If a browser is not authorized on a network, can browser emulation within an authorized browser create vulnerabilities?
For instance, Chrome is unauthorized but if I run IE, press F12 to get into Developer mode, and then have it emulate Chrome, will it just change how it deals with HTTP traffic, how it makes the page appear, or will it take on the security profile of Chrome?
To make the question more targeted and clear: say that Chrome has vulnerabilities A, B, and C. Will emulation inherit those same vulnerabilities? It's nothing specific but how much is being emulated, exactly?
Beyond that, threat assessments that kept Chrome from being authorized can be weighed to see if those still exist on a case-by-case basis. So, I'm just wanting to see what is changed in the broad scope.