CVE-2022-1868 An attacker could bypass navigation restrictions in Google Chrome if they convinced a user to install a malicious extension.
If you have installed a malicious extension or have a compromised device, an attacker could potentially trick you into visiting a specifically crafted website, causing
CVE-2022-1854 An attacker can exploit heap corruption in Google Chrome to hijack browser sessions.
CVE-2015-1240 was discovered in Google V8, a highly-optimized JavaScript engine. By crafting synthetic input and injecting code into the memory, an attacker could exploit the
CVE-2022-1869 Confusion in V8 allowed a remote attacker to exploit heap corruption.
This issue did not affect most users, as the browser tried to prevent this by performing strict type enforcement. However, since the type system was
CVE-2022-1863 An attacker could exploit heap corruption in Google Chrome after 102.0.5005.61 to potentially exploit after free.
Exploitation resulted in a potentially exploitable crash and another potential vector for attack. Google Chrome prior to 102.0.5 prior to allowing insecure extensions
CVE-2022-1864 Attackers can exploit heap corruption in Google Chrome after an attack that leads a user to install a malicious extension.
Google Note: This vulnerability was disclosed by Tavis Ormandy of the Google Security Team on Dec 8, 2017. There is no active trust associated with
Episode
00:00:00
00:00:00