Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Incognito can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in PDF Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in WebView can be exploited to cause denial of service.
- Use after free vulnerability in Network APIs can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Settings can be exploited to cause denial of service.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in WebAudio can be exploited to cause denial of service or obtain sensitive information.
- Implementation vulnerability in WebApp Installer can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Implementation vulnerability in iFrame Sandbox can be exploited to cause denial of service.
- Race condition vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
- CVE-2021-37982
CVE-2021-37981
CVE-2021-37996
CVE-2021-37993
CVE-2021-37988
CVE-2021-37984
CVE-2021-37989
CVE-2021-37990
CVE-2021-37987
CVE-2021-37986
CVE-2021-37983
CVE-2021-37992
CVE-2021-37995
CVE-2021-42307
CVE-2021-37994
CVE-2021-37991
CVE-2021-37985
Связанные продукты
Список CVE
- CVE-2021-37986 critical
- CVE-2021-37984 critical
- CVE-2021-37993 critical
- CVE-2021-37981 critical
- CVE-2021-37985 critical
- CVE-2021-37995 high
- CVE-2021-37991 critical
- CVE-2021-37983 critical
- CVE-2021-37989 high
- CVE-2021-37988 critical
- CVE-2021-37990 high
- CVE-2021-37994 high
- CVE-2021-37982 critical
- CVE-2021-37996 high
- CVE-2021-37992 critical
- CVE-2021-37987 critical
- CVE-2021-42307 warning
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!