Descrição
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in full screen can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in compositing can be exploited to cause denial of service.
- Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in developer tools area can be exploited to bypass security restrictions.
Comunicados originais
- CVE-2022-1307
- CVE-2022-1364
- CVE-2022-1305
- CVE-2022-29144
- CVE-2022-1313
- CVE-2022-1306
- CVE-2022-1310
- CVE-2022-1309
- CVE-2022-1312
- CVE-2022-1314
Exploração
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
Lista de CVE
- CVE-2022-1305 critical
- CVE-2022-1313 critical
- CVE-2022-1309 critical
- CVE-2022-1312 critical
- CVE-2022-1314 critical
- CVE-2022-1308 critical
- CVE-2022-1310 critical
- CVE-2022-1307 warning
- CVE-2022-1306 warning
- CVE-2022-1364 critical
- CVE-2022-29144 critical
Lista de KB
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!