Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Input can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Extensions can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in FileSystem can be exploited remotely to cause denial of service.
- Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
- Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
- Denial of service vulnerability in UI can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in GTK can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in WebAudio can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in HID can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Blink can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in ANGLE can be exploited remotely to execute arbitrary code.
- Security vulnerability in Network can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Core can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Google Lens can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Chromoting can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Internationalization can be exploited remotely to execute arbitrary code.
- Security vulnerability in Passwords can be exploited to bypass security restrictions.
- Denial of service vulnerability in WebML can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Security vulnerability in IFrame Sandbox can be exploited to bypass security restrictions.
- A remote code execution vulnerability in GPU can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Mojo can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Media can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Fonts can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Codecs can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Downloads can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in DataTransfer can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
- Security vulnerability in GPU can be exploited to bypass security restrictions.
- A remote code execution vulnerability in UI can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Downloads can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in XML can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Accessibility can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
- Denial of service vulnerability in WebRTC can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in SwiftShader can be exploited remotely to cause denial of service.
- Denial of service vulnerability in SiteIsolation can be exploited remotely to cause denial of service.
- Denial of service vulnerability in CORS can be exploited remotely to cause denial of service.
- Security vulnerability in AI can be exploited to bypass security restrictions.
- A remote code execution vulnerability in WebShare can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Skia can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability in Navigation can be exploited to obtain sensitive information.
- Denial of service vulnerability in Views can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in FileSystem can be exploited remotely to execute arbitrary code.
- Security UI vulnerability in Fullscreen can be exploited to spoof user interface.
- Security vulnerability in ViewTransitions can be exploited to bypass security restrictions.
- Security vulnerability in Payments can be exploited to bypass security restrictions.
- Security vulnerability in SanitizerAPI can be exploited to bypass security restrictions.
- Denial of service vulnerability in Codecs can be exploited remotely to cause denial of service.
- Security vulnerability in Compositing can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Aura can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in ReadingMode can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Network can be exploited remotely to execute arbitrary code.
- Denial of service vulnerability in Fonts can be exploited remotely to cause denial of service.
Первичный источник обнаружения
- CVE-2026-8513
CVE-2026-8587
CVE-2026-8543
CVE-2026-8585
CVE-2026-8546
CVE-2026-8541
CVE-2026-8555
CVE-2026-8524
CVE-2026-8515
CVE-2026-8518
CVE-2026-8519
CVE-2026-8578
CVE-2026-8572
CVE-2026-8542
CVE-2026-8550
CVE-2026-8586
CVE-2026-8535
CVE-2026-8559
CVE-2026-8552
CVE-2026-8547
CVE-2026-8548
CVE-2026-8509
CVE-2026-45494
CVE-2026-8538
CVE-2026-8563
CVE-2026-8534
CVE-2026-8580
CVE-2026-8544
CVE-2026-8577
CVE-2026-8573
CVE-2026-8570
CVE-2026-8551
CVE-2026-8516
CVE-2026-45495
CVE-2026-8553
CVE-2026-8554
CVE-2026-8571
CVE-2026-8540
CVE-2026-8575
CVE-2026-8565
CVE-2026-8532
CVE-2026-8557
CVE-2026-8579
CVE-2026-8526
CVE-2026-8582
CVE-2026-8560
CVE-2026-8525
CVE-2026-8528
CVE-2026-8576
CVE-2026-8568
CVE-2026-8517
CVE-2026-8510
CVE-2026-8527
CVE-2026-8581
CVE-2026-8562
CVE-2026-8511
CVE-2026-8523
CVE-2026-8584
CVE-2026-45492
CVE-2026-8531
CVE-2026-8512
CVE-2026-8561
CVE-2026-8533
CVE-2026-8556
CVE-2026-8537
CVE-2026-8566
CVE-2026-8539
CVE-2026-8529
CVE-2026-8545
CVE-2026-8514
CVE-2026-8536
CVE-2026-8567
CVE-2026-8569
CVE-2026-8530
CVE-2026-8558
CVE-2026-8549
Эксплуатация
Связанные продукты
Список CVE
- CVE-2026-8509 critical
- CVE-2026-8510 critical
- CVE-2026-8511 critical
- CVE-2026-8512 critical
- CVE-2026-8513 critical
- CVE-2026-8514 critical
- CVE-2026-8515 critical
- CVE-2026-8516 high
- CVE-2026-8517 critical
- CVE-2026-8518 critical
- CVE-2026-8519 critical
- CVE-2026-8523 critical
- CVE-2026-8524 critical
- CVE-2026-8525 critical
- CVE-2026-8526 critical
- CVE-2026-8527 critical
- CVE-2026-8528 warning
- CVE-2026-8529 critical
- CVE-2026-8530 critical
- CVE-2026-8531 critical
- CVE-2026-8532 critical
- CVE-2026-8533 critical
- CVE-2026-8534 critical
- CVE-2026-8535 high
- CVE-2026-8536 warning
- CVE-2026-8537 warning
- CVE-2026-8538 high
- CVE-2026-8539 high
- CVE-2026-8540 critical
- CVE-2026-8541 high
- CVE-2026-8542 critical
- CVE-2026-8543 high
- CVE-2026-8544 critical
- CVE-2026-8545 warning
- CVE-2026-8546 high
- CVE-2026-8547 critical
- CVE-2026-8548 critical
- CVE-2026-8549 critical
- CVE-2026-8550 high
- CVE-2026-8551 critical
- CVE-2026-8552 warning
- CVE-2026-8553 warning
- CVE-2026-8554 warning
- CVE-2026-8555 critical
- CVE-2026-8556 warning
- CVE-2026-8557 critical
- CVE-2026-8558 critical
- CVE-2026-8559 warning
- CVE-2026-8560 warning
- CVE-2026-8561 high
- CVE-2026-8562 warning
- CVE-2026-8563 warning
- CVE-2026-8565 warning
- CVE-2026-8566 warning
- CVE-2026-8567 warning
- CVE-2026-8568 warning
- CVE-2026-8569 critical
- CVE-2026-8570 high
- CVE-2026-8571 critical
- CVE-2026-8572 warning
- CVE-2026-8573 critical
- CVE-2026-8575 critical
- CVE-2026-8576 warning
- CVE-2026-8577 critical
- CVE-2026-8578 warning
- CVE-2026-8579 warning
- CVE-2026-8580 critical
- CVE-2026-8581 critical
- CVE-2026-8582 high
- CVE-2026-8584 warning
- CVE-2026-8585 critical
- CVE-2026-8586 high
- CVE-2026-8587 critical
- CVE-2026-45494 high
- CVE-2026-45495 critical
- CVE-2026-45492 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!