Beschreibung
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
- Use after free vulnerability in WebSQL can be exploited to cause denial of service or execute arbitrary code.
- A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
- Policy enforcement vulnerability in Extensions API can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in V8 can be exploited to cause denial of service.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in Sign-In Flow can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in iframe Sandbox can be exploited to cause denial of service.
- Use after free vulnerability in Browser tag can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Use after free vulnerability in Layout can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Passwords can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Content Security Policy can be exploited to cause denial of service.
- Use after free vulnerability in Network Service can be exploited to cause denial of service or execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2022-3039
- CVE-2022-3041
- CVE-2022-38012
- CVE-2022-3047
- CVE-2022-3045
- CVE-2022-3054
- CVE-2022-3058
- CVE-2022-3057
- CVE-2022-3046
- CVE-2022-3044
- CVE-2022-3040
- CVE-2022-3055
- CVE-2022-3056
- CVE-2022-3038
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2022-3040 critical
- CVE-2022-3045 critical
- CVE-2022-3054 high
- CVE-2022-3053 warning
- CVE-2022-3046 critical
- CVE-2022-3057 high
- CVE-2022-3038 critical
- CVE-2022-3047 high
- CVE-2022-3058 critical
- CVE-2022-3055 critical
- CVE-2022-3039 critical
- CVE-2022-3044 high
- CVE-2022-3041 critical
- CVE-2022-3056 high
- CVE-2022-38012 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!