Latest CVE Feed
-
8.8
HIGHCVE-2022-1863
Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-1862
Inappropriate implementation in Extensions in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass profile restrictions via a crafted HTML page.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1861
Use after free in Sharing in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific user interaction.... Read more
Affected Products : chrome- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1860
Use after free in UI Foundations in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific user interactions.... Read more
Affected Products : chrome- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1859
Use after free in Performance Manager in Google Chrome prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-1858
Out of bounds read in DevTools in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform an out of bounds memory read via specific user interaction.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1857
Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass file system restrictions via a crafted HTML page.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1856
Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1855
Use after free in Messaging in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-1854
Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
9.6
CRITICALCVE-2022-1853
Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.... Read more
- Published: Jul. 27, 2022
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2022-1852
A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.... Read more
- Published: Jun. 30, 2022
- Modified: Nov. 21, 2024
-
7.8
HIGH- Published: May. 25, 2022
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2022-1850
Path Traversal in GitHub repository filegator/filegator prior to 7.8.0.... Read more
Affected Products : filegator- Published: May. 24, 2022
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2022-1849
Session Fixation in GitHub repository filegator/filegator prior to 7.8.0.... Read more
Affected Products : filegator- Published: May. 24, 2022
- Modified: Nov. 21, 2024
-
9.0
CRITICALCVE-2022-1848
Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.... Read more
Affected Products : para- Published: May. 24, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-1847
The Rotating Posts WordPress plugin through 1.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack... Read more
Affected Products : rotating_posts- Published: Jun. 27, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-1846
The Tiny Contact Form WordPress plugin through 0.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack... Read more
Affected Products : tiny_contact_form- Published: Jun. 27, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-1845
The WP Post Styling WordPress plugin before 1.3.1 does not have CSRF checks in various actions, which could allow attackers to make a logged in admin delete plugin's data, update the settings, add new entries and more via CSRF attacks... Read more
Affected Products : wp_post_styling- Published: Jun. 27, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-1844
The WP Sentry WordPress plugin through 1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitis... Read more
Affected Products : wp-sentry- Published: Jun. 27, 2022
- Modified: Nov. 21, 2024