4.2
CVSSv3

CVE-2017-0140

Published: 17/03/2017 Updated: 03/10/2019
CVSS v2 Base Score: 4 | Impact Score: 4.9 | Exploitability Score: 4.9
CVSS v3 Base Score: 4.2 | Impact Score: 2.5 | Exploitability Score: 1.6
VMScore: 357
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N

Vulnerability Summary

Microsoft Edge allows remote malicious users to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0066 and CVE-2017-0135.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft edge

Exploits

It was found that the Fetch API in Microsoft Edge allows websites to set arbitrary HTTP request headers, including the Content-Length, and Host headers Amongst others, a malicious website can use this issue to bypass the same origin policy, read HTTP response headers, or initiate arbitrary HTTP requests from the victim's browser (HTTP request smug ...

Github Repositories

This cheatsheet is an overview of techniques to prevent common vulnerabilities within PHP web applications

PHP Security Cheatsheet This cheatsheet is an overview of techniques to prevent common vulnerabilities within PHP web applications All of the examples presented in this cheatsheet are for learning and experimentation purposes and are not meant to be used in a production system Most of the techniques and countermeasures are already built-in in many modern web application fram

This cheatsheet is an overview of techniques to prevent common vulnerabilities within PHP web applications

PHP Security Cheatsheet This cheatsheet is an overview of techniques to prevent common vulnerabilities within PHP web applications All of the examples presented in this cheatsheet are for learning and experimentation purposes and are not meant to be used in a production system Most of the techniques and countermeasures are already built-in in many modern web application fram

This cheatsheet is an overview of techniques to prevent common vulnerabilities within PHP web applications

PHP Security Cheatsheet This cheatsheet is an overview of techniques to prevent common vulnerabilities within PHP web applications All of the examples presented in this cheatsheet are for learning and experimentation purposes and are not meant to be used in a production system Most of the techniques and countermeasures are already built-in in many modern web application fram