Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Input can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Extensions can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in FileSystem can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- Denial of service vulnerability in UI can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in GTK can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in WebAudio can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in HID can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Blink can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in ANGLE can be exploited remotely to execute arbitrary code.
- Security vulnerability in Network can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Core can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Google Lens can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Chromoting can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Internationalization can be exploited remotely to execute arbitrary code.
- Security vulnerability in Passwords can be exploited to bypass security restrictions.
- Denial of service vulnerability in WebML can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Security vulnerability in IFrame Sandbox can be exploited to bypass security restrictions.
- A remote code execution vulnerability in GPU can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Mojo can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Media can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Fonts can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Codecs can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Downloads can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in DataTransfer can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- Security vulnerability in GPU can be exploited to bypass security restrictions.
- A remote code execution vulnerability in UI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Downloads can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in XML can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Accessibility can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- Denial of service vulnerability in WebRTC can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in SwiftShader can be exploited remotely to cause denial of service.
- Denial of service vulnerability in SiteIsolation can be exploited remotely to cause denial of service.
- Denial of service vulnerability in CORS can be exploited remotely to cause denial of service.
- Security vulnerability in AI can be exploited to bypass security restrictions.
- A remote code execution vulnerability in WebShare can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Skia can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability in Navigation can be exploited to obtain sensitive information.
- Denial of service vulnerability in Views can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in FileSystem can be exploited remotely to execute arbitrary code.
- Security UI vulnerability in Fullscreen can be exploited to spoof user interface.
- Security vulnerability in ViewTransitions can be exploited to bypass security restrictions.
- Security vulnerability in Payments can be exploited to bypass security restrictions.
- Security vulnerability in SanitizerAPI can be exploited to bypass security restrictions.
- Denial of service vulnerability in Codecs can be exploited remotely to cause denial of service.
- Security vulnerability in Compositing can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Aura can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ReadingMode can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Network can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Fonts can be exploited remotely to cause denial of service.
Original advisories
- CVE-2026-8587
- CVE-2026-8543
- CVE-2026-8585
- CVE-2026-8546
- CVE-2026-8541
- CVE-2026-8555
- CVE-2026-8524
- CVE-2026-8515
- CVE-2026-8518
- CVE-2026-8519
- CVE-2026-8578
- CVE-2026-8572
- CVE-2026-8542
- CVE-2026-8550
- CVE-2026-8586
- CVE-2026-8535
- CVE-2026-8559
- CVE-2026-8552
- CVE-2026-8547
- CVE-2026-8548
- CVE-2026-8509
- CVE-2026-45494
- CVE-2026-8538
- CVE-2026-8563
- CVE-2026-8534
- CVE-2026-8580
- CVE-2026-8544
- CVE-2026-8577
- CVE-2026-8573
- CVE-2026-8570
- CVE-2026-8551
- CVE-2026-8516
- CVE-2026-45495
- CVE-2026-8553
- CVE-2026-8554
- CVE-2026-8571
- CVE-2026-8540
- CVE-2026-8575
- CVE-2026-8565
- CVE-2026-8532
- CVE-2026-8557
- CVE-2026-8579
- CVE-2026-8526
- CVE-2026-8582
- CVE-2026-8560
- CVE-2026-8525
- CVE-2026-8528
- CVE-2026-8576
- CVE-2026-8568
- CVE-2026-8517
- CVE-2026-8510
- CVE-2026-8527
- CVE-2026-8581
- CVE-2026-8562
- CVE-2026-8511
- CVE-2026-8523
- CVE-2026-8584
- CVE-2026-45492
- CVE-2026-8531
- CVE-2026-8512
- CVE-2026-8561
- CVE-2026-8533
- CVE-2026-8556
- CVE-2026-8537
- CVE-2026-8566
- CVE-2026-8539
- CVE-2026-8529
- CVE-2026-8545
- CVE-2026-8514
- CVE-2026-8536
- CVE-2026-8567
- CVE-2026-8569
- CVE-2026-8530
- CVE-2026-8558
- CVE-2026-8549
Exploitation
Related products
CVE list
- CVE-2026-8509 critical
- CVE-2026-8510 critical
- CVE-2026-8511 critical
- CVE-2026-8512 critical
- CVE-2026-8513 critical
- CVE-2026-8514 critical
- CVE-2026-8515 critical
- CVE-2026-8516 high
- CVE-2026-8517 critical
- CVE-2026-8518 critical
- CVE-2026-8519 critical
- CVE-2026-8523 critical
- CVE-2026-8524 critical
- CVE-2026-8525 critical
- CVE-2026-8526 critical
- CVE-2026-8527 critical
- CVE-2026-8528 warning
- CVE-2026-8529 critical
- CVE-2026-8530 critical
- CVE-2026-8531 critical
- CVE-2026-8532 critical
- CVE-2026-8533 critical
- CVE-2026-8534 critical
- CVE-2026-8535 high
- CVE-2026-8536 warning
- CVE-2026-8537 warning
- CVE-2026-8538 high
- CVE-2026-8539 high
- CVE-2026-8540 critical
- CVE-2026-8541 high
- CVE-2026-8542 critical
- CVE-2026-8543 high
- CVE-2026-8544 critical
- CVE-2026-8545 warning
- CVE-2026-8546 high
- CVE-2026-8547 critical
- CVE-2026-8548 critical
- CVE-2026-8549 critical
- CVE-2026-8550 high
- CVE-2026-8551 critical
- CVE-2026-8552 warning
- CVE-2026-8553 warning
- CVE-2026-8554 warning
- CVE-2026-8555 critical
- CVE-2026-8556 warning
- CVE-2026-8557 critical
- CVE-2026-8558 critical
- CVE-2026-8559 warning
- CVE-2026-8560 warning
- CVE-2026-8561 high
- CVE-2026-8562 warning
- CVE-2026-8563 warning
- CVE-2026-8565 warning
- CVE-2026-8566 warning
- CVE-2026-8567 warning
- CVE-2026-8568 warning
- CVE-2026-8569 critical
- CVE-2026-8570 high
- CVE-2026-8571 critical
- CVE-2026-8572 warning
- CVE-2026-8573 critical
- CVE-2026-8575 critical
- CVE-2026-8576 warning
- CVE-2026-8577 critical
- CVE-2026-8578 warning
- CVE-2026-8579 warning
- CVE-2026-8580 critical
- CVE-2026-8581 critical
- CVE-2026-8582 high
- CVE-2026-8584 warning
- CVE-2026-8585 critical
- CVE-2026-8586 high
- CVE-2026-8587 critical
- CVE-2026-45494 high
- CVE-2026-45495 critical
- CVE-2026-45492 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!