Kaspersky ID:
KLA48686
Дата обнаружения:
24/03/2023
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. Out of bounds read vulnerability in ANGLE can be exploited to cause denial of service.
  2. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  3. A security feature bypass vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
  4. Out of bounds memory access vulnerability in WebHID can be exploited to cause denial of service.
  5. Use after free vulnerability in PDF can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in WebProtect can be exploited to cause denial of service or execute arbitrary code.
  7. Out of bounds read vulnerability in GPU Video can be exploited to cause denial of service.
  8. Use after free vulnerability in Passwords can be exploited to cause denial of service or execute arbitrary code.
  9. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2023-1531
    critical
  • CVE-2023-1534
    critical
  • CVE-2023-1533
    critical
  • CVE-2023-1528
    critical
  • CVE-2023-1530
    critical
  • CVE-2023-1529
    critical
  • CVE-2023-1532
    critical
  • CVE-2023-28286
    high
  • CVE-2023-28261
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.