Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft edge - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-26247
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge
NA
CVE-2024-26196
Microsoft Edge for Android (Chromium-based) Information Disclosure Vulnerability
Microsoft Edge
NA
CVE-2024-26163
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge Chromium
NA
CVE-2024-26246
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Microsoft Edge
NA
CVE-2024-26167
Microsoft Edge for Android Spoofing Vulnerability
1 Article
NA
CVE-2024-26192
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
NA
CVE-2024-26188
Microsoft Edge (Chromium-based) Spoofing Vulnerability
NA
CVE-2024-21423
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
NA
CVE-2023-50387
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote malicious users to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is...
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows Server 2022 23h2 -
Fedoraproject Fedora 39
Thekelleys Dnsmasq
Nic Knot Resolver
Powerdns Recursor
Isc Bind
Nlnetlabs Unbound
3 Github repositories
2 Articles
NA
CVE-2024-21399
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Microsoft Edge Chromium
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »