Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Visuals can be exploited to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2024-4558 unknown
- CVE-2024-4559 unknown
- CVE-2024-30055 high
- CVE-2024-4671 unknown
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!