Descripción
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Navigation can be exploited to cause denial of service.
- Out of bounds memory access vulnerability in Blink can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Site Isolation can be exploited to cause denial of service.
- Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in Download can be exploited to cause denial of service.
- Implementation vulnerability in Content Security Policy can be exploited to cause denial of service.
Notas informativas originales
- CVE-2024-1669
- CVE-2024-26188
- CVE-2024-21423
- CVE-2024-1670
- CVE-2024-26192
- CVE-2024-1674
- CVE-2024-1671
- CVE-2024-1673
- CVE-2024-1675
- CVE-2024-1672
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2024-1672 high
- CVE-2024-1676 high
- CVE-2024-1674 critical
- CVE-2024-1670 critical
- CVE-2024-1675 critical
- CVE-2024-1673 critical
- CVE-2024-1671 high
- CVE-2024-1669 critical
- CVE-2024-26188 warning
- CVE-2024-21423 warning
- CVE-2024-26192 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!