High
Microsoft Edge could allow a remote attacker to gain elevated privileges on the system. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By executing a specially-crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By persuading a victim to open a specially-crafted content, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By persuading a victim to open a specially-crafted content, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By persuading a victim to open a specially-crafted content, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) could allow a remote attacker to gain elevated privileges on the system. By persuading a victim to open a specially-crafted content, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
Microsoft Edge (Chromium-based) allow a remote attacker to gain elevated privileges on the system. By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to gain elevated privileges on the system.
Microsoft Edge (Chromium-based) could allow a remote attacker to conduct spoofing attacks.
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.