Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35429— Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

CVSS 4.3 · Medium EPSS 0.06% · P19

Possible ATT&CK Techniques 1AI

T1557 · Adversary-in-the-Middle

Affected Version Matrix 1

VendorProductVersion RangeStatus
MicrosoftMicrosoft Edge for Android1.0.0< 148.0.3967.55affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35429

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键信息的UI错误表达
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Edge for Android 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Edge for Android是美国Microsoft公司的一款安卓系统中的浏览器。 Microsoft Edge for Android存在安全漏洞。攻击者利用该漏洞执行欺骗攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft Edge for Android 1.0.0 ~ 148.0.3967.55 -

II. Public POCs for CVE-2026-35429

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-35429

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2026-05-12 · 125 CVEs total

CVE-2026-428989.9 CRITICALMicrosoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-428239.9 CRITICALAzure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-410969.8 CRITICALWindows DNS Client Remote Code Execution Vulnerability
CVE-2026-410899.8 CRITICALWindows Netlogon Remote Code Execution Vulnerability
CVE-2026-404029.3 CRITICALWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-403799.3 CRITICALAzure Entra ID Spoofing Vulnerability
CVE-2026-428339.1 CRITICALMicrosoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-331179.1 CRITICALAzure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-411039.1 CRITICALMicrosoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
CVE-2026-331108.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-404038.8 HIGHWindows Graphics Component Remote Code Execution Vulnerability
CVE-2026-411098.8 HIGHGitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-403578.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-354368.8 HIGHMicrosoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-354398.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-404208.8 HIGHMicrosoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-410868.8 HIGHWindows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-403658.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-331128.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-403708.8 HIGHSQL Server Remote Code Execution Vulnerability

Showing top 20 of 125 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-35429

No comments yet


Leave a comment