Kaspersky ID:
KLA12513
検出日:
04/15/2022
更新日:
01/28/2026

説明

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
  2. Implementation vulnerability in full screen can be exploited to cause denial of service.
  3. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  4. Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
  5. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  6. Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
  7. Implementation vulnerability in compositing can be exploited to cause denial of service.
  8. Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
  9. Security vulnerability in developer tools area can be exploited to bypass security restrictions.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

関連製品

CVEリスト

  • CVE-2022-1305
    critical
  • CVE-2022-1313
    critical
  • CVE-2022-1309
    critical
  • CVE-2022-1312
    critical
  • CVE-2022-1314
    critical
  • CVE-2022-1308
    critical
  • CVE-2022-1310
    critical
  • CVE-2022-1307
    warning
  • CVE-2022-1306
    warning
  • CVE-2022-1364
    critical
  • CVE-2022-29144
    critical

KBリスト

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.