CVE-2022-4192
Gentoo Linux Security Advisory 202311-11
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use after free in Live Caption in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: Medium)
Use-After-Free en Live Caption en Google Chrome anterior a la versión 108.0.5359.71 permitía a un atacante remotoque ha convencido a un usuario de participar en una interacción de interfaz de usuario específica para explotar potencialmente la corrupción del heap a través de la interacción de interfaz de usuario. (Severidad de seguridad de Chromium: media)
Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution. Versions greater than or equal to 5.15.10_p20230623 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-11-29 CVE Reserved
- 2022-11-29 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html | 2023-11-25 | |
https://security.gentoo.org/glsa/202305-10 | 2023-11-25 | |
https://security.gentoo.org/glsa/202311-11 | 2023-11-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 108.0.5359.71 Search vendor "Google" for product "Chrome" and version " < 108.0.5359.71" | - |
Affected
|