Filtered by vendor Microsoft Subscriptions
Filtered by product Edge Subscriptions
Total 764 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-29796 1 Microsoft 1 Edge 2026-02-13 4.7 Medium
User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-49736 2 Google, Microsoft 2 Android, Edge 2026-02-13 4.3 Medium
The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-49755 2 Google, Microsoft 2 Android, Edge 2026-02-13 4.3 Medium
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
CVE-2024-38083 1 Microsoft 2 Edge, Edge Chromium 2025-12-17 4.3 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2024-30057 1 Microsoft 1 Edge 2025-12-17 5.4 Medium
Microsoft Edge for iOS Spoofing Vulnerability
CVE-2024-38082 1 Microsoft 2 Edge, Edge Chromium 2025-12-17 4.7 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2024-38093 1 Microsoft 2 Edge, Edge Chromium 2025-12-17 4.3 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2024-38156 1 Microsoft 2 Edge, Edge Chromium 2025-12-09 6.1 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2024-38103 1 Microsoft 2 Edge, Edge Chromium 2025-12-09 5.9 Medium
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2015-0311 6 Adobe, Apple, Linux and 3 more 15 Flash Player, Mac Os X, Linux Kernel and 12 more 2025-11-17 7.8 High
Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
CVE-2015-0313 6 Adobe, Apple, Linux and 3 more 16 Flash Player, Mac Os X, Linux Kernel and 13 more 2025-11-17 7.8 High
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
CVE-2021-26411 1 Microsoft 16 Edge, Internet Explorer, Windows 10 1507 and 13 more 2025-10-30 8.8 High
Internet Explorer Memory Corruption Vulnerability
CVE-2020-16009 7 Cefsharp, Debian, Fedoraproject and 4 more 9 Cefsharp, Debian Linux, Fedora and 6 more 2025-10-24 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-4135 2 Google, Microsoft 3 Chrome, Edge, Edge Chromium 2025-10-24 9.6 Critical
Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CVE-2023-5217 8 Apple, Debian, Fedoraproject and 5 more 15 Ipados, Iphone Os, Debian Linux and 12 more 2025-10-24 8.8 High
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-7971 2 Google, Microsoft 2 Chrome, Edge 2025-10-24 8.8 High
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2017-0037 1 Microsoft 9 Edge, Internet Explorer, Windows 10 1507 and 6 more 2025-10-22 8.1 High
Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element.
CVE-2016-7201 1 Microsoft 5 Edge, Windows 10 1507, Windows 10 1511 and 2 more 2025-10-22 8.8 High
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
CVE-2016-7200 1 Microsoft 5 Edge, Windows 10 1507, Windows 10 1511 and 2 more 2025-10-22 8.8 High
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
CVE-2016-3351 1 Microsoft 11 Edge, Internet Explorer, Windows 10 1507 and 8 more 2025-10-22 6.5 Medium
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability."