Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Base can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in WebAudio can be exploited to cause denial of service.
- Stack buffer overflow vulnerability in WebRTC can be exploited to cause denial of service.
- Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
- Inappropriate implementation vulnerability in V8 can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory read vulnerability in V8 can be exploited to cause denial of service.
- Insufficient validation of untrusted input vulnerability in Navigation can be exploited to bypass security restrictions.
- Integer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Use after free vulnerability in Network can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
- Use after free vulnerability in Digital Credentials API can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory read vulnerability in Skia can be exploited to cause denial of service.
- Out of bounds memory read vulnerability in Blink can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in WebRTC can be exploited to cause denial of service.
Первичный источник обнаружения
- CVE-2026-4444
CVE-2026-4464
CVE-2026-4445
CVE-2026-4452
CVE-2026-4449
CVE-2026-4450
CVE-2026-4448
CVE-2026-4443
CVE-2026-4463
CVE-2026-4458
CVE-2026-4456
CVE-2026-4462
CVE-2026-4455
CVE-2026-4461
CVE-2026-4446
CVE-2026-4451
CVE-2026-4454
CVE-2026-4447
CVE-2026-4460
CVE-2026-4441
CVE-2026-4457
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2026-4441 critical
- CVE-2026-4443 critical
- CVE-2026-4444 critical
- CVE-2026-4445 critical
- CVE-2026-4446 critical
- CVE-2026-4447 critical
- CVE-2026-4448 critical
- CVE-2026-4449 critical
- CVE-2026-4450 critical
- CVE-2026-4451 critical
- CVE-2026-4452 critical
- CVE-2026-4454 critical
- CVE-2026-4455 critical
- CVE-2026-4456 critical
- CVE-2026-4457 critical
- CVE-2026-4458 critical
- CVE-2026-4460 critical
- CVE-2026-4461 critical
- CVE-2026-4462 critical
- CVE-2026-4463 critical
- CVE-2026-4464 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!