説明
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in V8 can be exploited remotely to execute arbitrary code
- Inappropriate implementation vulnerability in Extensions can be exploited to bypass security restrictions.
- Inappropriate implementation vulnerability in Downloads can be exploited to spoof user interface.
- Inappropriate implementation vulnerability in Toolbar can be exploited to spoof user interface.
- A security feature bypass vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to bypass security restrictions.
オリジナルアドバイザリー
関連製品
CVEリスト
- CVE-2025-9864 unknown
- CVE-2025-9865 high
- CVE-2025-9866 critical
- CVE-2025-9867 high
- CVE-2025-53791 warning
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!