Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in V8 can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge for Android can be exploited remotely to spoof user interface.
- Out of bounds memory access vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in FedCM can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2024-2173 unknown
- CVE-2024-2176 unknown
- CVE-2024-2174 unknown
- CVE-2024-26167 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!