CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 6.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2.5 |
LOW |
||
Microsoft Edge for Android Spoofing Vulnerability | 5.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 3.3 |
LOW |
||
Microsoft Edge for Android Information Disclosure Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 9.6 |
CRITICAL |
||
Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 5.5 |
MEDIUM |
||
Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 5.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 5.2 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 6.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 4.3 |
MEDIUM |
||
Type confusion in V8 in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 8.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 4.8 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 9.6 |
CRITICAL |
||
Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High) | 9.6 |
CRITICAL |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 6.6 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.1 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.1 |
HIGH |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 7.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 6.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 6.6 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 7.3 |
HIGH |
||
Adobe Acrobat for Edge version 118.0.2088.46 (and earlier) is affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 5.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.2 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.1 |
HIGH |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 6.1 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 9.6 |
CRITICAL |
||
Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) | 8.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 3.1 |
LOW |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 6.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 6.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.7 |
MEDIUM |
||
Microsoft Edge for Android Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 7.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 5.4 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 8.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 6.1 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.7 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 3.1 |
LOW |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.5 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.2 |
HIGH |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 6.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 6.1 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.5 |
HIGH |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 4.7 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.5 |
HIGH |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 6.1 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 5.7 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 6.1 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability | 8.2 |
HIGH |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Tampering Vulnerability | 5.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 6.5 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability | 6.6 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | 9.6 |
CRITICAL |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 5.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.5 |
HIGH |
||
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 9.6 |
CRITICAL |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.3 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.7 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 6.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Tampering Vulnerability | 5.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 6.1 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 4.2 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 4.2 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 2.5 |
LOW |
||
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 4.2 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 7.5 |
HIGH |
||
Microsoft Edge (Chromium-based) Tampering Vulnerability | 8.8 |
HIGH |
||
Chromium: CVE-2021-30624 Use after free in Autofill | 8.8 |
HIGH |
||
Chromium: CVE-2021-30623 Use after free in Bookmarks | 8.8 |
HIGH |
||
Chromium: CVE-2021-30622 Use after free in WebApp Installs | 8.8 |
HIGH |
||
Chromium: CVE-2021-30621 UI Spoofing in Autofill | 6.5 |
MEDIUM |
||
Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink | 8.8 |
HIGH |
||
Chromium: CVE-2021-30619 UI Spoofing in Autofill | 6.5 |
MEDIUM |
||
Chromium: CVE-2021-30618 Inappropriate implementation in DevTools | 8.8 |
HIGH |
||
Chromium: CVE-2021-30617 Policy bypass in Blink | 6.5 |
MEDIUM |
||
Chromium: CVE-2021-30616 Use after free in Media | 8.8 |
HIGH |
||
Chromium: CVE-2021-30615 Cross-origin data leak in Navigation | 6.5 |
MEDIUM |
||
Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip | 8.8 |
HIGH |
||
Chromium: CVE-2021-30613 Use after free in Base internals | 8.8 |
HIGH |
||
Chromium: CVE-2021-30612 Use after free in WebRTC | 8.8 |
HIGH |
||
Chromium: CVE-2021-30611 Use after free in WebRTC | 8.8 |
HIGH |
||
Chromium: CVE-2021-30610 Use after free in Extensions API | 8.8 |
HIGH |
||
Chromium: CVE-2021-30609 Use after free in Sign-In | 8.8 |
HIGH |
||
Chromium: CVE-2021-30608 Use after free in Web Share | 8.8 |
HIGH |
||
Chromium: CVE-2021-30607 Use after free in Permissions | 8.8 |
HIGH |
||
Chromium: CVE-2021-30606 Use after free in Blink | 8.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 6.3 |
MEDIUM |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 7.8 |
HIGH |
||
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 8.2 |
HIGH |
||
Use after free in Web Sockets in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
HIGH |
||
Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 6.5 |
MEDIUM |
||
Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page. | 6.5 |
MEDIUM |
||
Inappropriate implementation in Performance API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 6.5 |
MEDIUM |
||
Insufficient policy enforcement in WebView in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 6.5 |
MEDIUM |
||
Incorrect security UI in Page Info in Google Chrome on iOS prior to 88.0.4324.96 allowed a remote attacker to spoof security UI via a crafted HTML page. | 6.5 |
MEDIUM |
||
Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension. | 9.6 |
CRITICAL |
||
Insufficient policy enforcement in Downloads in Google Chrome prior to 88.0.4324.96 allowed an attacker who convinced a user to download files to bypass navigation restrictions via a crafted HTML page. | 6.5 |
MEDIUM |
||
Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | 6.5 |
MEDIUM |
||
Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | 6.5 |
MEDIUM |
||
Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | 6.5 |
MEDIUM |
||
Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
HIGH |
||
Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. | 6.5 |
MEDIUM |
||
Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass content security policy via a crafted Chrome Extension. | 8.8 |
HIGH |
||
Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | 8.1 |
HIGH |
||
Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | 6.5 |
MEDIUM |
||
Potential user after free in Speech Recognizer in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | 9.6 |
CRITICAL |
||
Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
HIGH |
||
Use after free in WebSQL in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
HIGH |
||
Use after free in Omnibox in Google Chrome on Linux prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | 9.6 |
CRITICAL |
||
Use after free in Media in Google Chrome prior to 88.0.4324.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
HIGH |
||
Insufficient data validation in V8 in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | 8.8 |
HIGH |
||
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
HIGH |