Search for vulnerabilities
Vulnerability details: VCID-nccj-686e-aaah
Vulnerability ID VCID-nccj-686e-aaah
Aliases CVE-2022-0974
Summary Use after free in Splitscreen in Google Chrome on Chrome OS prior to 99.0.4844.74 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00391 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00484 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00484 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00484 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00484 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
epss 0.00548 https://api.first.org/data/v1/epss?cve=CVE-2022-0974
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-0974
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-0974
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-0974
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-0974
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.53979
EPSS Score 0.00343
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.