 | Unspecified vulnerability in Google Chrome Inappropriate implementation in Navigation in Google Chrome on iOS prior to 108.0.5359.71 allowed a remote attacker to spoof the contents of the modal dialogue via a crafted HTML page. | 4.3 |
2022-11-30 | CVE-2022-4186 | Improper Input Validation vulnerability in Google Chrome Insufficient validation of untrusted input in Downloads in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass Downloads restrictions via a crafted HTML page. | 4.3 |
2022-11-30 | CVE-2022-4187 | Unspecified vulnerability in Google Chrome Insufficient policy enforcement in DevTools in Google Chrome on Windows prior to 108.0.5359.71 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | 6.5 |
2022-11-30 | CVE-2022-4188 | Injection vulnerability in Google Chrome Insufficient validation of untrusted input in CORS in Google Chrome on Android prior to 108.0.5359.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. | 4.3 |
2022-11-30 | CVE-2022-4189 | Unspecified vulnerability in Google Chrome Insufficient policy enforcement in DevTools in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. | 4.3 |
2022-11-30 | CVE-2022-4190 | Unspecified vulnerability in Google Chrome Insufficient data validation in Directory in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. | 8.8 |
2022-11-30 | CVE-2022-4191 | Use After Free vulnerability in Google Chrome Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. | 8.8 |
2022-11-30 | CVE-2022-4192 | Use After Free vulnerability in Google Chrome Use after free in Live Caption in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. | 8.8 |
2022-11-30 | CVE-2022-4193 | Unspecified vulnerability in Google Chrome Insufficient policy enforcement in File System API in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. | 8.8 |
2022-11-30 | CVE-2022-4194 | Use After Free vulnerability in Google Chrome Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |