Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-1497

Опубликовано: 28 апр. 2022
Источник: msrc
EPSS Низкий

Описание

Chromium: CVE-2022-1497 Inappropriate implementation in Input

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

FAQ

What is the version information for this release?

Microsoft Edge VersionDate ReleasedBased on Chromium Version
101.0.1210.324/28/2022101.0.4951.41

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

EPSS

Процентиль: 40%
0.00182
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

Inappropriate implementation in Input in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to spoof the contents of cross-origin websites via a crafted HTML page.

CVSS3: 6.5
nvd
больше 3 лет назад

Inappropriate implementation in Input in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to spoof the contents of cross-origin websites via a crafted HTML page.

CVSS3: 6.5
debian
больше 3 лет назад

Inappropriate implementation in Input in Google Chrome prior to 101.0. ...

CVSS3: 6.5
github
больше 3 лет назад

Inappropriate implementation in Input in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to spoof the contents of cross-origin websites via a crafted HTML page.

CVSS3: 8.1
fstec
почти 4 года назад

Уязвимость браузеров Microsoft Edge и Google Chrome, связанная с неправильно реализованной проверкой безопасности для стандартных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных

EPSS

Процентиль: 40%
0.00182
Низкий