Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Edge for Android (Chromium-based) can be exploited remotely to obtain sensitive information.
- Policy enforcement vulnerability in Site Isolation can be exploited to cause denial of service.
- Data validation vulnerability in Downloads can be exploited to cause denial of service.
- Data validation vulnerability in Browser Switcher can be exploited to cause denial of service.
- Implementation vulnerability in Autofill can be exploited to cause denial of service.
- Object corruption vulnerability in V8 can be exploited to cause denial of service.
- Object corruption vulnerability in WebAssembly can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in Prompts can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Policy enforcement vulnerability in WebUI can be exploited to cause denial of service.
- Out of bounds read vulnerability in Fonts can be exploited to cause denial of service.
- Implementation vulnerability in Network can be exploited to cause denial of service.
- Implementation vulnerability in Extensions can be exploited to cause denial of service.
- Use after free vulnerability in QUIC can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Downloads can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
- CVE-2024-29986
CVE-2024-3840
CVE-2024-3843
CVE-2024-3841
CVE-2024-3838
CVE-2024-3832
CVE-2024-3833
CVE-2024-3914
CVE-2024-3846
CVE-2024-29987
CVE-2024-3847
CVE-2024-3839
CVE-2024-3845
CVE-2024-3844
CVE-2024-3837
CVE-2024-3834
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2024-3838 high
- CVE-2024-3844 warning
- CVE-2024-3837 critical
- CVE-2024-3846 warning
- CVE-2024-3832 critical
- CVE-2024-3843 warning
- CVE-2024-3847 high
- CVE-2024-3914 high
- CVE-2024-3845 warning
- CVE-2024-3841 high
- CVE-2024-3833 critical
- CVE-2024-3840 critical
- CVE-2024-3839 high
- CVE-2024-3834 critical
- CVE-2024-29986 high
- CVE-2024-29987 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!