Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in full screen can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in compositing can be exploited to cause denial of service.
- Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in developer tools area can be exploited to bypass security restrictions.
Fiches de renseignement originales
- CVE-2022-1307
- CVE-2022-1364
- CVE-2022-1305
- CVE-2022-29144
- CVE-2022-1313
- CVE-2022-1306
- CVE-2022-1310
- CVE-2022-1309
- CVE-2022-1312
- CVE-2022-1314
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2022-1305 critical
- CVE-2022-1313 critical
- CVE-2022-1309 critical
- CVE-2022-1312 critical
- CVE-2022-1314 critical
- CVE-2022-1308 critical
- CVE-2022-1310 critical
- CVE-2022-1307 warning
- CVE-2022-1306 warning
- CVE-2022-1364 critical
- CVE-2022-29144 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !