Açıklama
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
- Use after free vulnerability in WebSQL can be exploited to cause denial of service or execute arbitrary code.
- A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
- Policy enforcement vulnerability in Extensions API can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in V8 can be exploited to cause denial of service.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in Sign-In Flow can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in iframe Sandbox can be exploited to cause denial of service.
- Use after free vulnerability in Browser tag can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Use after free vulnerability in Layout can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Passwords can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Content Security Policy can be exploited to cause denial of service.
- Use after free vulnerability in Network Service can be exploited to cause denial of service or execute arbitrary code.
Orijinal öneriler
- CVE-2022-3039
- CVE-2022-3041
- CVE-2022-38012
- CVE-2022-3047
- CVE-2022-3045
- CVE-2022-3054
- CVE-2022-3058
- CVE-2022-3057
- CVE-2022-3046
- CVE-2022-3044
- CVE-2022-3040
- CVE-2022-3055
- CVE-2022-3056
- CVE-2022-3038
Kötüye kullanma
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
İlgili ürünler
CVE Listesi
- CVE-2022-3040 critical
- CVE-2022-3045 critical
- CVE-2022-3054 high
- CVE-2022-3053 warning
- CVE-2022-3046 critical
- CVE-2022-3057 high
- CVE-2022-3038 critical
- CVE-2022-3047 high
- CVE-2022-3058 critical
- CVE-2022-3055 critical
- CVE-2022-3039 critical
- CVE-2022-3044 high
- CVE-2022-3041 critical
- CVE-2022-3056 high
- CVE-2022-38012 critical
KB Listesi
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!