Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Use after free vulnerability in media can be exploited to cause denial of service or execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to bypass security restrictions.
- Information disclosure vulnerability in DevTools can be exploited to obtain sensitive information.
- Information disclosure vulnerability in Loader can be exploited to obtain sensitive information.
Original advisories
Related products
CVE list
- CVE-2025-6555 high
- CVE-2025-6556 high
- CVE-2025-6557 high
- CVE-2025-47963 high
- CVE-2025-47964 warning
- CVE-2025-47182 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!