8.8
CVSSv3

CVE-2022-2613

Published: 12/08/2022 Updated: 27/10/2022
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8

Vulnerability Summary

Use after free in Input in Google Chrome on Chrome OS before 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

fedoraproject fedora 37

Vendor Advisories

Hello All,The Stable channel is being updated to 1040511283 (Platform version: 149091000) for most ChromeOS devices and will be rolled out over the next few daysFor Chrome browser fixes, see the Chrome Desktop release announcementIf you find new issues, please let us know one of the following ways:File a bug Visit ou ...
LTS-102 has been updated in the LTS channel to 10205005182 (Platform Version: 146951350) for most ChromeOS devices Want to know more about Long-term Support? Click hereThis update contains multiple Security fixes, including:1340253  Critical CVE-2022-3038 Use after free in Network Service1051198  ...
Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure For the stable distribution (bullseye), these problems have been fixed in version 1040511279-1~deb11u1 We recommend that you upgrade your chromium packages For the detailed security status of ...
The Chrome team is delighted to announce the promotion of Chrome 104 to the stable channel for Windows, Mac and LinuxChrome 104 is also promoted to our new extended stable channel for Windows and Mac This will roll out over the coming days/weeksChrome 1040511279 ( Mac/linux) and 1040511279/80/81 ( Windows)  co ...

Github Repositories

Golang For Bug Hunting Recon - githubcom/ravro-ir/golang_bug_hunting/tree/main/recon Port scan slow - githubcom/ravro-ir/golang_bug_hunting/tree/main/recon/portscan Port scan fast - githubcom/ravro-ir/golang_bug_hunting/tree/main/recon/portscanfast Port scan no auth database - githubcom/ravro-ir/golang_bug_hunting/tree/main/recon/portscanno

CVE-2022-2613 RCE, POC, Exp,批量

CVE-2022-2613 Use after free in Input in Google Chrome on Chrome OS prior to 1040511279 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions authentication complexity vector not available not available not available confidentiality integrity availability not