Total
749 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-30615 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 4.3 MEDIUM | 6.5 MEDIUM |
Chromium: CVE-2021-30615 Cross-origin data leak in Navigation | |||||
CVE-2021-30621 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 4.3 MEDIUM | 6.5 MEDIUM |
Chromium: CVE-2021-30621 UI Spoofing in Autofill | |||||
CVE-2021-30622 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Chromium: CVE-2021-30622 Use after free in WebApp Installs | |||||
CVE-2021-30624 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Chromium: CVE-2021-30624 Use after free in Autofill | |||||
CVE-2021-30608 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Chromium: CVE-2021-30608 Use after free in Web Share | |||||
CVE-2021-30614 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip | |||||
CVE-2021-30607 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Chromium: CVE-2021-30607 Use after free in Permissions | |||||
CVE-2021-30616 | 2 Fedoraproject, Microsoft | 3 Fedora, Edge, Edge Chromium | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Chromium: CVE-2021-30616 Use after free in Media | |||||
CVE-2020-17131 | 1 Microsoft | 4 Chakracore, Edge, Windows 10 and 1 more | 2024-02-28 | 5.1 MEDIUM | 4.2 MEDIUM |
Chakra Scripting Engine Memory Corruption Vulnerability | |||||
CVE-2020-17048 | 1 Microsoft | 5 Chakracore, Edge, Windows 10 and 2 more | 2024-02-28 | 6.8 MEDIUM | 4.2 MEDIUM |
Chakra Scripting Engine Memory Corruption Vulnerability | |||||
CVE-2021-21140 | 2 Google, Microsoft | 2 Chrome, Edge | 2024-02-28 | 4.6 MEDIUM | 6.8 MEDIUM |
Uninitialized use in USB in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform out of bounds memory access via via a USB device. | |||||
CVE-2021-24100 | 1 Microsoft | 1 Edge | 2024-02-28 | 2.6 LOW | 5.0 MEDIUM |
Microsoft Edge for Android Information Disclosure Vulnerability | |||||
CVE-2021-21157 | 4 Fedoraproject, Google, Linux and 1 more | 5 Fedora, Chrome, Linux Kernel and 2 more | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Use after free in Web Sockets in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | |||||
CVE-2020-17052 | 1 Microsoft | 10 Edge, Internet Explorer, Windows 10 and 7 more | 2024-02-28 | 6.8 MEDIUM | 7.5 HIGH |
Scripting Engine Memory Corruption Vulnerability | |||||
CVE-2020-17153 | 1 Microsoft | 1 Edge | 2024-02-28 | 5.8 MEDIUM | 4.3 MEDIUM |
Microsoft Edge for Android Spoofing Vulnerability | |||||
CVE-2020-17058 | 1 Microsoft | 5 Edge, Internet Explorer, Windows 10 and 2 more | 2024-02-28 | 7.6 HIGH | 7.5 HIGH |
Microsoft Browser Memory Corruption Vulnerability | |||||
CVE-2021-21141 | 2 Google, Microsoft | 2 Chrome, Edge | 2024-02-28 | 4.3 MEDIUM | 6.5 MEDIUM |
Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass file extension policy via a crafted HTML page. | |||||
CVE-2020-17054 | 1 Microsoft | 5 Chakracore, Edge, Windows 10 and 2 more | 2024-02-28 | 7.6 HIGH | 4.2 MEDIUM |
Chakra Scripting Engine Memory Corruption Vulnerability | |||||
CVE-2020-1219 | 1 Microsoft | 11 Chakracore, Edge, Internet Explorer and 8 more | 2024-02-28 | 7.6 HIGH | 7.5 HIGH |
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'. | |||||
CVE-2020-1220 | 1 Microsoft | 9 Edge, Windows 10, Windows 7 and 6 more | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
A spoofing vulnerability exists when theMicrosoft Edge (Chromium-based) in IE Mode improperly handles specific redirects, aka 'Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability'. |