Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Use after free vulnerability in media can be exploited to cause denial of service or execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to bypass security restrictions.
- Information disclosure vulnerability in DevTools can be exploited to obtain sensitive information.
- Information disclosure vulnerability in Loader can be exploited to obtain sensitive information.
Original advisories
Related products
CVE list
- CVE-2025-6555 high
- CVE-2025-6556 high
- CVE-2025-6557 high
- CVE-2025-47963 high
- CVE-2025-47964 high
- CVE-2025-47182 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!