Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Incognito can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in PDF Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in WebView can be exploited to cause denial of service.
- Use after free vulnerability in Network APIs can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Settings can be exploited to cause denial of service.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in WebAudio can be exploited to cause denial of service or obtain sensitive information.
- Implementation vulnerability in WebApp Installer can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Implementation vulnerability in iFrame Sandbox can be exploited to cause denial of service.
- Race condition vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
- CVE-2021-37982
CVE-2021-37981
CVE-2021-37996
CVE-2021-37993
CVE-2021-37988
CVE-2021-37984
CVE-2021-37989
CVE-2021-37990
CVE-2021-37987
CVE-2021-37986
CVE-2021-37983
CVE-2021-37992
CVE-2021-37995
CVE-2021-42307
CVE-2021-37994
CVE-2021-37991
CVE-2021-37985
Связанные продукты
Список CVE
- CVE-2021-37986 high
- CVE-2021-37984 high
- CVE-2021-37993 high
- CVE-2021-37981 high
- CVE-2021-37985 high
- CVE-2021-37995 warning
- CVE-2021-37991 high
- CVE-2021-37983 high
- CVE-2021-37989 warning
- CVE-2021-37988 high
- CVE-2021-37990 warning
- CVE-2021-37994 warning
- CVE-2021-37982 high
- CVE-2021-37996 warning
- CVE-2021-37992 high
- CVE-2021-37987 high
- CVE-2021-42307 warning
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!