Descripción
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Base can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
- Stack buffer overflow vulnerability in WebRTC can be exploited to cause denial of service.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in V8 can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Navigation can be exploited to bypass security restrictions.
- Integer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Use after free vulnerability in Network can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
- Use after free vulnerability in Digital Credentials API can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory read vulnerability in Skia can be exploited to cause denial of service.
- Out of bounds memory read vulnerability in Blink can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in WebRTC can be exploited to cause denial of service.
Notas informativas originales
- CVE-2026-4464
- CVE-2026-4445
- CVE-2026-4452
- CVE-2026-4449
- CVE-2026-4450
- CVE-2026-4448
- CVE-2026-4443
- CVE-2026-4463
- CVE-2026-4458
- CVE-2026-4456
- CVE-2026-4462
- CVE-2026-4455
- CVE-2026-4461
- CVE-2026-4446
- CVE-2026-4451
- CVE-2026-4454
- CVE-2026-4447
- CVE-2026-4460
- CVE-2026-4441
- CVE-2026-4457
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2026-4441 critical
- CVE-2026-4443 critical
- CVE-2026-4444 critical
- CVE-2026-4445 critical
- CVE-2026-4446 critical
- CVE-2026-4447 critical
- CVE-2026-4448 critical
- CVE-2026-4449 critical
- CVE-2026-4450 critical
- CVE-2026-4451 critical
- CVE-2026-4452 critical
- CVE-2026-4454 critical
- CVE-2026-4455 critical
- CVE-2026-4456 critical
- CVE-2026-4457 critical
- CVE-2026-4458 critical
- CVE-2026-4460 critical
- CVE-2026-4461 critical
- CVE-2026-4462 critical
- CVE-2026-4463 critical
- CVE-2026-4464 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!