Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Edge for Android (Chromium-based) can be exploited remotely to obtain sensitive information.
- Policy enforcement vulnerability in Site Isolation can be exploited to cause denial of service.
- Data validation vulnerability in Downloads can be exploited to cause denial of service.
- Data validation vulnerability in Browser Switcher can be exploited to cause denial of service.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Object corruption vulnerability in V8 can be exploited to cause denial of service.
- Object corruption vulnerability in WebAssembly can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Prompts can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Policy enforcement vulnerability in WebUI can be exploited to cause denial of service.
- Out of bounds read vulnerability in Fonts can be exploited to cause denial of service.
- Implementation vulnerability in Network can be exploited to cause denial of service.
- Implementation vulnerability in Extensions can be exploited to cause denial of service.
- Use after free vulnerability in QUIC can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Downloads can be exploited to cause denial of service or execute arbitrary code.
Original advisories
- CVE-2024-3840
- CVE-2024-3843
- CVE-2024-3841
- CVE-2024-3838
- CVE-2024-3832
- CVE-2024-3833
- CVE-2024-3914
- CVE-2024-3846
- CVE-2024-29987
- CVE-2024-3847
- CVE-2024-3839
- CVE-2024-3845
- CVE-2024-3844
- CVE-2024-3837
- CVE-2024-3834
Related products
CVE list
- CVE-2024-3838 unknown
- CVE-2024-3844 unknown
- CVE-2024-3837 unknown
- CVE-2024-3846 unknown
- CVE-2024-3832 unknown
- CVE-2024-3843 unknown
- CVE-2024-3847 unknown
- CVE-2024-3914 unknown
- CVE-2024-3845 unknown
- CVE-2024-3841 unknown
- CVE-2024-3833 unknown
- CVE-2024-3840 unknown
- CVE-2024-3839 unknown
- CVE-2024-3834 unknown
- CVE-2024-29986 high
- CVE-2024-29987 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!