Açıklama
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Incognito can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
- Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
- Use after free vulnerability in PDF Accessibility can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
- Implementation vulnerability in Blink can be exploited to cause denial of service.
- Implementation vulnerability in WebView can be exploited to cause denial of service.
- Use after free vulnerability in Network APIs can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in Settings can be exploited to cause denial of service.
- Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in WebAudio can be exploited to cause denial of service or obtain sensitive information.
- Implementation vulnerability in WebApp Installer can be exploited to cause denial of service.
- An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
- Implementation vulnerability in iFrame Sandbox can be exploited to cause denial of service.
- Race condition vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
Orijinal öneriler
- CVE-2021-37981
- CVE-2021-37996
- CVE-2021-37993
- CVE-2021-37988
- CVE-2021-37984
- CVE-2021-37989
- CVE-2021-37990
- CVE-2021-37987
- CVE-2021-37986
- CVE-2021-37983
- CVE-2021-37992
- CVE-2021-37995
- CVE-2021-42307
- CVE-2021-37994
- CVE-2021-37991
- CVE-2021-37985
İlgili ürünler
CVE Listesi
- CVE-2021-37986 critical
- CVE-2021-37984 critical
- CVE-2021-37993 critical
- CVE-2021-37981 critical
- CVE-2021-37985 critical
- CVE-2021-37995 high
- CVE-2021-37991 critical
- CVE-2021-37983 critical
- CVE-2021-37989 high
- CVE-2021-37988 critical
- CVE-2021-37990 high
- CVE-2021-37994 high
- CVE-2021-37982 critical
- CVE-2021-37996 high
- CVE-2021-37992 critical
- CVE-2021-37987 critical
- CVE-2021-42307 warning
KB Listesi
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!