Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in web packaging can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Task Manager can be exploited to execute arbitrary code or cause denial of service.
- Use after free vulnerability in safe browsing can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Storage can be exploited to cause denial of service.
- Race condition vulnerability in GPU Watchdog can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in PDFium can be exploited to execute arbitrary code or cause denial of service.
- Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Implementation vulnerability in Service Worker API can be exploited to cause denial of service.
- Use after free vulnerability in Optimization Guide can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Data Transfer can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in site isolation can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Scheduling can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Printing can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Fenced Frames can be exploited to cause denial of service.
- Implementation vulnerability in push messaging can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in DevTools can be exploited to execute arbitrary code or cause denial of service.
- Use after free vulnerability in Text Input Method Editor can be exploited to cause denial of service or execute arbitrary code.
Original advisories
- CVE-2022-0311
- CVE-2022-0289
- CVE-2022-0310
- CVE-2022-0291
- CVE-2022-0303
- CVE-2022-0306
- CVE-2022-0302
- CVE-2022-0304
- CVE-2022-0297
- CVE-2022-0309
- CVE-2022-0305
- CVE-2022-0307
- CVE-2022-0295
- CVE-2022-0308
- CVE-2022-0290
- CVE-2022-0298
- CVE-2022-0296
- CVE-2022-0292
- CVE-2022-0294
- CVE-2022-0301
- CVE-2022-0300
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2022-0305 high
- CVE-2022-0306 critical
- CVE-2022-0293 critical
- CVE-2022-0298 critical
- CVE-2022-0290 critical
- CVE-2022-0296 critical
- CVE-2022-0307 critical
- CVE-2022-0304 critical
- CVE-2022-0302 critical
- CVE-2022-0310 critical
- CVE-2022-0308 critical
- CVE-2022-0294 high
- CVE-2022-0303 warning
- CVE-2022-0301 critical
- CVE-2022-0289 critical
- CVE-2022-0311 critical
- CVE-2022-0295 critical
- CVE-2022-0292 high
- CVE-2022-0300 critical
- CVE-2022-0291 high
- CVE-2022-0297 critical
- CVE-2022-0309 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!