Search
Search Results (944 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-6345 | 4 Debian, Fedoraproject, Google and 1 more | 4 Debian Linux, Fedora, Chrome and 1 more | 2025-07-30 | 9.6 Critical |
Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High) | ||||
CVE-2024-7965 | 2 Google, Microsoft | 2 Chrome, Edge Chromium | 2025-07-30 | 8.8 High |
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2024-7971 | 2 Google, Microsoft | 2 Chrome, Edge | 2025-07-30 | 9.6 Critical |
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2022-41115 | 1 Microsoft | 1 Edge Chromium | 2025-07-22 | 6.6 Medium |
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability | ||||
CVE-2022-44708 | 1 Microsoft | 2 Edge, Edge Chromium | 2025-07-22 | 8.3 High |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | ||||
CVE-2022-44688 | 1 Microsoft | 1 Edge Chromium | 2025-07-22 | 4.3 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2025-47182 | 1 Microsoft | 1 Edge Chromium | 2025-07-17 | 5.6 Medium |
Improper input validation in Microsoft Edge (Chromium-based) allows an authorized attacker to bypass a security feature locally. | ||||
CVE-2025-47963 | 1 Microsoft | 1 Edge Chromium | 2025-07-17 | 6.3 Medium |
No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. | ||||
CVE-2025-47964 | 1 Microsoft | 2 Edge, Edge Chromium | 2025-07-17 | 5.4 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2024-38083 | 1 Microsoft | 1 Edge Chromium | 2025-07-16 | 4.3 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2024-30057 | 1 Microsoft | 1 Edge | 2025-07-16 | 5.4 Medium |
Microsoft Edge for iOS Spoofing Vulnerability | ||||
CVE-2024-38082 | 1 Microsoft | 1 Edge | 2025-07-16 | 4.7 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2024-38093 | 1 Microsoft | 1 Edge | 2025-07-16 | 4.3 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2025-29825 | 1 Microsoft | 1 Edge Chromium | 2025-07-15 | 6.5 Medium |
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. | ||||
CVE-2025-47181 | 1 Microsoft | 1 Edge Update | 2025-07-15 | 8.8 High |
Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally. | ||||
CVE-2023-29350 | 1 Microsoft | 1 Edge Chromium | 2025-07-10 | 7.5 High |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | ||||
CVE-2023-29354 | 1 Microsoft | 1 Edge Chromium | 2025-07-10 | 4.7 Medium |
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | ||||
CVE-2024-43472 | 1 Microsoft | 1 Edge Chromium | 2025-07-10 | 5.8 Medium |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | ||||
CVE-2024-38210 | 1 Microsoft | 1 Edge Chromium | 2025-07-10 | 7.8 High |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | ||||
CVE-2024-38207 | 1 Microsoft | 1 Edge Chromium | 2025-07-10 | 6.3 Medium |
Microsoft Edge (HTML-based) Memory Corruption Vulnerability |