Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, obtain sensitive information, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) for Mac can be exploited remotely to spoof user interface.
- Implementation vulnerability in Split can be exploited to cause denial of service.
- Implementation vulnerability in Passwords can be exploited to cause denial of service.
- Implementation vulnerability in DevTools can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Media Stream can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Digital Credentials can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebRTC can be exploited to cause denial of service.
- Implementation vulnerability in Google Updater can be exploited to cause denial of service.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
Original advisories
- CVE-2025-62223
- CVE-2025-13636
- CVE-2025-13634
- CVE-2025-13640
- CVE-2025-13632
- CVE-2025-13721
- CVE-2025-13638
- CVE-2025-13633
- CVE-2025-13639
- CVE-2025-13631
- CVE-2025-13720
- CVE-2025-13637
- CVE-2025-13630
Related products
CVE list
- CVE-2025-13630 critical
- CVE-2025-13631 critical
- CVE-2025-13632 high
- CVE-2025-13633 critical
- CVE-2025-13634 warning
- CVE-2025-13635 warning
- CVE-2025-13636 warning
- CVE-2025-13637 warning
- CVE-2025-13638 critical
- CVE-2025-13639 critical
- CVE-2025-13640 warning
- CVE-2025-13720 critical
- CVE-2025-13721 critical
- CVE-2025-62223 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!