Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
chrome os vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2022-2608
Use after free in Overview Mode in Google Chrome on Chrome OS before 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
Google Chrome
Fedoraproject Fedora 37
8.8
CVSSv3
CVE-2022-2609
Use after free in Nearby Share in Google Chrome on Chrome OS before 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
Google Chrome
Fedoraproject Fedora 37
8.8
CVSSv3
CVE-2022-2296
Use after free in Chrome OS Shell in Google Chrome on Chrome OS before 103.0.5060.114 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via direct UI interactions.
Google Chrome
Fedoraproject Extra Packages For Enterprise Linux 8.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
8.8
CVSSv3
CVE-2022-2294
Heap buffer overflow in WebRTC in Google Chrome before 103.0.5060.114 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Fedoraproject Extra Packages For Enterprise Linux 8.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Webkitgtk Webkitgtk
Wpewebkit Wpe Webkit
Apple Mac Os X
Apple Mac Os X 10.15.7
Apple Macos
Apple Iphone Os
Apple Ipados
Apple Watchos
Apple Tvos
Webrtc Project Webrtc -
3 Articles
8.8
CVSSv3
CVE-2022-1860
Use after free in UI Foundations in Google Chrome on Chrome OS before 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.
Google Chrome
8.8
CVSSv3
CVE-2022-1866
Use after free in Tablet Mode in Google Chrome on Chrome OS before 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions.
Google Chrome
8.8
CVSSv3
CVE-2022-1861
Use after free in Sharing in Google Chrome on Chrome OS before 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction.
Google Chrome
8.8
CVSSv3
CVE-2022-1641
Use after free in Web UI Diagnostics in Google Chrome on Chrome OS before 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interaction.
Google Chrome
8.8
CVSSv3
CVE-2022-1489
Out of bounds memory access in UI Shelf in Google Chrome on Chrome OS, Lacros before 101.0.4951.41 allowed a remote malicious user to potentially exploit heap corruption via specific user interactions.
Google Chrome
8.8
CVSSv3
CVE-2022-1633
Use after free in Sharesheet in Google Chrome on Chrome OS before 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interactions.
Google Chrome
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »