CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, bypass security restrictions, gain privileges, execute arbitrary code.
Below is a complete list of vulnerabilities:
CVE-2024-7967 unknown
CVE-2024-7969 unknown
CVE-2024-7973 unknown
CVE-2024-7976 unknown
CVE-2024-7979 unknown
CVE-2024-7981 unknown
CVE-2024-7975 unknown
CVE-2024-7965 unknown
CVE-2024-7966 unknown
CVE-2024-7978 unknown
CVE-2024-8033 unknown
CVE-2024-7964 unknown
CVE-2024-7971 unknown
CVE-2024-7980 unknown
CVE-2024-8035 unknown
CVE-2024-7974 unknown
CVE-2024-8034 unknown
CVE-2024-7968 unknown
CVE-2024-7977 unknown
CVE-2024-7972 unknown
CVE-2024-38207 high
CVE-2024-41879 unknown
CVE-2024-38210 high
CVE-2024-38209 high
CVE-2024-38208 high
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38207
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38208
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38209
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38210
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41879
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7964
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7965
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7966
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7967
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7968
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7969
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7971
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7972
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7973
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7974
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7975
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7976
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7977
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7978
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7979
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7980
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7981
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8033
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8034
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8035
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Edge/