Cve 2022 4135
Author: u | 2025-04-24
CVE- 4135. Closed random-robbie opened this issue 1 comment Fixed by 4230. Closed CVE- 4135. random-robbie opened this issue 1 comment Fixed by 4230. Labels. nuclei-template Nuclei template contribution. Comments. Copy link Contributor. Store 1172 4135 Transit Road, Williamsville, NY Phone: Get Directions to location at Burlington 4135 Transit Road,Williamsville,NY , opens in a new Buffalo (1342) 2640
CVE- , CVE- detected in 2.214.1 Agent Software 4135
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated user to send specially crafted packets to cause a denial of service from excessive memory usage. Published 2020-02-19 16:15:12 Updated 2022-01-01 19:38:43 Vulnerability category: Denial of service Products affected by CVE-2020-4135cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:11.5:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* Exploit prediction scoring system (EPSS) score for CVE-2020-4135 ~ 69 % Percentile, the proportion of vulnerabilities that are scored at or less CVSS scores for CVE-2020-4135 References for CVE-2020-4135 IBM DB2 denial of service CVE-2020-4135 Vulnerability Report VDB Entry;Vendor Advisory CVE-2020-4135 IBM DB2 In Blink Media- High CVE-2022-4437: Use after free in Mojo IPC- High CVE-2022-4438: Use after free in Blink Frames- High CVE-2022-4439: Use after free in Aura- Medium CVE-2022-4440: Use after free in ProfilesAs usual, our ongoing internal security work was responsible for a wide range of fixes:- [1400487] Various fixes from internal audits, fuzzing and other initiativesGoogle Chrome 108.0.5339.98- Change log not available for this versionGoogle Chrome 108.0.5339.94Security fixes:- Type Confusion in V8Google Chrome 108.0.5339.71Security Fixes:- High CVE-2022-4174: Type Confusion in V8- High CVE-2022-4175: Use after free in Camera Capture- High CVE-2022-4176: Out of bounds write in Lacros Graphics- High CVE-2022-4177: Use after free in Extensions- High CVE-2022-4178: Use after free in Mojo- High CVE-2022-4179: Use after free in Audio- High CVE-2022-4180: Use after free in Mojo- High CVE-2022-4181: Use after free in Forms- Medium CVE-2022-4182: Inappropriate implementation in Fenced Frames- Medium CVE-2022-4183: Insufficient policy enforcement in Popup Blocker- Medium CVE-2022-4184: Insufficient policy enforcement in Autofill- Medium CVE-2022-4185: Inappropriate implementation in Navigation- Medium CVE-2022-4186: Insufficient validation of untrusted input in Downloads- Medium CVE-2022-4187: Insufficient policy enforcement in DevTools- Medium CVE-2022-4188: Insufficient validation of untrusted input in CORS- Medium CVE-2022-4189: Insufficient policy enforcement in DevTools- Medium CVE-2022-4190: Insufficient data validation in Directory- Medium CVE-2022-4191: Use after free in Sign-In- Medium CVE-2022-4192: Use after free in Live Caption- Medium CVE-2022-4193: Insufficient policy enforcement in File System API- Medium CVE-2022-4194: Use after free in Accessibility- Medium CVE-2022-4195: Insufficient policy enforcement in Safe BrowsingAs usual, our ongoing internal security work was responsible for a wide range of fixes- [1394280] Various fixes from internal audits, fuzzing and other initiativeGoogle Chrome 107.0.5304.121Security fixes:- High CVE-2022-4135: Heap buffer overflow in GPUGoogle Chrome 107.0.5304.110Security Fixes and Rewards:- High CVE-2022-3885: Use after free in V8- High CVE-2022-3886: Use after free in Speech Recognition- High CVE-2022-3887: Use after free inCVE- Issue 4135 projectdiscovery/nuclei-templates
SynopsisA web browser installed on the remote Windows host is affected by a vulnerability.DescriptionThe version of Google Chrome installed on the remote Windows host is prior to 107.0.5304.121. It is, therefore, affected by a vulnerability as referenced in the 2022_11_stable-channel-update-for-desktop_24 advisory. - Heap buffer overflow in GPU. (CVE-2022-4135)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.SolutionUpgrade to Google Chrome version 107.0.5304.121 or later.See Also DetailsSeverity: CriticalID: 168181File Name: google_chrome_107_0_5304_121.naslVersion: 1.9Type: localAgent: windowsPublished: 11/24/2022Updated: 9/20/2023Configuration: Enable thorough checksSupported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, NessusRisk InformationVPRRisk Factor: HighScore: 8.1CVSS v2Risk Factor: CriticalBase Score: 10Temporal Score: 8.7Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:CCVSS v3Risk Factor: CriticalBase Score: 9.6Temporal Score: 9.2Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HTemporal Vector: CVSS:3.0/E:H/RL:O/RC:CVulnerability InformationCPE: cpe:/a:google:chromeRequired KB Items: SMB/Google_Chrome/InstalledExploit Available: trueExploit Ease: Exploits are availablePatch Publication Date: 11/24/2022Vulnerability Publication Date: 11/24/2022CISA Known Exploited Vulnerability Due Dates: 12/19/2022Reference InformationCVE: CVE-2022-4135IAVA: 2022-A-0482-S, 2022-A-0501-S. CVE- 4135. Closed random-robbie opened this issue 1 comment Fixed by 4230. Closed CVE- 4135. random-robbie opened this issue 1 comment Fixed by 4230. Labels. nuclei-template Nuclei template contribution. Comments. Copy link Contributor. Store 1172 4135 Transit Road, Williamsville, NY Phone: Get Directions to location at Burlington 4135 Transit Road,Williamsville,NY , opens in a new Buffalo (1342) 2640Download ZOLA Connection Troubleshooter .4135
Free (CWE-416)Arbitrary code executionCritical7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVE-2022-44520 Adobe would like to thank the following for reporting these issues and for working with Adobe to help protect our customers: Mat Powell of Trend Micro Zero Day Initiative - CVE-2022-28250, CVE-2022-28251, CVE-2022-28252, CVE-2022-28253, CVE-2022-28254, CVE-2022-28255, CVE-2022-28256, CVE-2022-28257, CVE-2022-28258, CVE-2022-28259, CVE-2022-28260, CVE-2022-28261, CVE-2022-28262, CVE-2022-28263, CVE-2022-28264, CVE-2022-28265, CVE-2022-28266, CVE-2022-28267, CVE-2022-28268, CVE-2022-28239, CVE-2022-28240, CVE-2022-28241, CVE-2022-28242, CVE-2022-28243, CVE-2022-27800, CVE-2022-27802, CVE-2022-24101, CVE-2022-28837, CVE-2022-28838, CVE-2022-44514, CVE-2022-44515, CVE-2022-44516, CVE-2022-44517, CVE-2022-44518, CVE-2022-44519, CVE-2022-44520Anonymous working with Trend Micro Zero Day Initiative - CVE-2022-27785, CVE-2022-27786, CVE-2022-27787, CVE-2022-27788, CVE-2022-27790, CVE-2022-27791, CVE-2022-27792, CVE-2022-27793, CVE-2022-27794, CVE-2022-27797, CVE-2022-27798, CVE-2022-27801, CVE-2022-28231, CVE-2022-28232, CVE-2022-28233, CVE-2022-28236, CVE-2022-28237, CVE-2022-28238, CVE-2022-28245, CVE-2022-28246, CVE-2022-28248, CVE-2022-28269, CVE-2022-24102, CVE-2022-24103, CVE-2022-24104Mark Vincent Yason (@MarkYason) working with Trend Micro Zero Day Initiative - CVE-2022-27795, CVE-2022-27796, CVE-2022-27799, CVE-2022-28230, CVE-2022-28235Krishnakant Patil and Ashfaq Ansari - HackSys Inc working with Trend Micro Zero Day Initiative - CVE-2022-28249, CVE-2022-27789Lockheed Martin Red Team - CVE-2022-28247Gehirn Inc. - Maru Asahina, Ren Hirasawa, Tatsuki Maekawa(@mtk0308), Tsubasa Iinuma, Hikaru Ida(@howmuch515) - CVE-2022-28244RUC_SE_SEC (ruc_se_sec) - CVE-2022-28234kdot working with Trend Micro Zero Day Initiative - CVE-2022-35672, CVE-2022-44512, CVE-2022-44513 May 25, 2023: Updated acknowledgments and CVE details for CVE-2022-44512, CVE-2022-44513, CVE-2022-44514, CVE-2022-44515, CVE-2022-44516, CVE-2022-44517, CVE-2022-44518, CVE-2022-44519, CVE-2022-44520July 26, 2022: Updated acknowledgement and details for CVE-2022-35672May 9th, 2022: Added CVE details for CVE-2022-28837, CVE-2022-28838April 18, 2022: Updated acknowledgement for CVE-2022-24102, CVE-2022-24103, CVE-2022-24104 For more information, visit or email PSIRT@adobe.com. Fixes:- Critical CVE-2022-1853: Use after free in Indexed DB- High CVE-2022-1854: Use after free in ANGLE- High CVE-2022-1855: Use after free in Messaging- High CVE-2022-1856: Use after free in User Education- High CVE-2022-1857: Insufficient policy enforcement in File System API- High CVE-2022-1858: Out of bounds read in DevTools- High CVE-2022-1859: Use after free in Performance Manager- High CVE-2022-1860: Use after free in UI Foundations- High CVE-2022-1861: Use after free in Sharing- Medium CVE-2022-1862: Inappropriate implementation in Extensions- Medium CVE-2022-1863: Use after free in Tab Groups- Medium CVE-2022-1864: Use after free in WebApp Installs- Medium CVE-2022-1865: Use after free in Bookmarks- Medium CVE-2022-1866: Use after free in Tablet Mode- Medium CVE-2022-1867: Insufficient validation of untrusted input in Data Transfer- Medium CVE-2022-1868: Inappropriate implementation in Extensions API- Medium CVE-2022-1869: Type Confusion in V8- Medium CVE-2022-1870: Use after free in App Service- Low CVE-2022-1871: Insufficient policy enforcement in File System API- Low CVE-2022-1872: Insufficient policy enforcement in Extensions API- Low CVE-2022-1873: Insufficient policy enforcement in COOP- Low CVE-2022-1874: Insufficient policy enforcement in Safe Browsing- Low CVE-2022-1875: Inappropriate implementation in PDF- Low CVE-2022-1876: Heap buffer overflow in DevToolsAs usual, our ongoing internal security work was responsible for a wide range of fixes:- [1328866] Various fixes from internal audits, fuzzing and other initiativesGoogle Chrome 101.0.4951.64Security fixes:- High CVE-2022-1633: Use after free in Sharesheet- High CVE-2022-1634: Use after free in Browser UI- High CVE-2022-1635: Use after free in Permission Prompts- High CVE-2022-1636: Use after free in Performance APIs- High CVE-2022-1637: Inappropriate implementation in Web Contents- High CVE-2022-1638: Heap buffer overflow in V8 Internationalization- High CVE-2022-1639: Use after free in ANGLE- High CVE-2022-1640: Use after free in Sharing- Medium CVE-2022-1641: Use after free in Web UI DiagnosticsGoogle Chrome 101.0.4951.54- Change log not available for this versionGoogle Chrome 101.0.4951.41Security Fixes:- High CVE-2022-1477: Use after free in Vulkan- HighZOLA Remote Software Uninstall .4135 DOWNLOAD
CVE-2023-52071, CVE-2023-52458, CVE-2023-52462, CVE-2023-52463, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5717, CVE-2023-6531, CVE-2023-6915, CVE-2023-6931, CVE-2023-6932, CVE-2023-7104, CVE-2024-0553, CVE-2024-0567, CVE-2024-0584, CVE-2024-1086, CVE-2024-22195, CVE-2024-26581, CVE-2024-26582, CVE-2024-26583, CVE-2024-26642 POSTGRES_15_5.R20240130.00_05 Date released Release type Database minor version 2024-02-07 Automatic Maintenance PostgreSQL 15.5 Security patches CVE-2023-1077, CVE-2023-2156, CVE-2023-28938, CVE-2023-40548, CVE-2023-40550, CVE-2023-49083, CVE-2023-51384, CVE-2023-6111, CVE-2023-6129, CVE-2023-6817, CVE-2023-7192, CVE-2024-0193, CVE-2024-0565, CVE-2024-0607, CVE-2024-0684, CVE-2024-0727, CVE-2024-0775, CVE-2024-0853, CVE-2024-0985, CVE-2024-1085, CVE-2024-24557, CVE-2024-25062 POSTGRES_15_4.R20230830.01_07 Date released Release type Database minor version 2023-12-11 Self-Service PostgreSQL 15.4 Security patches CVE-2018-1121, CVE-2020-22916, CVE-2022-4269, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-23914, CVE-2023-28736, CVE-2023-28938, CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665, CVE-2023-3338, CVE-2023-38039, CVE-2023-39325, CVE-2023-4016, CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-42753, CVE-2023-4622, CVE-2023-4623, CVE-2023-46862, CVE-2023-4921, CVE-2023-5090, CVE-2023-5363, CVE-2023-5678 POSTGRES_15_4.R20230830.01_04 Date released Release type Database minor version 2023-11-16 Self-Service PostgreSQL 15.4 Security patches CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 POSTGRES_15_4.R20230830.01_01 Date released Release type Database minor version 2023-09-11 Automatic Maintenance PostgreSQL 15.4 Security patches CVE-2015-8863, CVE-2016-4074, CVE-2018-17075, CVE-2018-17142, CVE-2018-17143, CVE-2018-17846, CVE-2018-17847, CVE-2018-17848, CVE-2022-28737, CVE-2022-3623, CVE-2023-0160, CVE-2023-1206, CVE-2023-2269, CVE-2023-2454, CVE-2023-2455, CVE-2023-2860, CVE-2023-29491, CVE-2023-3090, CVE-2023-31248, CVE-2023-32001, CVE-2023-3389, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3777, CVE-2023-3812, CVE-2023-3817, CVE-2023-38408, CVE-2023-4004, CVE-2023-4147, CVE-2023-4194, CVE-2023-4387, CVE-2023-4459 POSTGRES_15_2.R20230530.01_11 Date released Release type Database minor version 2023-08-23 Self-Service PostgreSQL 15.2 Security patches CVE-2023-39417, CVE-2023-39418 POSTGRES_15_2.R20230530.01_08 Date released Release type Database minor version 2023-08-04 Self-Service PostgreSQL 15.2 Security patches CVE-2022-1796, CVE-2022-26365, CVE-2022-27652, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742, CVE-2022-36109, CVE-2022-36879, CVE-2022-42703, CVE-2022-4744, CVE-2023-0394, CVE-2023-0459, CVE-2023-1295, CVE-2023-1786, CVE-2023-1972, CVE-2023-2248, CVE-2023-23916, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2023-27534, CVE-2023-28484, CVE-2023-28842, CVE-2023-29469, CVE-2023-3006, CVE-2023-3268CVE- , CVE- , CVE- , and CVE
CVE-2022-1478: Use after free in SwiftShader- High CVE-2022-1479: Use after free in ANGLE- High CVE-2022-1480: Use after free in Device API- High CVE-2022-1481: Use after free in Sharing- High CVE-2022-1482: Ippropriate implementation in WebGL- High CVE-2022-1483: Heap buffer overflow in WebGPU- Medium CVE-2022-1484: Heap buffer overflow in Web UI Settings- Medium CVE-2022-1485: Use after free in File System API- Medium CVE-2022-1486: Type Confusion in V8- Medium CVE-2022-1487: Use after free in Ozone- Medium CVE-2022-1488: Ippropriate implementation in Extensions API- Medium CVE-2022-1489: Out of bounds memory access in UI Shelf- Medium CVE-2022-1490: Use after free in Browser Switcher- Medium CVE-2022-1491: Use after free in Bookmarks- Medium CVE-2022-1492: Insufficient data validation in Blink Editing- Medium CVE-2022-1493: Use after free in Dev Tools- Medium CVE-2022-1494: Insufficient data validation in Trusted Types- Medium CVE-2022-1495: Incorrect security UI in Downloads- Medium CVE-2022-1496: Use after free in File Mager- Medium CVE-2022-1497: Ippropriate implementation in Input- Low CVE-2022-1498: Ippropriate implementation in HTML Parser- Low CVE-2022-1499: Ippropriate implementation in WebAuthentication- TBD1223475 Low CVE-2022-1500: Insufficient data validation in Dev Tools- Low CVE-2022-1501: Ippropriate implementation in iframeVarious fixes from internal audits, fuzzing and other initiative:- Speculative fix for crashes in ScrollableArea::InjectGestureScrollEvent- Check for error when calling ComputeImageSizeInBytes- [M101] Ensure that thin testers do not set reclient properties- sheriff: Disable DiagnosticsAppWithInput.BrowserTest on ChromeOS- [Sheriff] Disable PolicyToPrefsMapping or ChromeOS dbg- [M101] Allow for setting try_settings without mirrors- ServiceImageTransferCacheEntry: Fix uninitialized values- Check Membership requests should only occur on fresh local state prefs- [M101][QrCode] Fix QR code icon not appearing in the omnibox for CrOS- Temporarily disable opening file:// on Android TM- [M101][infra] Create test specs for linux-blink-rel-dummy try builders- Don't consume user activation when opening windows in WebView- Aw: Add the missing ALGORITHMIC_DARKENING- [M101] stts: don't hold raw view->controller pointer- SessionRestore: Ensure locked profile sessions are not restored- Updating XTBs based on. CVE- 4135. Closed random-robbie opened this issue 1 comment Fixed by 4230. Closed CVE- 4135. random-robbie opened this issue 1 comment Fixed by 4230. Labels. nuclei-template Nuclei template contribution. Comments. Copy link Contributor.- CVE- , CVE- , CVE- , CVE - SAP
Upgrade to 3.39.4- AT actions API: Always expose default action at index 0- [M106] Clipboard paste: use browser-safe version of user activation- [CacheStorage] GetStorageKeys shouldn't rely on QuotaManagerProxy- [M106 merge] Make password fields spellcheck-disabled by default- [M106] Remove SERVICE_ACCOUNT_JSON from logdog wrapper- Add missing early return in RunLegacyDataUseMeasurment experiment- Updating XTBs based on .GRDs from branch 5249Google Chrome 106.0.5249.103- Change log not available for this versionGoogle Chrome 106.0.5249.91- Change log not available for this versionGoogle Chrome 106.0.5249.61Security Fixes:- High CVE-2022-3304: Use after free in CSS- High CVE-2022-3201: Insufficient validation of untrusted input in Developer Tools- High CVE-2022-3305: Use after free in Survey- High CVE-2022-3306: Use after free in Survey- High CVE-2022-3307: Use after free in Media- Medium CVE-2022-3308: Insufficient policy enforcement in Developer Tools- Medium CVE-2022-3309: Use after free in Assistant- Medium CVE-2022-3310: Insufficient policy enforcement in Custom Tabs- Medium CVE-2022-3311: Use after free in Import- Medium CVE-2022-3312: Insufficient validation of untrusted input in VPN- Medium CVE-2022-3313: Incorrect security UI in Full Screen- Medium CVE-2022-3314: Use after free in Logging- Medium CVE-2022-3315: Type confusion in Blink- Low CVE-2022-3316: Insufficient validation of untrusted input in Safe Browsing- Low CVE-2022-3317: Insufficient validation of untrusted input in Intents- Low CVE-2022-3318: Use after free in ChromeOS NotificationsAs usual, our ongoing internal security work was responsible for a wide range of fixes:- [1368115] Various fixes from internal audits, fuzzing and other initiativesGoogle Chrome 105.0.5195.127Security Fixes and Rewards:- High CVE-2022-3195: Out of bounds write in Storage- High CVE-2022-3196: Use after free in PDF- High CVE-2022-3197: Use after free in PDF- High CVE-2022-3198: Use after free in PDF- High CVE-2022-3199: Use after free in Frames- High CVE-2022-3200: Heap buffer overflow in Internals- High CVE-2022-3201: Insufficient validation of untrusted input in DevToolsAs usual, our ongoing internal security work was responsible for a wide range of fixes:- [1363148] VariousComments
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated user to send specially crafted packets to cause a denial of service from excessive memory usage. Published 2020-02-19 16:15:12 Updated 2022-01-01 19:38:43 Vulnerability category: Denial of service Products affected by CVE-2020-4135cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:ibm:db2:11.5:*:*:*:*:*:*:*When used together with: IBM » AIX » Version: N/A When used together with: Linux » Linux Kernel » Version: N/A When used together with: Microsoft » Windows » Version: N/A cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* Exploit prediction scoring system (EPSS) score for CVE-2020-4135 ~ 69 % Percentile, the proportion of vulnerabilities that are scored at or less CVSS scores for CVE-2020-4135 References for CVE-2020-4135 IBM DB2 denial of service CVE-2020-4135 Vulnerability Report VDB Entry;Vendor Advisory CVE-2020-4135 IBM DB2
2025-04-02In Blink Media- High CVE-2022-4437: Use after free in Mojo IPC- High CVE-2022-4438: Use after free in Blink Frames- High CVE-2022-4439: Use after free in Aura- Medium CVE-2022-4440: Use after free in ProfilesAs usual, our ongoing internal security work was responsible for a wide range of fixes:- [1400487] Various fixes from internal audits, fuzzing and other initiativesGoogle Chrome 108.0.5339.98- Change log not available for this versionGoogle Chrome 108.0.5339.94Security fixes:- Type Confusion in V8Google Chrome 108.0.5339.71Security Fixes:- High CVE-2022-4174: Type Confusion in V8- High CVE-2022-4175: Use after free in Camera Capture- High CVE-2022-4176: Out of bounds write in Lacros Graphics- High CVE-2022-4177: Use after free in Extensions- High CVE-2022-4178: Use after free in Mojo- High CVE-2022-4179: Use after free in Audio- High CVE-2022-4180: Use after free in Mojo- High CVE-2022-4181: Use after free in Forms- Medium CVE-2022-4182: Inappropriate implementation in Fenced Frames- Medium CVE-2022-4183: Insufficient policy enforcement in Popup Blocker- Medium CVE-2022-4184: Insufficient policy enforcement in Autofill- Medium CVE-2022-4185: Inappropriate implementation in Navigation- Medium CVE-2022-4186: Insufficient validation of untrusted input in Downloads- Medium CVE-2022-4187: Insufficient policy enforcement in DevTools- Medium CVE-2022-4188: Insufficient validation of untrusted input in CORS- Medium CVE-2022-4189: Insufficient policy enforcement in DevTools- Medium CVE-2022-4190: Insufficient data validation in Directory- Medium CVE-2022-4191: Use after free in Sign-In- Medium CVE-2022-4192: Use after free in Live Caption- Medium CVE-2022-4193: Insufficient policy enforcement in File System API- Medium CVE-2022-4194: Use after free in Accessibility- Medium CVE-2022-4195: Insufficient policy enforcement in Safe BrowsingAs usual, our ongoing internal security work was responsible for a wide range of fixes- [1394280] Various fixes from internal audits, fuzzing and other initiativeGoogle Chrome 107.0.5304.121Security fixes:- High CVE-2022-4135: Heap buffer overflow in GPUGoogle Chrome 107.0.5304.110Security Fixes and Rewards:- High CVE-2022-3885: Use after free in V8- High CVE-2022-3886: Use after free in Speech Recognition- High CVE-2022-3887: Use after free in
2025-04-08SynopsisA web browser installed on the remote Windows host is affected by a vulnerability.DescriptionThe version of Google Chrome installed on the remote Windows host is prior to 107.0.5304.121. It is, therefore, affected by a vulnerability as referenced in the 2022_11_stable-channel-update-for-desktop_24 advisory. - Heap buffer overflow in GPU. (CVE-2022-4135)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.SolutionUpgrade to Google Chrome version 107.0.5304.121 or later.See Also DetailsSeverity: CriticalID: 168181File Name: google_chrome_107_0_5304_121.naslVersion: 1.9Type: localAgent: windowsPublished: 11/24/2022Updated: 9/20/2023Configuration: Enable thorough checksSupported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, NessusRisk InformationVPRRisk Factor: HighScore: 8.1CVSS v2Risk Factor: CriticalBase Score: 10Temporal Score: 8.7Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:CCVSS v3Risk Factor: CriticalBase Score: 9.6Temporal Score: 9.2Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HTemporal Vector: CVSS:3.0/E:H/RL:O/RC:CVulnerability InformationCPE: cpe:/a:google:chromeRequired KB Items: SMB/Google_Chrome/InstalledExploit Available: trueExploit Ease: Exploits are availablePatch Publication Date: 11/24/2022Vulnerability Publication Date: 11/24/2022CISA Known Exploited Vulnerability Due Dates: 12/19/2022Reference InformationCVE: CVE-2022-4135IAVA: 2022-A-0482-S, 2022-A-0501-S
2025-04-06