Microsoft Edge vulnerabilities

411 known vulnerabilities affecting microsoft/microsoft_edge.

Total CVEs
411
CISA KEV
2
actively exploited
Public exploits
26
Exploited in wild
4
Severity breakdown
CRITICAL7HIGH244MEDIUM152LOW8

Vulnerabilities

Page 10 of 21
CVE-2021-36931HIGHCVSS 7.8≥ 1.0.0, < 92.0.902.552021-08-26
CVE-2021-36931 [HIGH] CWE-269 CVE-2021-36931: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
cvelistv5nvd
CVE-2021-36929MEDIUMCVSS 5.5≥ 1.0.0, < 92.0.902.552021-08-26
CVE-2021-36929 [MEDIUM] CVE-2021-36929: Microsoft Edge (Chromium-based) Information Disclosure Vulnerability Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
cvelistv5nvd
CVE-2021-33741HIGHCVSS 7.5≥ 1.0.0, < 91.0.864.412021-06-08
CVE-2021-33741 [HIGH] CVE-2021-33741: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
cvelistv5nvd
CVE-2021-26411HIGHCVSS 8.8KEV≥ 1.0..0, < publication2021-03-11
CVE-2021-26411 [HIGH] Internet Explorer Memory Corruption Vulnerability Internet Explorer Memory Corruption Vulnerability Internet Explorer Memory Corruption Vulnerability
cvelistv5
CVE-2021-24113MEDIUMCVSS 5.4≥ 1.0.0, < publication2021-02-25
CVE-2021-24113 [MEDIUM] CVE-2021-24113: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
cvelistv5nvd
CVE-2021-1705HIGHCVSS 7.5≥ 1.0..0, < publication2021-01-12
CVE-2021-1705 [HIGH] CVE-2021-1705: Microsoft Edge (HTML-based) Memory Corruption Vulnerability Microsoft Edge (HTML-based) Memory Corruption Vulnerability
cvelistv5nvd
CVE-2020-17131HIGHCVSS 7.5≥ 1.0..0, < publication2020-12-10
CVE-2020-17131 [HIGH] CWE-787 CVE-2020-17131: Chakra Scripting Engine Memory Corruption Vulnerability Chakra Scripting Engine Memory Corruption Vulnerability
cvelistv5nvd
CVE-2020-17054HIGHCVSS 7.5≥ 1.0..0, < publication2020-11-11
CVE-2020-17054 [HIGH] CWE-787 CVE-2020-17054: Chakra Scripting Engine Memory Corruption Vulnerability Chakra Scripting Engine Memory Corruption Vulnerability
cvelistv5nvd
CVE-2020-17048HIGHCVSS 8.1≥ 1.0..0, < publication2020-11-11
CVE-2020-17048 [HIGH] CWE-787 CVE-2020-17048: Chakra Scripting Engine Memory Corruption Vulnerability Chakra Scripting Engine Memory Corruption Vulnerability
cvelistv5nvd
CVE-2020-17058HIGHCVSS 7.5≥ 1.0..0, < publication2020-11-11
CVE-2020-17058 [HIGH] Microsoft Browser Memory Corruption Vulnerability Microsoft Browser Memory Corruption Vulnerability Microsoft Browser Memory Corruption Vulnerability
cvelistv5
CVE-2020-17052HIGHCVSS 7.5≥ 1.0..0, < publication2020-11-11
CVE-2020-17052 [HIGH] Scripting Engine Memory Corruption Vulnerability Scripting Engine Memory Corruption Vulnerability Scripting Engine Memory Corruption Vulnerability
cvelistv5
CVE-2020-1057HIGHCVSS 8.1≥ 1.0..0, < publication2020-09-11
CVE-2020-1057 [HIGH] CWE-787 CVE-2020-1057: <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine hand A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the curr
cvelistv5nvd
CVE-2020-1172HIGHCVSS 7.5≥ 1.0..0, < publication2020-09-11
CVE-2020-1172 [HIGH] CWE-787 CVE-2020-1172: <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine hand A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the curr
cvelistv5nvd
CVE-2020-1180HIGHCVSS 7.5≥ 1.0..0, < publication2020-09-11
CVE-2020-1180 [HIGH] CWE-787 CVE-2020-1180: <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine hand A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the curr
cvelistv5nvd
CVE-2020-0878HIGHCVSS 7.5KEV≥ 1.0..0, < publication2020-09-11
CVE-2020-0878 [HIGH] CWE-787 CVE-2020-0878: <p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
cvelistv5nvd
CVE-2020-16884HIGHCVSS 8.8≥ 1.0.0, < publication2020-09-11
CVE-2020-16884 [HIGH] CWE-787 CVE-2020-16884: <p>A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object ( A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object (BHO) plugin on Internet Explorer handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability coul
cvelistv5nvd
CVE-2020-1569HIGHCVSS 7.5≥ 1.0..0, < publication2020-08-17
CVE-2020-1569 [HIGH] CWE-787 CVE-2020-1569: A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memo A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. I
cvelistv5nvd
CVE-2020-1555HIGHCVSS 8.8≥ 1.0..0, < publication2020-08-17
CVE-2020-1555 [HIGH] CWE-787 CVE-2020-1555: A remote code execution vulnerability exists in the way that the scripting engine handles objects in A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same use
cvelistv5nvd
CVE-2020-1568HIGHCVSS 7.5≥ 1.0..0, < publication2020-08-17
CVE-2020-1568 [HIGH] CVE-2020-1568: A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objec A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
cvelistv5nvd
CVE-2020-1195MEDIUMCVSS 5.9vunspecified2020-05-21
CVE-2020-1195 [MEDIUM] CWE-20 CVE-2020-1195: An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when the Feedback An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when the Feedback extension improperly validates input, aka 'Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability'.
cvelistv5nvd