Descripción
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Out of bounds read vulnerability in WebRTC can be exploited to cause denial of service.
- Type confusion vulnerability in Data Transfer can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in WebUI can be exploited to cause denial of service.
- Type confusion vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in GPU can be exploited to cause denial of service or execute arbitrary code.
- A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
- Implementation vulnerability in Download can be exploited to cause denial of service.
- Integer overflow vulnerability in Core can be exploited to cause execute arbitrary code and denial of service.
- Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Implementation vulnerability in Full screen mode can be exploited to cause denial of service.
Notas informativas originales
- CVE-2023-0702
- CVE-2023-0701
- CVE-2023-0703
- CVE-2023-0699
- CVE-2023-23374
- CVE-2023-0700
- CVE-2023-0705
- CVE-2023-0704
- CVE-2023-0696
- CVE-2023-21794
- CVE-2023-0697
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2023-0697 high
- CVE-2023-0705 critical
- CVE-2023-0696 critical
- CVE-2023-0702 critical
- CVE-2023-0700 high
- CVE-2023-0698 critical
- CVE-2023-0701 critical
- CVE-2023-0703 critical
- CVE-2023-0704 high
- CVE-2023-0699 critical
- CVE-2023-23374 critical
- CVE-2023-21794 warning
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!