Kaspersky ID:
KLA77144
Detect Date:
11/14/2024
Updated:
03/19/2026

Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, gain privileges, execute arbitrary code, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Inappropriate implementation vulnerability in Autofill can be exploited to cause denial of service.
  2. Inappropriate implementation vulnerability in Paint can be exploited to cause denial of service.
  3. Inappropriate implementation vulnerability in Blink can be exploited to cause denial of service.
  4. Insufficient policy enforcement vulnerability in Navigation can be exploited to bypass security restrictions.
  5. Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  7. An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
  8. Inappropriate implementation vulnerability in Views can be exploited to cause denial of service.
 
 

 

 

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2024-11111
    warning
  • CVE-2024-11110
    high
  • CVE-2024-11114
    critical
  • CVE-2024-11112
    critical
  • CVE-2024-11116
    warning
  • CVE-2024-11113
    critical
  • CVE-2024-11117
    warning
  • CVE-2024-11115
    critical
  • CVE-2024-49025
    warning

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Do you want to save your changes?
Your message has been sent successfully.