![]() ![]() Reported by Huyna at Viettel Cyber Security on Medium CVE-2022-2621: Use after free in Extensions.Reported by Nan and Guang Gong of 360 Alpha Lab on Medium CVE-2022-2620: Use after free in WebUI.Medium CVE-2022-2619: Insufficient validation of untrusted input in Settings.Medium CVE-2022-2618: Insufficient validation of untrusted input in Internals.Medium CVE-2022-2617: Use after free in Extensions API.Medium CVE-2022-2616: Inappropriate implementation in Extensions API.Medium CVE-2022-2615: Insufficient policy enforcement in Cookies.Medium CVE-2022-2614: Use after free in Sign-In Flow.Medium CVE-2022-2613: Use after free in Input.Reported by Erik Kraft Martin Schwarzl on Medium CVE-2022-2612: Side-channel information leakage in Keyboard input.Medium CVE-2022-2611: Inappropriate implementation in Fullscreen API.Medium CVE-2022-2610: Insufficient policy enforcement in Background Fetch.Reported by and Guang Gong of 360 Vulnerability Research Institute on High CVE-2022-2609: Use after free in Nearby Share.High CVE-2022-2608: Use after free in Overview Mode.High CVE-2022-2607: Use after free in Tab Strip.High CVE-2022-2606: Use after free in Managed devices API. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |