Beschreibung
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- Denial of service vulnerability in WebRTC can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Accessibility can be exploited remotely to cause denial of service.
- Denial of service vulnerability in ServiceWorker can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Blink can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in ANGLE can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Popup Blocker can be exploited remotely to cause denial of service.
- Security vulnerability in Autofill can be exploited to bypass security restrictions.
- Denial of service vulnerability in SanitizerAPI can be exploited remotely to cause denial of service.
- Information disclosure vulnerability in Media can be exploited to obtain sensitive information.
- Security vulnerability in WebUI can be exploited to bypass security restrictions.
- A remote code execution vulnerability in UI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Dialog can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Audio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Shared Storage can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Cast can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in WebRTC can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DOM can be exploited remotely to execute arbitrary code.
- Security vulnerability in DevTools can be exploited to bypass security restrictions.
- Denial of service vulnerability in Navigation can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in V8 can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in UI can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in PresentationAPI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Canvas can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Persistent Cache can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Chromoting can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in DevTools can be exploited remotely to cause denial of service.
- Denial of service vulnerability in FedCM can be exploited remotely to cause denial of service.
- Denial of service vulnerability in SiteIsolation can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Fonts can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in SVG can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in SSL can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in CSS can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in WebCodecs can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Speech can be exploited remotely to cause denial of service.
- Denial of service vulnerability in MHTML can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Runtime can be exploited remotely to cause denial of service.
- Security vulnerability in Extensions can be exploited to bypass security restrictions.
- A remote code execution vulnerability in ServiceWorker can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in DataTransfer can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Dawn can be exploited remotely to cause denial of service.
- Security vulnerability in Search can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Passwords can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Permissions can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Network can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Omnibox can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in ReadingMode can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GPU can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Aura can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in COOP can be exploited remotely to cause denial of service.
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in WebAudio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DevTools can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GFX can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Skia can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Views can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ORB can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Printing can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Fullscreen can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in TopChrome can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Preload can be exploited remotely to cause denial of service.
- Denial of service vulnerability in InterestGroups can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Updater can be exploited remotely to cause denial of service.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- Denial of service vulnerability in TabGroups can be exploited remotely to cause denial of service.
- Security vulnerability in Downloads can be exploited to bypass security restrictions.
- An information disclosure vulnerability in Copilot Chat (Microsoft Edge) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in MediaRecording can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in FileSystem can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Companion can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Cookies can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Chromoting can be exploited remotely to cause denial of service.
- Security vulnerability in WebApp can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Speech can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Navigation can be exploited remotely to execute arbitrary code.
- Script injection in UI
- A remote code execution vulnerability in Network can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in AdFilter can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Codecs can be exploited remotely to cause denial of service.
- Security vulnerability in DirectSockets can be exploited to bypass security restrictions.
- Denial of service vulnerability in ChromeDriver can be exploited remotely to cause denial of service.
- Denial of service vulnerability in CORS can be exploited remotely to cause denial of service.
Ursprüngliche Informationshinweise
- CVE-2026-7951
- CVE-2026-7914
- CVE-2026-7909
- CVE-2026-7974
- CVE-2026-7901
- CVE-2026-7903
- CVE-2026-7934
- CVE-2026-7986
- CVE-2026-7939
- CVE-2026-8017
- CVE-2026-7946
- CVE-2026-7958
- CVE-2026-7991
- CVE-2026-7972
- CVE-2026-7998
- CVE-2026-8002
- CVE-2026-7954
- CVE-2026-8007
- CVE-2026-7942
- CVE-2026-7987
- CVE-2026-7896
- CVE-2026-7907
- CVE-2026-7937
- CVE-2026-7959
- CVE-2026-8004
- CVE-2026-7936
- CVE-2026-7992
- CVE-2026-8015
- CVE-2026-7926
- CVE-2026-8009
- CVE-2026-7988
- CVE-2026-8016
- CVE-2026-7977
- CVE-2026-7944
- CVE-2026-8006
- CVE-2026-7948
- CVE-2026-8008
- CVE-2026-8013
- CVE-2026-8010
- CVE-2026-7963
- CVE-2026-7973
- CVE-2026-7904
- CVE-2026-7906
- CVE-2026-7996
- CVE-2026-7938
- CVE-2026-7933
- CVE-2026-7955
- CVE-2026-7928
- CVE-2026-7935
- CVE-2026-8012
- CVE-2026-7927
- CVE-2026-7952
- CVE-2026-7922
- CVE-2026-7989
- CVE-2026-7924
- CVE-2026-8011
- CVE-2026-7966
- CVE-2026-7940
- CVE-2026-8005
- CVE-2026-7921
- CVE-2026-7961
- CVE-2026-7947
- CVE-2026-7953
- CVE-2026-7899
- CVE-2026-7984
- CVE-2026-7985
- CVE-2026-7919
- CVE-2026-7945
- CVE-2026-7900
- CVE-2026-7967
- CVE-2026-7980
- CVE-2026-7975
- CVE-2026-8022
- CVE-2026-7950
- CVE-2026-7920
- CVE-2026-7910
- CVE-2026-7971
- CVE-2026-8001
- CVE-2026-7908
- CVE-2026-7970
- CVE-2026-8014
- CVE-2026-7916
- CVE-2026-7990
- CVE-2026-7997
- CVE-2026-7917
- CVE-2026-7902
- CVE-2026-7983
- CVE-2026-8003
- CVE-2026-7932
- CVE-2026-33111
- CVE-2026-7929
- CVE-2026-7964
- CVE-2026-7978
- CVE-2026-7930
- CVE-2026-7943
- CVE-2026-7957
- CVE-2026-7994
- CVE-2026-8019
- CVE-2026-7925
- CVE-2026-7911
- CVE-2026-7960
- CVE-2026-7949
- CVE-2026-7956
- CVE-2026-7982
- CVE-2026-8021
- CVE-2026-7898
- CVE-2026-7969
- CVE-2026-7918
- CVE-2026-7995
- CVE-2026-7965
- CVE-2026-8018
- CVE-2026-7981
- CVE-2026-7923
- CVE-2026-7962
- CVE-2026-8000
- CVE-2026-7976
- CVE-2026-7999
- CVE-2026-7968
Betroffene Produkte
CVE Liste
- CVE-2026-7896 critical
- CVE-2026-7898 critical
- CVE-2026-7899 critical
- CVE-2026-7900 critical
- CVE-2026-7901 critical
- CVE-2026-7902 critical
- CVE-2026-7903 critical
- CVE-2026-7904 warning
- CVE-2026-7906 critical
- CVE-2026-7907 critical
- CVE-2026-7908 critical
- CVE-2026-7909 warning
- CVE-2026-7910 critical
- CVE-2026-7911 critical
- CVE-2026-7914 critical
- CVE-2026-7916 critical
- CVE-2026-7917 critical
- CVE-2026-7918 critical
- CVE-2026-7919 critical
- CVE-2026-7920 critical
- CVE-2026-7921 critical
- CVE-2026-7922 critical
- CVE-2026-7923 critical
- CVE-2026-7924 high
- CVE-2026-7925 critical
- CVE-2026-7926 critical
- CVE-2026-7927 critical
- CVE-2026-7928 critical
- CVE-2026-7929 critical
- CVE-2026-7930 critical
- CVE-2026-7932 warning
- CVE-2026-7933 warning
- CVE-2026-7934 warning
- CVE-2026-7935 high
- CVE-2026-7936 warning
- CVE-2026-7937 warning
- CVE-2026-7938 critical
- CVE-2026-7939 high
- CVE-2026-7940 critical
- CVE-2026-7942 warning
- CVE-2026-7943 warning
- CVE-2026-7944 warning
- CVE-2026-7945 warning
- CVE-2026-7946 warning
- CVE-2026-7947 warning
- CVE-2026-7948 critical
- CVE-2026-7949 warning
- CVE-2026-7950 high
- CVE-2026-7951 critical
- CVE-2026-7952 warning
- CVE-2026-7953 high
- CVE-2026-7954 warning
- CVE-2026-7955 high
- CVE-2026-7956 critical
- CVE-2026-7957 critical
- CVE-2026-7958 high
- CVE-2026-7959 warning
- CVE-2026-7960 high
- CVE-2026-7961 warning
- CVE-2026-7962 high
- CVE-2026-7963 critical
- CVE-2026-7964 warning
- CVE-2026-7965 warning
- CVE-2026-7966 warning
- CVE-2026-7967 critical
- CVE-2026-7968 warning
- CVE-2026-7969 warning
- CVE-2026-7970 critical
- CVE-2026-7971 high
- CVE-2026-7972 warning
- CVE-2026-7973 critical
- CVE-2026-7974 critical
- CVE-2026-7975 critical
- CVE-2026-7976 critical
- CVE-2026-7977 high
- CVE-2026-7978 critical
- CVE-2026-7979 warning
- CVE-2026-7980 critical
- CVE-2026-7981 critical
- CVE-2026-7982 high
- CVE-2026-7983 warning
- CVE-2026-7984 critical
- CVE-2026-7985 critical
- CVE-2026-7986 warning
- CVE-2026-7987 critical
- CVE-2026-7988 critical
- CVE-2026-7989 warning
- CVE-2026-7990 critical
- CVE-2026-7991 critical
- CVE-2026-7992 critical
- CVE-2026-7994 critical
- CVE-2026-7995 critical
- CVE-2026-7996 warning
- CVE-2026-7997 critical
- CVE-2026-7998 high
- CVE-2026-7999 warning
- CVE-2026-8000 critical
- CVE-2026-8001 critical
- CVE-2026-8002 critical
- CVE-2026-8003 high
- CVE-2026-8004 warning
- CVE-2026-8005 warning
- CVE-2026-8006 high
- CVE-2026-8007 critical
- CVE-2026-8008 high
- CVE-2026-8009 warning
- CVE-2026-8010 high
- CVE-2026-8011 warning
- CVE-2026-8012 high
- CVE-2026-8013 warning
- CVE-2026-8014 warning
- CVE-2026-8015 high
- CVE-2026-8016 critical
- CVE-2026-8017 warning
- CVE-2026-8018 critical
- CVE-2026-8019 high
- CVE-2026-8021 warning
- CVE-2026-8022 warning
- CVE-2026-33111 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!