Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, obtain sensitive information, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Implementation vulnerability in Downloads can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) for Mac can be exploited remotely to spoof user interface.
- Implementation vulnerability in Split can be exploited to cause denial of service.
- Implementation vulnerability in Passwords can be exploited to cause denial of service.
- Implementation vulnerability in DevTools can be exploited to cause denial of service.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Media Stream can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Digital Credentials can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebRTC can be exploited to cause denial of service.
- Implementation vulnerability in Google Updater can be exploited to cause denial of service.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
Первичный источник обнаружения
- CVE-2025-13635
CVE-2025-62223
CVE-2025-13636
CVE-2025-13634
CVE-2025-13640
CVE-2025-13632
CVE-2025-13721
CVE-2025-13638
CVE-2025-13633
CVE-2025-13639
CVE-2025-13631
CVE-2025-13720
CVE-2025-13637
CVE-2025-13630
Связанные продукты
Список CVE
- CVE-2025-13630 critical
- CVE-2025-13631 critical
- CVE-2025-13632 high
- CVE-2025-13633 critical
- CVE-2025-13634 warning
- CVE-2025-13635 warning
- CVE-2025-13636 warning
- CVE-2025-13637 warning
- CVE-2025-13638 critical
- CVE-2025-13639 critical
- CVE-2025-13640 warning
- CVE-2025-13720 critical
- CVE-2025-13721 critical
- CVE-2025-62223 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!