| CVE ID | Publié | Description | Score | Gravité | 
|---|---|---|---|---|
| Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. | 8.8  | 
                                Haute  | 
                            ||
| No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. | 7.5  | 
                                Haute  | 
                            ||
| Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 8.8  | 
                                Haute  | 
                            ||
| User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. | 6.5  | 
                                Moyen  | 
                            ||
| Out-of-bounds read in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. | 7.5  | 
                                Haute  | 
                            ||
| Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network. | 7.6  | 
                                Haute  | 
                            ||
| No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. | 6.5  | 
                                Moyen  | 
                            ||
| The UI performs the wrong action in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. | 5.4  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.4  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3  | 
                                Moyen  | 
                            ||
| User Interface (UI) Misrepresentation of Critical Information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network | 5.4  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 6.5  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 5.4  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 5.9  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.3  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.1  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 5.4  | 
                                Moyen  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 9.8  | 
                                Critique  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8  | 
                                Haute  | 
                            ||
| Microsoft Edge (Chromium-based) Spoofing Vulnerability | 4.3  | 
                                Moyen  |