Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in full screen can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in compositing can be exploited to cause denial of service.
- Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in developer tools area can be exploited to bypass security restrictions.
Original advisories
- CVE-2022-1307
- CVE-2022-1364
- CVE-2022-1305
- CVE-2022-29144
- CVE-2022-1313
- CVE-2022-1306
- CVE-2022-1310
- CVE-2022-1309
- CVE-2022-1312
- CVE-2022-1314
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2022-1305 critical
- CVE-2022-1313 critical
- CVE-2022-1309 critical
- CVE-2022-1312 critical
- CVE-2022-1314 critical
- CVE-2022-1308 critical
- CVE-2022-1310 critical
- CVE-2022-1307 warning
- CVE-2022-1306 warning
- CVE-2022-1364 critical
- CVE-2022-29144 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!