Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in File System API can be exploited to cause denial of service.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
- Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in COOP can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
- Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
Fiches de renseignement originales
- CVE-2022-30127
- CVE-2022-1856
- CVE-2022-1857
- CVE-2022-1863
- CVE-2022-1853
- CVE-2022-1872
- CVE-2022-1865
- CVE-2022-1874
- CVE-2022-1871
- CVE-2022-26905
- CVE-2022-1855
- CVE-2022-1869
- CVE-2022-1859
- CVE-2022-1870
- CVE-2022-1854
- CVE-2022-1873
- CVE-2022-1875
- CVE-2022-1858
- CVE-2022-1864
- CVE-2022-1867
- CVE-2022-30128
- CVE-2022-1876
- CVE-2022-1862
Exploitation
Public exploits exist for this vulnerability.
Produits associés
Liste CVE
- CVE-2022-1862 high
- CVE-2022-1865 critical
- CVE-2022-1867 high
- CVE-2022-1871 warning
- CVE-2022-1857 critical
- CVE-2022-1872 warning
- CVE-2022-1873 high
- CVE-2022-1868 high
- CVE-2022-1858 high
- CVE-2022-1859 critical
- CVE-2022-1863 critical
- CVE-2022-1874 critical
- CVE-2022-1855 critical
- CVE-2022-1876 critical
- CVE-2022-1869 high
- CVE-2022-1870 critical
- CVE-2022-1853 critical
- CVE-2022-1854 critical
- CVE-2022-1856 critical
- CVE-2022-1875 warning
- CVE-2022-1864 critical
- CVE-2022-30127 critical
- CVE-2022-26905 warning
- CVE-2022-30128 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !