Edge Vulnerabilities

Security vulnerability tracking for Microsoft Edge

Last updated: Aug 14, 2019
Total CVEs

5

Critical

0

With Exploits

5

Last 30 Days

0

Vulnerability Timeline

5 vulnerabilities discovered over time for Edge

Severity Distribution

Critical0
0%
High1
20%
Medium4
80%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2019-11414.2

This vulnerability allows an attacker to run any code they want on a user's computer if they can trick the user into visiting a specially crafted website using Microsoft Edge. If the user has administrative rights, the attacker could take full control of the system, install programs, and access or delete files.

microsoftedge
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11408.8

This vulnerability allows an attacker to run any code they choose on a victim's computer if the victim visits a specially crafted website using Microsoft Edge. If the victim has administrative rights, the attacker could take full control of the system, install programs, or access sensitive data.

microsoftedge
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11394.2

This vulnerability allows an attacker to run malicious code on a user's system through Microsoft Edge, potentially giving them the same access rights as the user. If the user has administrative rights, the attacker could take full control of the system by tricking the user into visiting a specially crafted website.

microsoftedge
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11314.2

An attacker can exploit this vulnerability to run malicious code on a user's system, potentially gaining the same access rights as that user. If the user has administrative privileges, the attacker could take full control of the system by tricking them into visiting a specially crafted website.

microsoftedge
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-10304.3

This vulnerability allows an attacker to access sensitive information from a user's system by exploiting flaws in how Microsoft Edge handles data in memory. To succeed, the attacker must trick the user into visiting a malicious website or clicking on a harmful link, as there’s no way for the attacker to force the user to do so.

microsoftedge
Exploit Available
over 6 years agoAug 14, 2019

About Microsoft Edge Security

This page provides comprehensive security vulnerability tracking for Microsoft Edge. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Edge updated to the latest version
  • • Subscribe to security advisories from Microsoft
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately