5
0
5
0
Vulnerability Timeline
5 vulnerabilities discovered over time for Edge
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2019-1141 | 4.2 | This vulnerability allows an attacker to run any code they want on a user's computer if they can trick the user into visiting a specially crafted website using Microsoft Edge. If the user has administrative rights, the attacker could take full control of the system, install programs, and access or delete files. | microsoftedge | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1140 | 8.8 | This vulnerability allows an attacker to run any code they choose on a victim's computer if the victim visits a specially crafted website using Microsoft Edge. If the victim has administrative rights, the attacker could take full control of the system, install programs, or access sensitive data. | microsoftedge | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1139 | 4.2 | This vulnerability allows an attacker to run malicious code on a user's system through Microsoft Edge, potentially giving them the same access rights as the user. If the user has administrative rights, the attacker could take full control of the system by tricking the user into visiting a specially crafted website. | microsoftedge | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1131 | 4.2 | An attacker can exploit this vulnerability to run malicious code on a user's system, potentially gaining the same access rights as that user. If the user has administrative privileges, the attacker could take full control of the system by tricking them into visiting a specially crafted website. | microsoftedge | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1030 | 4.3 | This vulnerability allows an attacker to access sensitive information from a user's system by exploiting flaws in how Microsoft Edge handles data in memory. To succeed, the attacker must trick the user into visiting a malicious website or clicking on a harmful link, as there’s no way for the attacker to force the user to do so. | microsoftedge | Exploit Available | over 6 years agoAug 14, 2019 |
About Microsoft Edge Security
This page provides comprehensive security vulnerability tracking for Microsoft Edge. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Edge updated to the latest version
- • Subscribe to security advisories from Microsoft
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately