Search Results (Refine Search)
- Keyword (text search): cpe:2.3:a:microsoft:edge_chromium:90.0.818.46:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-43496 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Published: September 19, 2024; 5:15:15 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-43489 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Published: September 19, 2024; 5:15:15 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-38221 |
Microsoft Edge (Chromium-based) Spoofing Vulnerability Published: September 19, 2024; 5:15:13 PM -0400 |
V4.0:(not available) V3.1: 4.3 MEDIUM V2.0:(not available) |
CVE-2024-38207 |
Microsoft Edge (HTML-based) Memory Corruption Vulnerability Published: August 23, 2024; 7:15:08 PM -0400 |
V4.0:(not available) V3.1: 6.3 MEDIUM V2.0:(not available) |
CVE-2024-38210 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Published: August 22, 2024; 7:15:07 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-38209 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Published: August 22, 2024; 7:15:07 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-7965 |
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Published: August 21, 2024; 5:15:08 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-43472 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Published: August 16, 2024; 4:15:13 PM -0400 |
V4.0:(not available) V3.1: 8.3 HIGH V2.0:(not available) |
CVE-2024-38219 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Published: August 12, 2024; 9:38:24 AM -0400 |
V4.0:(not available) V3.1: 9.0 CRITICAL V2.0:(not available) |
CVE-2024-21399 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Published: February 01, 2024; 8:15:08 PM -0500 |
V4.0:(not available) V3.1: 8.3 HIGH V2.0:(not available) |
CVE-2024-21388 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Published: January 30, 2024; 1:15:48 PM -0500 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2024-21336 |
Microsoft Edge (Chromium-based) Spoofing Vulnerability Published: January 26, 2024; 1:15:12 PM -0500 |
V4.0:(not available) V3.1: 2.5 LOW V2.0:(not available) |
CVE-2024-21387 |
Microsoft Edge for Android Spoofing Vulnerability Published: January 25, 2024; 8:15:10 PM -0500 |
V4.0:(not available) V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2024-21385 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Published: January 25, 2024; 8:15:10 PM -0500 |
V4.0:(not available) V3.1: 8.3 HIGH V2.0:(not available) |
CVE-2024-21383 |
Microsoft Edge (Chromium-based) Spoofing Vulnerability Published: January 25, 2024; 8:15:10 PM -0500 |
V4.0:(not available) V3.1: 3.3 LOW V2.0:(not available) |
CVE-2024-21382 |
Microsoft Edge for Android Information Disclosure Vulnerability Published: January 25, 2024; 8:15:10 PM -0500 |
V4.0:(not available) V3.1: 4.3 MEDIUM V2.0:(not available) |
CVE-2024-21326 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Published: January 25, 2024; 8:15:10 PM -0500 |
V4.0:(not available) V3.1: 9.6 CRITICAL V2.0:(not available) |
CVE-2024-20721 |
Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: January 15, 2024; 8:15:08 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20709 |
Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: January 15, 2024; 8:15:07 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-21337 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Published: January 11, 2024; 5:15:46 PM -0500 |
V4.0:(not available) V3.1: 5.2 MEDIUM V2.0:(not available) |