{"id":4009,"date":"2018-06-22T21:46:18","date_gmt":"2018-06-22T21:46:18","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/"},"modified":"2018-06-22T21:46:18","modified_gmt":"2018-06-22T21:46:18","slug":"microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/","title":{"rendered":"Microsoft Edge bug odyssey shows why we can&#8217;t have nice things"},"content":{"rendered":"<p><strong class=\"trailer\">Updated<\/strong> Earlier this year, Jake Archibald, developer advocate for Google Chrome, found a bug affecting Mozilla Firefox and Microsoft Edge \u2013 and had two very different experiences trying to get the problem fixed.<\/p>\n<p>Mozilla, he said this week in a <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/jakearchibald.com\/2018\/i-discovered-a-browser-bug\/\">blog post<\/a> recounting the saga, responded within three hours. And because the browser maker received word when Firefox 59 was in beta release, it was able to address the issue shortly thereafter, in time for the version 59 stable release.<\/p>\n<p>Microsoft, on the other hand, wasn&#8217;t very communicative, with Archibald or itself.<\/p>\n<p>Archibald said he reported the issue though Edge&#8217;s bug tracker on March 1, and also notified secure@microsoft.com, the email address Microsoft offers for vulnerability reporting.<\/p>\n<p>&#8220;I got an email from Microsoft security later that day saying that they don&#8217;t have access to Edge&#8217;s bug tracker, and asked if I could paste the details into an email for them,&#8221; he said. &#8220;So yeah, Microsoft&#8217;s security team don&#8217;t have visibility into Edge security issues.&#8221;<\/p>\n<p>He sent the vulnerability details he had submitted previously via email.<\/p>\n<p>The following day, he was told Microsoft couldn&#8217;t investigate without the source code for the proof-of-concept webpage that demonstrated the security bug \u2013 which would have been evident via the browser&#8217;s &#8220;view source&#8221; command.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/07\/13\/lock_98745985764.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"edge\"\/><\/p>\n<h2 title=\"JavaScript just-in-time compilation and some memory meddling make a mess\">Wanna break Microsoft&#8217;s Edge browser? Google&#8217;s explained how<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/05\/15\/microsoft_acg_mitigation_missed_memory_bug\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Nonetheless, Archibald sent a copy of the source code, and 20 days of silence followed.<\/p>\n<p>After contacting people he knew on the Edge team, he finally got word from Microsoft that it intended to fix the problem. Since he was eligible for a bounty for finding the bug, he asked about whether it could nominate a charity to receive the award. Another two weeks of silence.<\/p>\n<p>Microsoft finally informed him that it couldn&#8217;t give the award to a charity despite the fact that its bug reporting documentation said that was possible.<\/p>\n<p>On April 12, he took <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/jaffathecake\/status\/984339388439162880\">to Twitter<\/a> to complain about the lack of responsiveness from the Edge team. The criticism managed to get the attention of some Microsoft engineers, and even <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/kylealden\/status\/984347921733771264\">acknowledgement<\/a> that the company&#8217;s response was suboptimal.<\/p>\n<p>Finally, on June 12, Microsoft <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8235\">fixed the vulnerability<\/a> in Edge, which could have been abused to force the browser to transmit private data.<\/p>\n<p>Archibald contends the bug is significant. &#8220;It means you could visit my site in Edge, and I could read your emails, I could read your Facebook feed, all without you knowing,&#8221; he said.<\/p>\n<h3 class=\"crosshead\"><span>Bountiful bug<\/span><\/h3>\n<p>The bug itself arose from the fact that the <code>Range<\/code> HTTP request header was never standardized for HTML.<\/p>\n<p>&#8220;We know what the headers look like, and when they should appear, but there&#8217;s nothing to say what a browser should actually do with them,&#8221; explained Archibald.<\/p>\n<p>In the context of media data like audio or video, specifying a range parameter allows the return of a specific range of bytes, which could be useful to listen to a specific portion of a song, for example. But lack of detail about how browsers should handle partial content meant that at least in Firefox and Edge, known data could be mixed with unknown data. Archibald described several attack scenarios in a <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/github.com\/whatwg\/fetch\/issues\/144#issuecomment-368040980\">GitHub issues post<\/a>.<\/p>\n<p>In an email to <em>The Register<\/em>, Archibald said he has added steps to the <code>fetch<\/code> to block Attack 4, but either he or someone else needs to craft code to deal with the other scenarios. He has also filed bug reports for all four major browsers \u2013 Chrome, Edge, Firefox and Safari \u2013 to ensure the spec changes get accommodated.<\/p>\n<p>&#8220;The fillings against all browsers also cover the case where range requests can pass through a service worker, which no browsers allow right now,&#8221; he said. &#8220;The same fixes cover the non-service-worker cases in Edge and Firefox.&#8221;<\/p>\n<p>Asked how Microsoft might improve its bug reporting protocol, Archibald asked for better communication. &#8220;The important thing is to keep the reporter in the loop with browser engineers,&#8221; he said. &#8220;This is what Chrome and Firefox do.&#8221;<\/p>\n<p><em>The Register<\/em> asked Microsoft to comment. We haven&#8217;t heard back. \u00ae<\/p>\n<h3 class=\"crosshead\"><span>Updated to add<\/span><\/h3>\n<p>Microsoft has sent us the following statement, confirming it fixed the hole in <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/06\/12\/patch_tuesday_microsoft_june_2018\/\">this month&#8217;s Patch Tuesday<\/a>:<\/p>\n<blockquote class=\"centredquote\" readability=\"7\">\n<p>Microsoft released security updates in June 2018, and customers who have Windows Update enabled or who applied the latest security updates are protected automatically.<\/p>\n<\/blockquote>\n<h3 class=\"crosshead\"><span>Final update on June 21<\/span><\/h3>\n<p>Meanwhile, Jacob Rossi, a Microsoft Edge project manager, told us, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/jacobrossi\/status\/1009886729711390720\">via Twitter<\/a>: &#8220;At times through the process we could have been more responsive in our communication with Jake, and we acknowledged this to him and are working to improve. But most of this communication gap was with regard to his desire to disclose the bug irresponsibly.&#8221;<\/p>\n<p>By irresponsibly, Rossi is referring to Archibald, at one point, suggesting, out of frustration, that he go public with details of the flaw before a patch was ready. &#8220;An empty threat to see if there was any way of actually getting a reply,&#8221; Archibald explained, meaning he had hoped to force Microsoft to respond after 17 days of silence.<\/p>\n<p>Rossi added: &#8220;We took this bug seriously, and patched within the industry standard 90-day window. At no point in time did our security team not have access to this bug.&#8221;<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/20\/browser_bug_odyssey\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fixing security issues in the face of standards gaps and vendor silence isn&#8217;t easy Updated\u00a0 Earlier this year, Jake Archibald, developer advocate for Google Chrome, found a bug affecting Mozilla Firefox and Microsoft Edge \u2013 and had two very different experiences trying to get the problem fixed.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4010,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-4009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Edge bug odyssey shows why we can&#039;t have nice things 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Edge bug odyssey shows why we can&#039;t have nice things 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T21:46:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Edge bug odyssey shows why we can&#8217;t have nice things\",\"datePublished\":\"2018-06-22T21:46:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/\"},\"wordCount\":890,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/\",\"name\":\"Microsoft Edge bug odyssey shows why we can't have nice things 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg\",\"datePublished\":\"2018-06-22T21:46:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Edge bug odyssey shows why we can&#8217;t have nice things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Edge bug odyssey shows why we can't have nice things 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Edge bug odyssey shows why we can't have nice things 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-22T21:46:18+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Edge bug odyssey shows why we can&#8217;t have nice things","datePublished":"2018-06-22T21:46:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/"},"wordCount":890,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/","name":"Microsoft Edge bug odyssey shows why we can't have nice things 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg","datePublished":"2018-06-22T21:46:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-edge-bug-odyssey-shows-why-we-cant-have-nice-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Edge bug odyssey shows why we can&#8217;t have nice things"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4009"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4009\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4010"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}