Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Edge
(Microsoft)Repositories | https://github.com/Microsoft/ChakraCore |
#Vulnerabilities | 747 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-06-12 | CVE-2019-1051 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited... | Chakracore, Edge | 4.2 | ||
2019-06-12 | CVE-2019-1052 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited... | Chakracore, Edge | 4.2 | ||
2019-06-12 | CVE-2019-1054 | A security feature bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW). Failing to set the MOTW means that a large number of Microsoft security technologies are bypassed. In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass. Alternatively, in an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed... | Edge | 5.0 | ||
2019-06-12 | CVE-2019-1081 | An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content could contain... | Edge, Internet_explorer | 4.2 | ||
2020-09-11 | CVE-2020-0878 | <p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could... | Chakracore, Edge, Internet_explorer | N/A | ||
2021-03-11 | CVE-2021-26411 | Internet Explorer Memory Corruption Vulnerability | Edge, Internet_explorer | N/A | ||
2022-11-25 | CVE-2022-4135 | Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | Chrome, Edge, Edge_chromium | 9.6 | ||
2023-04-11 | CVE-2023-28284 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Edge | N/A | ||
2023-04-11 | CVE-2023-28301 | Microsoft Edge (Chromium-based) Tampering Vulnerability | Edge | N/A | ||
2023-07-14 | CVE-2023-36883 | Microsoft Edge for iOS Spoofing Vulnerability | Edge | N/A |