Kaspersky ID:
KLA91031
Erkennungsdatum:
05/07/2026
Aktualisiert:
05/12/2026

Beschreibung

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Denial of service vulnerability in Media can be exploited remotely to cause denial of service.
  2. Denial of service vulnerability in WebRTC can be exploited remotely to cause denial of service.
  3. Denial of service vulnerability in Accessibility can be exploited remotely to cause denial of service.
  4. Denial of service vulnerability in ServiceWorker can be exploited remotely to cause denial of service.
  5. A remote code execution vulnerability in Blink can be exploited remotely to execute arbitrary code.
  6. A remote code execution vulnerability in ANGLE can be exploited remotely to execute arbitrary code.
  7. Denial of service vulnerability in Popup Blocker can be exploited remotely to cause denial of service.
  8. Security vulnerability in Autofill can be exploited to bypass security restrictions.
  9. Denial of service vulnerability in SanitizerAPI can be exploited remotely to cause denial of service.
  10. Information disclosure vulnerability in Media can be exploited to obtain sensitive information.
  11. Security vulnerability in WebUI can be exploited to bypass security restrictions.
  12. A remote code execution vulnerability in UI can be exploited remotely to execute arbitrary code.
  13. Denial of service vulnerability in GPU can be exploited remotely to cause denial of service.
  14. Denial of service vulnerability in Dialog can be exploited remotely to cause denial of service.
  15. A remote code execution vulnerability in Audio can be exploited remotely to execute arbitrary code.
  16. A remote code execution vulnerability in Shared Storage can be exploited remotely to execute arbitrary code.
  17. Denial of service vulnerability in Cast can be exploited remotely to cause denial of service.
  18. A remote code execution vulnerability in WebRTC can be exploited remotely to execute arbitrary code.
  19. A remote code execution vulnerability in DOM can be exploited remotely to execute arbitrary code.
  20. Security vulnerability in DevTools can be exploited to bypass security restrictions.
  21. Denial of service vulnerability in Navigation can be exploited remotely to cause denial of service.
  22. A remote code execution vulnerability in V8 can be exploited remotely to execute arbitrary code.
  23. Denial of service vulnerability in UI can be exploited remotely to cause denial of service.
  24. A remote code execution vulnerability in PresentationAPI can be exploited remotely to execute arbitrary code.
  25. Denial of service vulnerability in Canvas can be exploited remotely to cause denial of service.
  26. Denial of service vulnerability in Persistent Cache can be exploited remotely to cause denial of service.
  27. A remote code execution vulnerability in Chromoting can be exploited remotely to execute arbitrary code.
  28. Denial of service vulnerability in DevTools can be exploited remotely to cause denial of service.
  29. Denial of service vulnerability in FedCM can be exploited remotely to cause denial of service.
  30. Denial of service vulnerability in SiteIsolation can be exploited remotely to cause denial of service.
  31. A remote code execution vulnerability in Dawn can be exploited remotely to execute arbitrary code.
  32. Denial of service vulnerability in Fonts can be exploited remotely to cause denial of service.
  33. A remote code execution vulnerability in SVG can be exploited remotely to execute arbitrary code.
  34. Denial of service vulnerability in SSL can be exploited remotely to cause denial of service.
  35. A remote code execution vulnerability in CSS can be exploited remotely to execute arbitrary code.
  36. Denial of service vulnerability in WebCodecs can be exploited remotely to cause denial of service.
  37. Denial of service vulnerability in Speech can be exploited remotely to cause denial of service.
  38. Denial of service vulnerability in MHTML can be exploited remotely to cause denial of service.
  39. Denial of service vulnerability in Runtime can be exploited remotely to cause denial of service.
  40. Security vulnerability in Extensions can be exploited to bypass security restrictions.
  41. A remote code execution vulnerability in ServiceWorker can be exploited remotely to execute arbitrary code.
  42. Denial of service vulnerability in DataTransfer can be exploited remotely to cause denial of service.
  43. Denial of service vulnerability in Dawn can be exploited remotely to cause denial of service.
  44. Security vulnerability in Search can be exploited to bypass security restrictions.
  45. A remote code execution vulnerability in Passwords can be exploited remotely to execute arbitrary code.
  46. Denial of service vulnerability in Permissions can be exploited remotely to cause denial of service.
  47. Denial of service vulnerability in Network can be exploited remotely to cause denial of service.
  48. Denial of service vulnerability in Omnibox can be exploited remotely to cause denial of service.
  49. A remote code execution vulnerability in ReadingMode can be exploited remotely to execute arbitrary code.
  50. A remote code execution vulnerability in GPU can be exploited remotely to execute arbitrary code.
  51. A remote code execution vulnerability in Aura can be exploited remotely to execute arbitrary code.
  52. Denial of service vulnerability in COOP can be exploited remotely to cause denial of service.
  53. Denial of service vulnerability in ANGLE can be exploited remotely to cause denial of service.
  54. A remote code execution vulnerability in WebAudio can be exploited remotely to execute arbitrary code.
  55. A remote code execution vulnerability in DevTools can be exploited remotely to execute arbitrary code.
  56. A remote code execution vulnerability in GFX can be exploited remotely to execute arbitrary code.
  57. A remote code execution vulnerability in Skia can be exploited remotely to execute arbitrary code.
  58. A remote code execution vulnerability in Views can be exploited remotely to execute arbitrary code.
  59. Denial of service vulnerability in ORB can be exploited remotely to cause denial of service.
  60. A remote code execution vulnerability in Printing can be exploited remotely to execute arbitrary code.
  61. A remote code execution vulnerability in Fullscreen can be exploited remotely to execute arbitrary code.
  62. A remote code execution vulnerability in TopChrome can be exploited remotely to execute arbitrary code.
  63. Denial of service vulnerability in Preload can be exploited remotely to cause denial of service.
  64. Denial of service vulnerability in InterestGroups can be exploited remotely to cause denial of service.
  65. Denial of service vulnerability in Updater can be exploited remotely to cause denial of service.
  66. Denial of service vulnerability in V8 can be exploited remotely to cause denial of service.
  67. Denial of service vulnerability in TabGroups can be exploited remotely to cause denial of service.
  68. Security vulnerability in Downloads can be exploited to bypass security restrictions.
  69. An information disclosure vulnerability in Copilot Chat (Microsoft Edge) can be exploited remotely to obtain sensitive information.
  70. A remote code execution vulnerability in MediaRecording can be exploited remotely to execute arbitrary code.
  71. Denial of service vulnerability in FileSystem can be exploited remotely to cause denial of service.
  72. Denial of service vulnerability in Companion can be exploited remotely to cause denial of service.
  73. Denial of service vulnerability in Cookies can be exploited remotely to cause denial of service.
  74. Denial of service vulnerability in Chromoting can be exploited remotely to cause denial of service.
  75. Security vulnerability in WebApp can be exploited to bypass security restrictions.
  76. A remote code execution vulnerability in Speech can be exploited remotely to execute arbitrary code.
  77. Denial of service vulnerability in Skia can be exploited remotely to cause denial of service.
  78. A remote code execution vulnerability in Navigation can be exploited remotely to execute arbitrary code.
  79. Script injection in UI
  80. A remote code execution vulnerability in Network can be exploited remotely to execute arbitrary code.
  81. Denial of service vulnerability in AdFilter can be exploited remotely to cause denial of service.
  82. Denial of service vulnerability in Codecs can be exploited remotely to cause denial of service.
  83. Security vulnerability in DirectSockets can be exploited to bypass security restrictions.
  84. Denial of service vulnerability in ChromeDriver can be exploited remotely to cause denial of service.
  85. Denial of service vulnerability in CORS can be exploited remotely to cause denial of service.

Ursprüngliche Informationshinweise

Betroffene Produkte

CVE Liste

  • CVE-2026-7896
    critical
  • CVE-2026-7898
    critical
  • CVE-2026-7899
    critical
  • CVE-2026-7900
    critical
  • CVE-2026-7901
    critical
  • CVE-2026-7902
    critical
  • CVE-2026-7903
    critical
  • CVE-2026-7904
    warning
  • CVE-2026-7906
    critical
  • CVE-2026-7907
    critical
  • CVE-2026-7908
    critical
  • CVE-2026-7909
    warning
  • CVE-2026-7910
    critical
  • CVE-2026-7911
    critical
  • CVE-2026-7914
    critical
  • CVE-2026-7916
    critical
  • CVE-2026-7917
    critical
  • CVE-2026-7918
    critical
  • CVE-2026-7919
    critical
  • CVE-2026-7920
    critical
  • CVE-2026-7921
    critical
  • CVE-2026-7922
    critical
  • CVE-2026-7923
    critical
  • CVE-2026-7924
    high
  • CVE-2026-7925
    critical
  • CVE-2026-7926
    critical
  • CVE-2026-7927
    critical
  • CVE-2026-7928
    critical
  • CVE-2026-7929
    critical
  • CVE-2026-7930
    critical
  • CVE-2026-7932
    warning
  • CVE-2026-7933
    warning
  • CVE-2026-7934
    warning
  • CVE-2026-7935
    high
  • CVE-2026-7936
    warning
  • CVE-2026-7937
    warning
  • CVE-2026-7938
    critical
  • CVE-2026-7939
    high
  • CVE-2026-7940
    critical
  • CVE-2026-7942
    warning
  • CVE-2026-7943
    warning
  • CVE-2026-7944
    warning
  • CVE-2026-7945
    warning
  • CVE-2026-7946
    warning
  • CVE-2026-7947
    warning
  • CVE-2026-7948
    critical
  • CVE-2026-7949
    warning
  • CVE-2026-7950
    high
  • CVE-2026-7951
    critical
  • CVE-2026-7952
    warning
  • CVE-2026-7953
    high
  • CVE-2026-7954
    warning
  • CVE-2026-7955
    high
  • CVE-2026-7956
    critical
  • CVE-2026-7957
    critical
  • CVE-2026-7958
    high
  • CVE-2026-7959
    warning
  • CVE-2026-7960
    high
  • CVE-2026-7961
    warning
  • CVE-2026-7962
    high
  • CVE-2026-7963
    critical
  • CVE-2026-7964
    warning
  • CVE-2026-7965
    warning
  • CVE-2026-7966
    warning
  • CVE-2026-7967
    critical
  • CVE-2026-7968
    warning
  • CVE-2026-7969
    warning
  • CVE-2026-7970
    critical
  • CVE-2026-7971
    high
  • CVE-2026-7972
    warning
  • CVE-2026-7973
    critical
  • CVE-2026-7974
    critical
  • CVE-2026-7975
    critical
  • CVE-2026-7976
    critical
  • CVE-2026-7977
    high
  • CVE-2026-7978
    critical
  • CVE-2026-7979
    warning
  • CVE-2026-7980
    critical
  • CVE-2026-7981
    critical
  • CVE-2026-7982
    high
  • CVE-2026-7983
    warning
  • CVE-2026-7984
    critical
  • CVE-2026-7985
    critical
  • CVE-2026-7986
    warning
  • CVE-2026-7987
    critical
  • CVE-2026-7988
    critical
  • CVE-2026-7989
    warning
  • CVE-2026-7990
    critical
  • CVE-2026-7991
    critical
  • CVE-2026-7992
    critical
  • CVE-2026-7994
    critical
  • CVE-2026-7995
    critical
  • CVE-2026-7996
    warning
  • CVE-2026-7997
    critical
  • CVE-2026-7998
    high
  • CVE-2026-7999
    warning
  • CVE-2026-8000
    critical
  • CVE-2026-8001
    critical
  • CVE-2026-8002
    critical
  • CVE-2026-8003
    high
  • CVE-2026-8004
    warning
  • CVE-2026-8005
    warning
  • CVE-2026-8006
    high
  • CVE-2026-8007
    critical
  • CVE-2026-8008
    high
  • CVE-2026-8009
    warning
  • CVE-2026-8010
    high
  • CVE-2026-8011
    warning
  • CVE-2026-8012
    high
  • CVE-2026-8013
    warning
  • CVE-2026-8014
    warning
  • CVE-2026-8015
    high
  • CVE-2026-8016
    critical
  • CVE-2026-8017
    warning
  • CVE-2026-8018
    critical
  • CVE-2026-8019
    high
  • CVE-2026-8021
    warning
  • CVE-2026-8022
    warning
  • CVE-2026-33111
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.