Kaspersky ID:
KLA12519
Дата обнаружения:
28/04/2022
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
  2. Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
  3. Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
  4. Implementation vulnerability in WebGL can be exploited to cause denial of service.
  5. Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
  7. Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
  8. Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
  9. Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
  10. Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
  11. Implementation vulnerability in Extensions API can be exploited to cause denial of service.
  12. Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
  14. Implementation vulnerability in Input can be exploited to cause denial of service.
  15. Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
  16. Implementation vulnerability in iframe can be exploited to cause denial of service.
  17. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
  19. Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
  20. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  21. Elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  22. Spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
  23. Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
  24. Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
  25. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2022-1497
    warning
  • CVE-2022-1490
    warning
  • CVE-2022-1477
    warning
  • CVE-2022-1482
    warning
  • CVE-2022-1487
    warning
  • CVE-2022-1488
    warning
  • CVE-2022-1478
    warning
  • CVE-2022-1485
    warning
  • CVE-2022-1500
    warning
  • CVE-2022-1491
    warning
  • CVE-2022-1492
    warning
  • CVE-2022-1495
    warning
  • CVE-2022-1481
    warning
  • CVE-2022-1483
    warning
  • CVE-2022-1486
    warning
  • CVE-2022-1494
    warning
  • CVE-2022-1484
    warning
  • CVE-2022-1493
    warning
  • CVE-2022-1501
    warning
  • CVE-2022-1479
    warning
  • CVE-2022-1498
    warning
  • CVE-2022-1480
    warning
  • CVE-2022-1499
    warning
  • CVE-2022-29146
    warning
  • CVE-2022-29147
    warning

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Узнай больше об угрозах и векторах атаки на Энциклопедии Kaspersky
Бесплатно
Читать
Kaspersky Premium
Комплексное решение для защиты вашей цифровой жизни
Премиум
Скачать
Confirm changes?
Your message has been sent successfully.