Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Compositing can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Navigation can be exploited to cause denial of service or execute arbitrary code.
- Implementation vulnerability in WebGL can be exploited to cause denial of service.
- Use after free vulnerability in WebCodecs can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in WebGL can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in WebCodecs can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
- Integer overflow vulnerability in Codecs can be exploited to cause execute arbitrary code and denial of service.
- Implementation vulnerability in ANGLE can be exploited to cause denial of service.
- Integer overflow vulnerability in ANGLE can be exploited to cause execute arbitrary code and denial of service.
- Memory safety vulnerability in V8 can be exploited to execute arbitrary code.
- Use after free vulnerability in PDF can be exploited to cause denial of service or execute arbitrary code.
- Policy enforcement vulnerability in WebUSB can be exploited to cause denial of service.
- Use after free vulnerability in CSS can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in GPU can be exploited to cause denial of service.
Первичный источник обнаружения
- CVE-2026-5284
CVE-2026-5290
CVE-2026-5289
CVE-2026-5291
CVE-2026-5280
CVE-2026-5285
CVE-2026-5292
CVE-2026-5275
CVE-2026-5274
CVE-2026-5283
CVE-2026-5277
CVE-2026-5279
CVE-2026-5287
CVE-2026-5286
CVE-2026-5281
CVE-2026-5276
CVE-2026-5273
CVE-2026-5272
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2026-5272 critical
- CVE-2026-5273 high
- CVE-2026-5274 critical
- CVE-2026-5275 critical
- CVE-2026-5276 high
- CVE-2026-5277 critical
- CVE-2026-5279 critical
- CVE-2026-5280 critical
- CVE-2026-5281 critical
- CVE-2026-5283 high
- CVE-2026-5284 critical
- CVE-2026-5285 critical
- CVE-2026-5286 critical
- CVE-2026-5287 critical
- CVE-2026-5289 critical
- CVE-2026-5290 critical
- CVE-2026-5291 high
- CVE-2026-5292 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!