
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2022-4919) was discovered in Base Internals component of Google Chrome versions prior to 101.0.4951.41. The vulnerability was reported by a researcher named Sri on April 1, 2022, and was patched in the stable channel update released on April 26, 2022 (Chrome Release).
The vulnerability is classified as a use-after-free issue in the Base Internals component of Chrome. It has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability could be exploited through a crafted HTML page, allowing a remote attacker to perform arbitrary read/write operations (NVD).
If successfully exploited, this vulnerability could allow an attacker to perform arbitrary read and write operations, potentially leading to code execution within the context of the browser. The high CVSS score indicates that successful exploitation could result in significant impact to confidentiality, integrity, and availability of the affected system (NVD).
Google released a fix for this vulnerability in Chrome version 101.0.4951.41. Users are advised to update their Chrome browser to this version or later to mitigate the risk. The fix was also incorporated into Chromium-based browsers and distributed through various Linux distributions like Fedora (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."