Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Navigation can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Download can be exploited to cause denial of service.
- Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
Fiches de renseignement originales
- CVE-2024-1669
- CVE-2024-26188
- CVE-2024-21423
- CVE-2024-1670
- CVE-2024-26192
- CVE-2024-1674
- CVE-2024-1671
- CVE-2024-1673
- CVE-2024-1675
- CVE-2024-1672
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2024-1672 high
- CVE-2024-1676 high
- CVE-2024-1674 critical
- CVE-2024-1670 critical
- CVE-2024-1675 critical
- CVE-2024-1673 critical
- CVE-2024-1671 high
- CVE-2024-1669 critical
- CVE-2024-26188 warning
- CVE-2024-21423 warning
- CVE-2024-26192 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !