Descripción
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, spoof user interface, gain privileges, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Policy enforcement vulnerability in Downloads can be exploited to cause denial of service.
- Implementation vulnerability in Custom Mobile Tabs can be exploited to cause denial of service.
- Implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Implementation vulnerability in Picture can be exploited to cause denial of service.
- Implementation vulnerability in Interstitials can be exploited to cause denial of service.
- Policy enforcement vulnerability in Autofill can be exploited to cause denial of service.
- Implementation vulnerability in Prompts can be exploited to cause denial of service.
- Implementation vulnerability in Intents can be exploited to cause denial of service.
- Implementation vulnerability in Input can be exploited to cause denial of service.
Notas informativas originales
- CVE-2023-4903
- CVE-2023-4900
- CVE-2023-36735
- CVE-2023-36727
- CVE-2023-36562
- CVE-2023-4908
- CVE-2023-4909
- CVE-2023-4906
- CVE-2023-4901
- CVE-2023-4907
- CVE-2023-4905
- CVE-2023-4902
Productos relacionados
Lista CVE
- CVE-2023-4902 warning
- CVE-2023-4906 warning
- CVE-2023-4900 warning
- CVE-2023-4907 warning
- CVE-2023-4905 warning
- CVE-2023-4904 warning
- CVE-2023-4901 warning
- CVE-2023-4908 warning
- CVE-2023-4909 warning
- CVE-2023-4903 warning
- CVE-2023-36735 critical
- CVE-2023-36727 high
- CVE-2023-36562 high
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!