Beschreibung
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in HTML can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Safe can be exploited to bypass security restrictions.
- Use after free vulnerability in Downloads can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Loader can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Tabs can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in Frames can be exploited remotely to cause denial of service.
- Use after free vulnerability in CSS can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in FedCM can be exploited to cause denial of service.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Layout can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Fullscreen can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2024-6998
- CVE-2024-6989
- CVE-2024-6995
- CVE-2024-6991
- CVE-2024-38103
- CVE-2024-7001
- CVE-2024-6999
- CVE-2024-6994
- CVE-2024-6988
- CVE-2024-6996
- CVE-2024-7004
- CVE-2024-39379
- CVE-2024-7005
- CVE-2024-7000
- CVE-2024-7003
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2024-7001 warning
- CVE-2024-7005 warning
- CVE-2024-6988 critical
- CVE-2024-6989 critical
- CVE-2024-6997 critical
- CVE-2024-6996 warning
- CVE-2024-7000 critical
- CVE-2024-6999 warning
- CVE-2024-7004 warning
- CVE-2024-6998 critical
- CVE-2024-6991 critical
- CVE-2024-7003 warning
- CVE-2024-6994 critical
- CVE-2024-6995 warning
- CVE-2024-38103 high
- CVE-2024-39379 high
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!