Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft edge - vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2016-3331
Microsoft Internet Explorer 11 and Microsoft Edge allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
Microsoft Internet Explorer 11
Microsoft Edge -
9.3
CVSSv2
CVE-2016-3382
The scripting engines in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by the Chakra JavaScript engine, aka "Scriptin...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Edge -
Microsoft Internet Explorer 11
9.3
CVSSv2
CVE-2016-3386
The Chakra JavaScript engine in Microsoft Edge allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-201...
Microsoft Edge -
1 EDB exploit
9.3
CVSSv2
CVE-2016-3319
The PDF library in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold and 1511, and Microsoft Edge allows remote malicious users to execute arbitrary code via a crafted PDF file, aka "Microsoft PDF Remote Code Execution Vulnerability."
Microsoft Windows 8.1
Microsoft Windows 10 1511
Microsoft Windows Server 2012 R2
Microsoft Edge
Microsoft Windows 10 1607
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
9.3
CVSSv2
CVE-2016-3248
The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in Microsoft Internet Explorer 9 through 11, Microsoft Edge, and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a cra...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Edge
9.3
CVSSv2
CVE-2016-3259
The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in Microsoft Internet Explorer 9 through 11, Microsoft Edge, and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a cra...
Microsoft Edge -
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
9.3
CVSSv2
CVE-2016-3265
The Chakra JavaScript engine in Microsoft Edge allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-201...
Microsoft Edge -
9.3
CVSSv2
CVE-2016-3260
The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in Microsoft Internet Explorer 11, Microsoft Edge, and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web s...
Microsoft Edge -
Microsoft Internet Explorer 11
9.3
CVSSv2
CVE-2016-3269
The Chakra JavaScript engine in Microsoft Edge allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-201...
Microsoft Edge -
9.3
CVSSv2
CVE-2016-4126
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and previous versions, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Adobe Air Desktop Runtime
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »