Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
- Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
- Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
- Implementation vulnerability in WebGL can be exploited to cause denial of service.
- Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
- Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
- Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
- Implementation vulnerability in Extensions API can be exploited to cause denial of service.
- Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Input can be exploited to cause denial of service.
- Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in iframe can be exploited to cause denial of service.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- Spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
- Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
- Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
Original advisories
- CVE-2022-1500
- CVE-2022-1494
- CVE-2022-1482
- CVE-2022-1478
- CVE-2022-1490
- CVE-2022-1498
- CVE-2022-1492
- CVE-2022-1491
- CVE-2022-1484
- CVE-2022-1488
- CVE-2022-1485
- CVE-2022-1493
- CVE-2022-1497
- CVE-2022-1477
- CVE-2022-1501
- CVE-2022-1479
- CVE-2022-1481
- CVE-2022-1495
- CVE-2022-1486
- CVE-2022-29146
- CVE-2022-29147
- CVE-2022-1483
- CVE-2022-1499
- CVE-2022-1487
Related products
CVE list
- CVE-2022-1497 high
- CVE-2022-1490 critical
- CVE-2022-1477 critical
- CVE-2022-1482 high
- CVE-2022-1487 critical
- CVE-2022-1488 warning
- CVE-2022-1478 critical
- CVE-2022-1485 critical
- CVE-2022-1500 high
- CVE-2022-1491 critical
- CVE-2022-1492 high
- CVE-2022-1495 warning
- CVE-2022-1481 critical
- CVE-2022-1483 critical
- CVE-2022-1486 critical
- CVE-2022-1494 high
- CVE-2022-1484 critical
- CVE-2022-1493 critical
- CVE-2022-1501 high
- CVE-2022-1479 critical
- CVE-2022-1498 warning
- CVE-2022-1480 warning
- CVE-2022-1499 high
- CVE-2022-29146 critical
- CVE-2022-29147 warning
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!