Kaspersky ID:
KLA12107
Detect Date:
03/04/2021
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, spoof user interface, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An uninitialized use vulnerability in PDFium can be exploited to obtain sensitive information.
  2. An implementation vulnerability in performance APIs can be exploited to cause denial of service.
  3. A policy enforcement vulnerability in payments can be exploited to bypass security restrictions.
  4. A heap buffer overflow vulnerability in TabStrip can be exploited to cause denial of service.
  5. An implementation vulnerability in Referrer can be exploited to cause denial of service.
  6. An implementation vulnerability in Site isolation can be exploited to cause denial of service.
  7. An out of bounds memory access vulnerability in V8 can be exploited to bypass security restrictions.
  8. A data validation vulnerability in Reader Mode can be exploited to bypass security restrictions.
  9. An implementation vulnerability in Compositing can be exploited to cause denial of service.
  10. An object lifecycle vulnerability in audio component can be exploited to bypass security restrictions.
  11. A security UI vulnerability in TabStrip and Navigation canbe exploited to spoof user interface.
  12. A data validation vulnerability in Chrome for iOS can be exploited to bypass security restrictions.
  13. A heap buffer overflow vulnerability in OpenJPEG can be exploited to cause denial of service.
  14. A heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
  15. A use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
  16. An information leakage vulnerability in Network Internals can be exploited to obtain sensitive information.
  17. A policy enforcement vulnerability in navigations can be exploited to bypass security restrictions.
  18. A use after free vulnerability in bookmarks can be exploited to cause denial of service or execute arbitrary code.
  19. A policy enforcement vulnerability in autofill component can be exploited to bypass security restrictions.
  20. An implementation vulnerability in full screen mode can be exploited to cause denial of service.
  21. A use after free vulnerability in tab search component can be exploited to cause denial of service or execute arbitrary code.
  22. A security UI vulnerability in Loader canbe exploited to spoof user interface.
  23. A policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
  24. A use after free vulnerability in Network Internals can be exploited to cause denial of service or execute arbitrary code.
  25. An information leakage vulnerability in autofill component can be exploited to obtain sensitive information.
  26. A policy enforcement vulnerability in QR can be exploited to bypass security restrictions.
  27. A use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  28. A policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  29. A data validation vulnerability in URL formatting can be exploited to bypass security restrictions.
  30. A policy enforcement vulnerability in appcache component can be exploited to bypass security restrictions.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2020-27844
    critical
  • CVE-2021-21159
    critical
  • CVE-2021-21160
    critical
  • CVE-2021-21161
    critical
  • CVE-2021-21162
    critical
  • CVE-2021-21163
    high
  • CVE-2021-21164
    high
  • CVE-2021-21165
    critical
  • CVE-2021-21166
    critical
  • CVE-2021-21167
    critical
  • CVE-2021-21168
    high
  • CVE-2021-21169
    critical
  • CVE-2021-21170
    high
  • CVE-2021-21171
    high
  • CVE-2021-21172
    critical
  • CVE-2021-21173
    high
  • CVE-2021-21174
    critical
  • CVE-2021-21175
    high
  • CVE-2021-21176
    high
  • CVE-2021-21177
    high
  • CVE-2021-21178
    high
  • CVE-2021-21179
    critical
  • CVE-2021-21180
    critical
  • CVE-2021-21181
    high
  • CVE-2021-21182
    high
  • CVE-2021-21183
    warning
  • CVE-2021-21184
    warning
  • CVE-2021-21185
    warning
  • CVE-2021-21186
    warning
  • CVE-2021-21187
    warning
  • CVE-2021-21188
    critical
  • CVE-2021-21189
    warning
  • CVE-2021-21190
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.