📦 Edge Chromium
by Microsoft
🔍 What is Edge Chromium?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems by exploiting a use-after-free memory corruption flaw. It affects users running vulnerable version...
This CVE describes an integer overflow vulnerability in Skia (Chrome's graphics engine) that allows an attacker who has already compromised Chrome's renderer process to potentially escape the browser ...
This vulnerability in Microsoft Edge allows attackers to execute arbitrary code with elevated privileges by exploiting a use-after-free memory corruption flaw. It affects all users running vulnerable ...
This vulnerability in Chrome DevTools allowed malicious Chrome extensions to escape the browser's security sandbox. Attackers could potentially execute arbitrary code on the victim's system. All Chrom...
This is a use-after-free vulnerability in the Omnibox (address bar) component of Google Chrome on Linux. It allows a remote attacker to potentially escape Chrome's sandbox and execute arbitrary code b...
This is a use-after-free vulnerability in Google Chrome's Speech Recognizer component on Android. It allows a remote attacker to potentially escape Chrome's sandbox and execute arbitrary code by trick...
This vulnerability allows a standard local user without administrative privileges to execute privileged update commands via Microsoft Edge's Elevation Service. By exploiting the IElevatorEdge interfac...
This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome on macOS. Attackers can exploit this by tricking users...
This vulnerability in Microsoft Edge (Chromium-based) allows unauthorized attackers to access sensitive information over a network. It affects all users running vulnerable versions of Microsoft Edge, ...
A use-after-free vulnerability in Microsoft Edge (Chromium-based) allows an authenticated attacker to execute arbitrary code remotely over a network. This affects users running vulnerable versions of ...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting a malicious website. All users running vulne...
This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Microsoft Edge. Attackers could exploit this by tricking users into visiting a malicious ...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by exploiting a heap-based buffer overflow (CWE-122). Users running vulnerab...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting a specially crafted website. All users runni...
This vulnerability in Chrome's V8 JavaScript engine allows attackers to trigger heap corruption through malicious HTML pages. Successful exploitation could lead to arbitrary code execution or browser ...
This vulnerability in Microsoft Edge allows attackers to execute arbitrary code by exploiting memory corruption through specially crafted HTML content. It affects users running vulnerable versions of ...
This vulnerability in Microsoft Edge (Chromium-based) allows an attacker to potentially access sensitive information from the browser's memory. It affects users running vulnerable versions of Microsof...
This vulnerability in Microsoft Edge (Chromium-based) allows an attacker to potentially access sensitive information from the browser's memory. It affects users running vulnerable versions of Microsof...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems. Attackers could exploit this by tricking users into visiting a specially cr...
This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems by exploiting a use-after-free memory corruption flaw. It affects users running vulnerable version...
This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that could allow an attacker to trigger heap corruption by tricking the browser into misinterpreting object types. Attacker...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting a specially crafted website. All users runni...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to execute arbitrary code on a user's system by tricking them into visiting a malicious website. It affects all users running vul...
This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems by exploiting a use-after-free memory corruption issue. It affects users running vulnerable versio...
This is a type confusion vulnerability in Chrome's V8 JavaScript engine that allows remote attackers to execute arbitrary code by tricking the browser into misinterpreting object types. It affects all...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows system...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges through a use-after-free memory corruption flaw. It affects users running vulnerable versions of Micr...
This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Microsoft Edge. Attackers can exploit this by tricking users into visiting a malicious we...
This vulnerability allows attackers to bypass security features in Microsoft Edge (Chromium-based), potentially enabling malicious websites to execute unauthorized actions. It affects all users runnin...
This vulnerability in Microsoft Edge (Chromium-based) allows an attacker to execute code with elevated privileges. It affects users running vulnerable versions of Microsoft Edge on Windows systems. Su...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows system...
This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows systems. Successful exp...
This vulnerability allows attackers to spoof URLs in Microsoft Edge WebView2, potentially tricking users into visiting malicious sites. It affects applications using WebView2 control on Windows system...
This vulnerability in Microsoft Edge (Chromium-based) allows an attacker to gain elevated privileges on a compromised system. It affects users running vulnerable versions of Microsoft Edge on Windows ...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to execute code with elevated privileges by exploiting a race condition (CWE-362). It affects users running vulnerable versions o...
This vulnerability allows an attacker to gain elevated privileges in Microsoft Edge by exploiting a flaw in the Chromium-based browser's security model. It affects users running vulnerable versions of...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows system...
This vulnerability allows an attacker to gain elevated privileges in Microsoft Edge by exploiting a flaw in the Chromium-based browser. It affects users running vulnerable versions of Microsoft Edge o...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows system...
This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows system...
CVE-2021-30624 is a use-after-free vulnerability in Chromium's Autofill feature that allows attackers to execute arbitrary code or cause a denial of service. This affects all Chromium-based browsers i...
CVE-2021-30606 is a use-after-free vulnerability in Chromium's Blink rendering engine that allows remote attackers to execute arbitrary code or cause denial of service via crafted web content. This af...
CVE-2021-30608 is a use-after-free vulnerability in Chromium's Web Share API that allows remote attackers to execute arbitrary code or cause a denial of service via a crafted HTML page. This affects a...
This vulnerability is a use-after-free flaw in Chromium's Extensions API that allows remote attackers to execute arbitrary code or cause a denial of service via a crafted HTML page. It affects all Chr...
CVE-2021-30612 is a use-after-free vulnerability in WebRTC component of Chromium-based browsers. It allows remote attackers to execute arbitrary code or cause denial of service via crafted web content...
This is a heap buffer overflow vulnerability in Chromium's TabStrip component that allows attackers to execute arbitrary code or cause denial of service. It affects all Chromium-based browsers includi...
This vulnerability allows an attacker to spoof information in Microsoft Edge for Android's user interface, potentially tricking users into believing they are interacting with legitimate content when t...
This vulnerability in Microsoft Edge for iOS allows attackers to spoof user interface elements, potentially tricking users into revealing sensitive information or performing unintended actions. It aff...
A protection mechanism failure in Microsoft Edge (Chromium-based) allows unauthorized attackers to execute arbitrary code over a network connection. This affects all users running vulnerable versions ...
An improper access control vulnerability in Microsoft Edge allows attackers to bypass security features over a network. This affects users of Microsoft Edge (Chromium-based) who visit malicious websit...
This vulnerability in Microsoft Edge (Chromium-based) allows unauthorized attackers to perform spoofing attacks over a network. Attackers can trick users into believing they're interacting with legiti...
This vulnerability in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute arbitrary code over a network connection. It affects all users running vulnerable versions of Microsoft...
This vulnerability in Microsoft Edge allows an unauthorized attacker to perform spoofing attacks over a network by exploiting incorrect UI actions. It affects users of Microsoft Edge (Chromium-based) ...
This vulnerability allows attackers to bypass security features in Microsoft Edge, potentially enabling malicious websites to perform actions that should be restricted. It affects users running vulner...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting a malicious website. All users running vulne...
This vulnerability in Microsoft Edge allows attackers to spoof UI elements, potentially tricking users into interacting with malicious content. It affects users of Microsoft Edge (Chromium-based) on s...
This vulnerability allows an attacker to spoof UI elements in Microsoft Edge, potentially tricking users into interacting with malicious content disguised as legitimate interface components. It affect...
This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows, potentially enabling u...
This vulnerability in Microsoft Edge allows attackers to spoof UI elements, potentially tricking users into interacting with malicious content. It affects users of Microsoft Edge (Chromium-based) on s...
This vulnerability allows an attacker to spoof content in Microsoft Edge's browser UI, potentially tricking users into interacting with malicious elements. It affects users of Microsoft Edge (Chromium...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by exploiting a use-after-free memory corruption issue. Users running vulner...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting a specially crafted website. All users runni...
This vulnerability in Microsoft Edge allows attackers to spoof UI elements, potentially tricking users into interacting with malicious content. It affects users of Microsoft Edge (Chromium-based) on W...
This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary code on affected systems by tricking users into visiting a malicious website. All users running vulne...
This vulnerability in Microsoft Edge allows attackers to execute arbitrary code by exploiting memory corruption through specially crafted HTML content. It affects users running vulnerable versions of ...
This vulnerability in Microsoft Edge allows attackers to spoof content in the browser's address bar or UI elements, potentially tricking users into believing they're on a legitimate site. It affects u...