Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
- An uninitialized use vulnerability in PDFium can be exploited to obtain sensitive information.
- An implementation vulnerability in performance APIs can be exploited to cause denial of service.
- A policy enforcement vulnerability in payments can be exploited to bypass security restrictions.
- A heap buffer overflow vulnerability in TabStrip can be exploited to cause denial of service.
- An implementation vulnerability in Referrer can be exploited to cause denial of service.
- An implementation vulnerability in Site isolation can be exploited to cause denial of service.
- An out of bounds memory access vulnerability in V8 can be exploited to bypass security restrictions.
- A data validation vulnerability in Reader Mode can be exploited to bypass security restrictions.
- An implementation vulnerability in Compositing can be exploited to cause denial of service.
- An object lifecycle vulnerability in audio component can be exploited to bypass security restrictions.
- A security UI vulnerability in TabStrip and Navigation canbe exploited to spoof user interface.
- A data validation vulnerability in Chrome for iOS can be exploited to bypass security restrictions.
- A heap buffer overflow vulnerability in OpenJPEG can be exploited to cause denial of service.
- A heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
- A use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- An information leakage vulnerability in Network Internals can be exploited to obtain sensitive information.
- A policy enforcement vulnerability in navigations can be exploited to bypass security restrictions.
- A use after free vulnerability in bookmarks can be exploited to cause denial of service or execute arbitrary code.
- A policy enforcement vulnerability in autofill component can be exploited to bypass security restrictions.
- An implementation vulnerability in full screen mode can be exploited to cause denial of service.
- A use after free vulnerability in tab search component can be exploited to cause denial of service or execute arbitrary code.
- A security UI vulnerability in Loader canbe exploited to spoof user interface.
- A policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
- A use after free vulnerability in Network Internals can be exploited to cause denial of service or execute arbitrary code.
- An information leakage vulnerability in autofill component can be exploited to obtain sensitive information.
- A policy enforcement vulnerability in QR can be exploited to bypass security restrictions.
- A use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- A policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
- A data validation vulnerability in URL formatting can be exploited to bypass security restrictions.
- A policy enforcement vulnerability in appcache component can be exploited to bypass security restrictions.
Original advisories
- CVE-2021-21184
- CVE-2021-21189
- CVE-2021-21159
- CVE-2021-21174
- CVE-2021-21175
- CVE-2021-21169
- CVE-2021-21163
- CVE-2021-21178
- CVE-2021-21166
- CVE-2021-21171
- CVE-2021-21164
- CVE-2020-27844
- CVE-2021-21160
- CVE-2021-21188
- CVE-2021-21173
- CVE-2021-21182
- CVE-2021-21165
- CVE-2021-21183
- CVE-2021-21161
- CVE-2021-21167
- CVE-2021-21177
- CVE-2021-21176
- CVE-2021-21180
- CVE-2021-21170
- CVE-2021-21172
- CVE-2021-21179
- CVE-2021-21181
- CVE-2021-21186
- CVE-2021-21162
- CVE-2021-21185
- CVE-2021-21187
- CVE-2021-21168
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2020-27844 critical
- CVE-2021-21159 critical
- CVE-2021-21160 critical
- CVE-2021-21161 critical
- CVE-2021-21162 critical
- CVE-2021-21163 high
- CVE-2021-21164 high
- CVE-2021-21165 critical
- CVE-2021-21166 critical
- CVE-2021-21167 critical
- CVE-2021-21168 high
- CVE-2021-21169 critical
- CVE-2021-21170 high
- CVE-2021-21171 high
- CVE-2021-21172 critical
- CVE-2021-21173 high
- CVE-2021-21174 critical
- CVE-2021-21175 high
- CVE-2021-21176 high
- CVE-2021-21177 high
- CVE-2021-21178 high
- CVE-2021-21179 critical
- CVE-2021-21180 critical
- CVE-2021-21181 high
- CVE-2021-21182 high
- CVE-2021-21183 warning
- CVE-2021-21184 warning
- CVE-2021-21185 warning
- CVE-2021-21186 warning
- CVE-2021-21187 warning
- CVE-2021-21188 critical
- CVE-2021-21189 warning
- CVE-2021-21190 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!