Descripción
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Heap buffer overflow vulnerability in Tab Strip can be exploited to cause denial of service.
- Use after free vulnerability in PDFium can be exploited to cause denial of service or execute arbitrary code.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in Dawn can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
- A spoofing vulnerability in Microsoft Edge for iOS can be exploited remotely to spoof user interface.
- Security vulnerability in CORS can be exploited to bypass security restrictions.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Downloads can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in DevTools can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Memory Allocator can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in Tab Groups can be exploited to cause denial of service.
- Use after free vulnerability in Audio can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Browser UI can be exploited to cause denial of service or execute arbitrary code.
Notas informativas originales
- CVE-2024-5847
- CVE-2024-38083
- CVE-2024-5831
- CVE-2024-5834
- CVE-2024-5846
- CVE-2024-5841
- CVE-2024-30057
- CVE-2024-5840
- CVE-2024-5838
- CVE-2024-5843
- CVE-2024-5836
- CVE-2024-5839
- CVE-2024-5833
- CVE-2024-5837
- CVE-2024-5832
- CVE-2024-5835
- CVE-2024-5830
- CVE-2024-30058
- CVE-2024-5845
- CVE-2024-5842
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2024-5847 critical
- CVE-2024-5846 critical
- CVE-2024-5842 critical
- CVE-2024-5838 critical
- CVE-2024-5839 high
- CVE-2024-5841 critical
- CVE-2024-5833 critical
- CVE-2024-5840 high
- CVE-2024-5837 critical
- CVE-2024-5834 critical
- CVE-2024-5831 critical
- CVE-2024-5836 critical
- CVE-2024-5844 critical
- CVE-2024-5835 critical
- CVE-2024-5830 critical
- CVE-2024-5832 critical
- CVE-2024-5843 high
- CVE-2024-5845 critical
- CVE-2024-38083 warning
- CVE-2024-30057 high
- CVE-2024-30058 high
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!