Multiple vulnerabilities found in Microsoft Edge and Internet Explorer. Exploitation possible via remote access, requires no additional privileges. Public exploits and malware exist. Involves improper memory and content handling leading to code execution and data leakage
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo