Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Incognito can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in PDF Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in WebView can be exploited to cause denial of service.
- Use after free vulnerability in Network APIs can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Settings can be exploited to cause denial of service.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in WebAudio can be exploited to cause denial of service or obtain sensitive information.
- Implementation vulnerability in WebApp Installer can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Implementation vulnerability in iFrame Sandbox can be exploited to cause denial of service.
- Race condition vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
Original advisories
- CVE-2021-37981
- CVE-2021-37996
- CVE-2021-37993
- CVE-2021-37988
- CVE-2021-37984
- CVE-2021-37989
- CVE-2021-37990
- CVE-2021-37987
- CVE-2021-37986
- CVE-2021-37983
- CVE-2021-37992
- CVE-2021-37995
- CVE-2021-42307
- CVE-2021-37994
- CVE-2021-37991
- CVE-2021-37985
Related products
CVE list
- CVE-2021-37986 critical
- CVE-2021-37984 critical
- CVE-2021-37993 critical
- CVE-2021-37981 critical
- CVE-2021-37985 critical
- CVE-2021-37995 high
- CVE-2021-37991 critical
- CVE-2021-37983 critical
- CVE-2021-37989 high
- CVE-2021-37988 critical
- CVE-2021-37990 high
- CVE-2021-37994 high
- CVE-2021-37982 critical
- CVE-2021-37996 high
- CVE-2021-37992 critical
- CVE-2021-37987 critical
- CVE-2021-42307 warning
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!