Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- Denial of service vulnerability in WebRTC can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Accessibility can be exploited remotely to cause denial of service.
- Denial of service vulnerability in ServiceWorker can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Blink can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in ANGLE can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Popup Blocker can be exploited remotely to cause denial of service.
- Security vulnerability in Autofill can be exploited to bypass security restrictions.
- Denial of service vulnerability in SanitizerAPI can be exploited remotely to cause denial of service.
- Information disclosure vulnerability in Media can be exploited to obtain sensitive information.
- Security vulnerability in WebUI can be exploited to bypass security restrictions.
- A remote code execution vulnerability in UI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Dialog can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Audio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Shared Storage can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Cast can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in WebRTC can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DOM can be exploited remotely to execute arbitrary code.
- Security vulnerability in DevTools can be exploited to bypass security restrictions.
- Denial of service vulnerability in Navigation can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in V8 can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in UI can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in PresentationAPI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Canvas can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Persistent Cache can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Chromoting can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in DevTools can be exploited remotely to cause denial of service.
- Denial of service vulnerability in FedCM can be exploited remotely to cause denial of service.
- Denial of service vulnerability in SiteIsolation can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Fonts can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in SVG can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in SSL can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in CSS can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in WebCodecs can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Speech can be exploited remotely to cause denial of service.
- Denial of service vulnerability in MHTML can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Runtime can be exploited remotely to cause denial of service.
- Security vulnerability in Extensions can be exploited to bypass security restrictions.
- A remote code execution vulnerability in ServiceWorker can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in DataTransfer can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Dawn can be exploited remotely to cause denial of service.
- Security vulnerability in Search can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Passwords can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Permissions can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Network can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Omnibox can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in ReadingMode can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GPU can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Aura can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in COOP can be exploited remotely to cause denial of service.
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in WebAudio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DevTools can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GFX can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Skia can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Views can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ORB can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Printing can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Fullscreen can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in TopChrome can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Preload can be exploited remotely to cause denial of service.
- Denial of service vulnerability in InterestGroups can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Updater can be exploited remotely to cause denial of service.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- Denial of service vulnerability in TabGroups can be exploited remotely to cause denial of service.
- Security vulnerability in Downloads can be exploited to bypass security restrictions.
- An information disclosure vulnerability in Copilot Chat (Microsoft Edge) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in MediaRecording can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in FileSystem can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Companion can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Cookies can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Chromoting can be exploited remotely to cause denial of service.
- Security vulnerability in WebApp can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Speech can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Navigation can be exploited remotely to execute arbitrary code.
- Script injection in UI
- A remote code execution vulnerability in Network can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in AdFilter can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Codecs can be exploited remotely to cause denial of service.
- Security vulnerability in DirectSockets can be exploited to bypass security restrictions.
- Denial of service vulnerability in ChromeDriver can be exploited remotely to cause denial of service.
- Denial of service vulnerability in CORS can be exploited remotely to cause denial of service.
Первичный источник обнаружения
- CVE-2026-7979
CVE-2026-7951
CVE-2026-7914
CVE-2026-7909
CVE-2026-7974
CVE-2026-7901
CVE-2026-7903
CVE-2026-7934
CVE-2026-7986
CVE-2026-7939
CVE-2026-8017
CVE-2026-7946
CVE-2026-7958
CVE-2026-7991
CVE-2026-7972
CVE-2026-7998
CVE-2026-8002
CVE-2026-7954
CVE-2026-8007
CVE-2026-7942
CVE-2026-7987
CVE-2026-7896
CVE-2026-7907
CVE-2026-7937
CVE-2026-7959
CVE-2026-8004
CVE-2026-7936
CVE-2026-7992
CVE-2026-8015
CVE-2026-7926
CVE-2026-8009
CVE-2026-7988
CVE-2026-8016
CVE-2026-7977
CVE-2026-7944
CVE-2026-8006
CVE-2026-7948
CVE-2026-8008
CVE-2026-8013
CVE-2026-8010
CVE-2026-7963
CVE-2026-7973
CVE-2026-7904
CVE-2026-7906
CVE-2026-7996
CVE-2026-7938
CVE-2026-7933
CVE-2026-7955
CVE-2026-7928
CVE-2026-7935
CVE-2026-8012
CVE-2026-7927
CVE-2026-7952
CVE-2026-7922
CVE-2026-7989
CVE-2026-7924
CVE-2026-8011
CVE-2026-7966
CVE-2026-7940
CVE-2026-8005
CVE-2026-7921
CVE-2026-7961
CVE-2026-7947
CVE-2026-7953
CVE-2026-7899
CVE-2026-7984
CVE-2026-7985
CVE-2026-7919
CVE-2026-7945
CVE-2026-7900
CVE-2026-7967
CVE-2026-7980
CVE-2026-7975
CVE-2026-8022
CVE-2026-7950
CVE-2026-7920
CVE-2026-7910
CVE-2026-7971
CVE-2026-8001
CVE-2026-7908
CVE-2026-7970
CVE-2026-8014
CVE-2026-7916
CVE-2026-7990
CVE-2026-7997
CVE-2026-7917
CVE-2026-7902
CVE-2026-7983
CVE-2026-8003
CVE-2026-7932
CVE-2026-33111
CVE-2026-7929
CVE-2026-7964
CVE-2026-7978
CVE-2026-7930
CVE-2026-7943
CVE-2026-7957
CVE-2026-7994
CVE-2026-8019
CVE-2026-7925
CVE-2026-7911
CVE-2026-7960
CVE-2026-7949
CVE-2026-7956
CVE-2026-7982
CVE-2026-8021
CVE-2026-7898
CVE-2026-7969
CVE-2026-7918
CVE-2026-7995
CVE-2026-7965
CVE-2026-8018
CVE-2026-7981
CVE-2026-7923
CVE-2026-7962
CVE-2026-8000
CVE-2026-7976
CVE-2026-7999
CVE-2026-7968
Эксплуатация
Связанные продукты
Список CVE
- CVE-2026-7896 critical
- CVE-2026-7898 critical
- CVE-2026-7899 critical
- CVE-2026-7900 critical
- CVE-2026-7901 critical
- CVE-2026-7902 critical
- CVE-2026-7903 critical
- CVE-2026-7904 warning
- CVE-2026-7906 critical
- CVE-2026-7907 critical
- CVE-2026-7908 critical
- CVE-2026-7909 warning
- CVE-2026-7910 critical
- CVE-2026-7911 critical
- CVE-2026-7914 critical
- CVE-2026-7916 critical
- CVE-2026-7917 critical
- CVE-2026-7918 critical
- CVE-2026-7919 critical
- CVE-2026-7920 critical
- CVE-2026-7921 critical
- CVE-2026-7922 critical
- CVE-2026-7923 critical
- CVE-2026-7924 high
- CVE-2026-7925 critical
- CVE-2026-7926 critical
- CVE-2026-7927 critical
- CVE-2026-7928 critical
- CVE-2026-7929 critical
- CVE-2026-7930 critical
- CVE-2026-7932 warning
- CVE-2026-7933 warning
- CVE-2026-7934 warning
- CVE-2026-7935 high
- CVE-2026-7936 warning
- CVE-2026-7937 warning
- CVE-2026-7938 critical
- CVE-2026-7939 high
- CVE-2026-7940 critical
- CVE-2026-7942 warning
- CVE-2026-7943 warning
- CVE-2026-7944 warning
- CVE-2026-7945 warning
- CVE-2026-7946 warning
- CVE-2026-7947 warning
- CVE-2026-7948 critical
- CVE-2026-7949 warning
- CVE-2026-7950 high
- CVE-2026-7951 critical
- CVE-2026-7952 warning
- CVE-2026-7953 high
- CVE-2026-7954 warning
- CVE-2026-7955 high
- CVE-2026-7956 critical
- CVE-2026-7957 critical
- CVE-2026-7958 high
- CVE-2026-7959 warning
- CVE-2026-7960 high
- CVE-2026-7961 warning
- CVE-2026-7962 high
- CVE-2026-7963 critical
- CVE-2026-7964 warning
- CVE-2026-7965 warning
- CVE-2026-7966 warning
- CVE-2026-7967 critical
- CVE-2026-7968 warning
- CVE-2026-7969 warning
- CVE-2026-7970 critical
- CVE-2026-7971 high
- CVE-2026-7972 warning
- CVE-2026-7973 critical
- CVE-2026-7974 critical
- CVE-2026-7975 critical
- CVE-2026-7976 critical
- CVE-2026-7977 high
- CVE-2026-7978 critical
- CVE-2026-7979 warning
- CVE-2026-7980 critical
- CVE-2026-7981 critical
- CVE-2026-7982 high
- CVE-2026-7983 warning
- CVE-2026-7984 critical
- CVE-2026-7985 critical
- CVE-2026-7986 warning
- CVE-2026-7987 critical
- CVE-2026-7988 critical
- CVE-2026-7989 warning
- CVE-2026-7990 critical
- CVE-2026-7991 critical
- CVE-2026-7992 critical
- CVE-2026-7994 critical
- CVE-2026-7995 critical
- CVE-2026-7996 warning
- CVE-2026-7997 critical
- CVE-2026-7998 high
- CVE-2026-7999 warning
- CVE-2026-8000 critical
- CVE-2026-8001 critical
- CVE-2026-8002 critical
- CVE-2026-8003 high
- CVE-2026-8004 warning
- CVE-2026-8005 warning
- CVE-2026-8006 high
- CVE-2026-8007 critical
- CVE-2026-8008 high
- CVE-2026-8009 warning
- CVE-2026-8010 high
- CVE-2026-8011 warning
- CVE-2026-8012 high
- CVE-2026-8013 warning
- CVE-2026-8014 warning
- CVE-2026-8015 high
- CVE-2026-8016 critical
- CVE-2026-8017 warning
- CVE-2026-8018 critical
- CVE-2026-8019 high
- CVE-2026-8021 warning
- CVE-2026-8022 warning
- CVE-2026-33111 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!