Kaspersky ID:
KLA90935
Date de la détection:
03/13/2026
Mis à jour:
03/16/2026

Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Out of bounds read vulnerability in Web Speech can be exploited to cause denial of service.
  2. Use after free vulnerability in WebMIDI can be exploited to cause denial of service or execute arbitrary code.
  3. Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
  4. Inappropriate implementation in V8 can be exploited to cause denial of service or execute arbitrary code.
  5. Policy enforcement vulnerability in Clipboard can be exploited to cause denial of service.
  6. Heap buffer overflow vulnerability in WebML can be exploited to cause denial of service.
  7. Policy enforcement vulnerability in PDF can be exploited to cause denial of service.
  8. A spoofing vulnerability in Microsoft Edge (Chromium-based) for Android can be exploited remotely to spoof user interface.
  9. Use after free vulnerability in TextEncoding can be exploited to cause denial of service or execute arbitrary code.
  10. Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
  11. Security UI vulnerability in LookalikeChecks can be exploited to spoof user interface.
  12. Policy enforcement vulnerability in ChromeDriver can be exploited to cause denial of service.
  13. Use after free vulnerability in WebMCP can be exploited to cause denial of service or execute arbitrary code.
  14. Security UI vulnerability in WebAppInstalls can be exploited to spoof user interface.
  15. Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
  16. Use after free vulnerability in WebView can be exploited to cause denial of service or execute arbitrary code.
  17. Security UI vulnerability in PictureInPicture can be exploited to spoof user interface.
  18. Use after free vulnerability in MediaStream can be exploited to cause denial of service or execute arbitrary code.
  19. Heap buffer overflow vulnerability in ResourceTiming can be exploited to cause denial of service.
  20. Out of bounds read vulnerability in V8 can be exploited to cause denial of service.
  21. Heap buffer overflow vulnerability in Navigation can be exploited to cause denial of service.
  22. Use after free vulnerability in Agents can be exploited to cause denial of service or execute arbitrary code.
  23. Integer overflow vulnerability in WebML can be exploited to cause execute arbitrary code and denial of service.
  24. Security UI vulnerability in Downloads can be exploited to spoof user interface.
  25. Use after free vulnerability in WindowDialog can be exploited to cause denial of service or execute arbitrary code.
  26. Policy enforcement vulnerability in Extensions can be exploited to cause denial of service.
  27. Out of bounds memory access vulnerability in WebML can be exploited to cause denial of service.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2026-3913
    critical
  • CVE-2026-3914
    critical
  • CVE-2026-3915
    critical
  • CVE-2026-3916
    critical
  • CVE-2026-3917
    critical
  • CVE-2026-3918
    critical
  • CVE-2026-3919
    critical
  • CVE-2026-3920
    critical
  • CVE-2026-3921
    critical
  • CVE-2026-3922
    critical
  • CVE-2026-3923
    critical
  • CVE-2026-3924
    critical
  • CVE-2026-3925
    warning
  • CVE-2026-3926
    critical
  • CVE-2026-3927
    warning
  • CVE-2026-3928
    unknown
  • CVE-2026-3929
    warning
  • CVE-2026-3930
    unknown
  • CVE-2026-3931
    critical
  • CVE-2026-3932
    unknown
  • CVE-2026-3934
    unknown
  • CVE-2026-3935
    unknown
  • CVE-2026-3936
    critical
  • CVE-2026-3937
    unknown
  • CVE-2026-3938
    unknown
  • CVE-2026-3939
    unknown
  • CVE-2026-3940
    unknown
  • CVE-2026-3941
    warning
  • CVE-2026-3942
    warning
  • CVE-2026-3910
    critical
  • CVE-2026-0385
    warning

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.