Popis
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Gemini Live can be exploited to cause denial of service.
- Implementation vulnerability in Filesystems can be exploited to cause denial of service.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Validation of untrusted input vulnerability in DOM can be exploited to bypass security restrictions.
- Implementation vulnerability can be exploited to cause denial of service.
- Implementation vulnerability in Picture can be exploited to cause denial of service.
- Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
Oficiální doporučení
Vykořisťování
Public exploits exist for this vulnerability.
Související produkty
seznam CVE
- CVE-2025-8578 critical
- CVE-2025-8576 critical
- CVE-2025-8582 warning
- CVE-2025-8579 warning
- CVE-2025-8581 warning
- CVE-2025-8580 warning
- CVE-2025-8583 warning
- CVE-2025-8577 warning
seznam KB
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!