‼ CVE-2022-1861 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Sharing in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1853 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1865 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1873 ‼
📖 Read
via "National Vulnerability Database".
Insufficient policy enforcement in COOP in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1862 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1874 ‼
📖 Read
via "National Vulnerability Database".
Insufficient policy enforcement in Safe Browsing in Google Chrome on Mac prior to 102.0.5005.61 allowed a remote attacker to bypass downloads protection policy via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1866 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1858 ‼
📖 Read
via "National Vulnerability Database".
Out of bounds read in DevTools in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform an out of bounds memory read via specific user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1860 ‼
📖 Read
via "National Vulnerability Database".
Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1868 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46830 ‼
📖 Read
via "National Vulnerability Database".
A path traversal vulnerability exists within GoAnywhere MFT before 6.8.3 that utilize self-registration for the GoAnywhere Web Client. This vulnerability could potentially allow an external user who self-registers with a specific username and/or profile information to gain access to files at a higher directory level than intended.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1871 ‼
📖 Read
via "National Vulnerability Database".
Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass file system policy via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1876 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in DevTools in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1870 ‼
📖 Read
via "National Vulnerability Database".
Use after free in App Service in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1863 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1875 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in PDF in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1869 ‼
📖 Read
via "National Vulnerability Database".
Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1856 ‼
📖 Read
via "National Vulnerability Database".
Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1854 ‼
📖 Read
via "National Vulnerability Database".
Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1872 ‼
📖 Read
via "National Vulnerability Database".
Insufficient policy enforcement in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.📖 Read
via "National Vulnerability Database".
🕴 When Human Security Meets PerimeterX 🕴
📖 Read
via "Dark Reading".
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.📖 Read
via "Dark Reading".
Dark Reading
When Human Security Meets PerimeterX
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.
🤯1