Language:
http://www.nessus.org/u?26b297b9
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41115
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4174
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4175
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4177
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4178
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4179
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4180
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4181
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4182
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4183
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4184
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4185
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4186
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4187
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4188
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4189
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4190
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4191
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4192
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4193
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4194
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4195
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4262
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44688
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44708
Severity: High
ID: 168406
File Name: microsoft_edge_chromium_108_0_1462_41.nasl
Version: 1.8
Type: local
Agent: windows
Family: Windows
Published: 12/5/2022
Updated: 9/20/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: High
Score: 8.1
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-4262
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:microsoft:edge
Required KB Items: SMB/Registry/Enumerated, installed_sw/Microsoft Edge (Chromium)
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/5/2022
Vulnerability Publication Date: 11/29/2022
CISA Known Exploited Vulnerability Due Dates: 12/26/2022
CVE: CVE-2022-41115, CVE-2022-4174, CVE-2022-4175, CVE-2022-4177, CVE-2022-4178, CVE-2022-4179, CVE-2022-4180, CVE-2022-4181, CVE-2022-4182, CVE-2022-4183, CVE-2022-4184, CVE-2022-4185, CVE-2022-4186, CVE-2022-4187, CVE-2022-4188, CVE-2022-4189, CVE-2022-4190, CVE-2022-4191, CVE-2022-4192, CVE-2022-4193, CVE-2022-4194, CVE-2022-4195, CVE-2022-4262, CVE-2022-44688, CVE-2022-44708
IAVA: 2022-A-0507-S, 2022-A-0510-S