Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Edge
(Microsoft)Repositories | https://github.com/Microsoft/ChakraCore |
#Vulnerabilities | 745 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-09-11 | CVE-2020-16884 | <p>A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object (BHO) plugin on Internet Explorer handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p> <p>In a web-based attack scenario, an attacker could host a specially crafted website... | Edge | N/A | ||
2020-09-11 | CVE-2020-1057 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p> <p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the... | Chakracore, Edge | N/A | ||
2020-09-11 | CVE-2020-1172 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p> <p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the... | Chakracore, Edge | N/A | ||
2020-09-11 | CVE-2020-1180 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p> <p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the... | Chakracore, Edge | N/A | ||
2020-11-03 | CVE-2020-16009 | Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Cefsharp, Debian_linux, Fedora, Chrome, Edge, Edge_chromium, Backports_sle, Leap | 8.8 | ||
2020-11-11 | CVE-2020-17048 | Chakra Scripting Engine Memory Corruption Vulnerability | Chakracore, Edge | N/A | ||
2020-11-11 | CVE-2020-17052 | Scripting Engine Memory Corruption Vulnerability | Edge, Internet_explorer | N/A | ||
2020-11-11 | CVE-2020-17054 | Chakra Scripting Engine Memory Corruption Vulnerability | Chakracore, Edge | N/A | ||
2020-11-11 | CVE-2020-17058 | Microsoft Browser Memory Corruption Vulnerability | Edge, Internet_explorer | N/A | ||
2020-12-10 | CVE-2020-17131 | Chakra Scripting Engine Memory Corruption Vulnerability | Chakracore, Edge | N/A |