Popis
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Gemini Live can be exploited to cause denial of service.
- Implementation vulnerability in Filesystems can be exploited to cause denial of service.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Validation of untrusted input vulnerability in DOM can be exploited to bypass security restrictions.
- Implementation vulnerability can be exploited to cause denial of service.
- Implementation vulnerability in Picture can be exploited to cause denial of service.
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
Oficiální doporučení
Související produkty
seznam CVE
- CVE-2025-8578 critical
- CVE-2025-8576 critical
- CVE-2025-8582 warning
- CVE-2025-8579 warning
- CVE-2025-8581 warning
- CVE-2025-8580 warning
- CVE-2025-8583 warning
- CVE-2025-8577 warning
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!