Descrição
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in V8 can be exploited remotely to execute arbitrary code
- Inappropriate implementation vulnerability in Extensions can be exploited to bypass security restrictions.
- Inappropriate implementation vulnerability in Downloads can be exploited to spoof user interface.
- Inappropriate implementation vulnerability in Toolbar can be exploited to spoof user interface.
- A security feature bypass vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to bypass security restrictions.
Comunicados originais
Produtos relacionados
Lista de CVE
- CVE-2025-9864 unknown
- CVE-2025-9865 high
- CVE-2025-9866 critical
- CVE-2025-9867 high
- CVE-2025-53791 warning
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!