Page 6 of 921 results (0.007 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Microsoft Edge for iOS Spoofing Vulnerability Vulnerabilidad de suplantación de identidad de Microsoft Edge para iOS • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30057 • CWE-356: Product UI does not Warn User of Unsafe Actions •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Microsoft Edge (Chromium-based) Spoofing Vulnerability Vulnerabilidad de suplantación de identidad en Microsoft Edge (basado en Chromium) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30058 • CWE-290: Authentication Bypass by Spoofing CWE-357: Insufficient UI Warning of Dangerous Operations •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

Microsoft Edge (Chromium-based) Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de Microsoft Edge (basado en Chromium) • https://github.com/absholi7ly/Microsoft-Edge-Information-Disclosure https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056 • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Microsoft Edge (Chromium-based) Spoofing Vulnerability Vulnerabilidad de suplantación de identidad en Microsoft Edge (basado en Chromium) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055 • CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability Vulnerabilidad de omisión de característica de seguridad de Microsoft Edge (basada en Chromium) This vulnerability allows remote attackers to bypass the Mark-Of-The-Web security feature to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .MHT files. The issue results from the lack of a security check on .MHT files located in shared folders. An attacker can leverage this vulnerability to execute code in the context of the current user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29991 • CWE-94: Improper Control of Generation of Code ('Code Injection') •