Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft Corporation | Microsoft Edge | Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016. | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2018-0766 | Microsoft Windows Edge 信息泄露漏洞 | |
| CVE-2018-0803 | Microsoft Windows Edge 权限许可和访问控制问题漏洞 | |
| CVE-2018-0800 | Microsoft Windows Edge scripting引擎信息泄露漏洞 | |
| CVE-2018-0788 | Microsoft Windows Adobe Type Manager Font Driver (Atmfd.dll) 权限许可和访问控制问题漏洞 | |
| CVE-2018-0781 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0778 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0777 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0776 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0775 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0774 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0773 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0772 | Microsoft Windows Edge和Internet Explorer scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0770 | Microsoft Windows Edge的scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0769 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0768 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0767 | Microsoft Windows Edge scripting引擎信息泄露漏洞 | |
| CVE-2018-0741 | Microsoft Windows Color Management Module (Icm32.dll) 信息泄露漏洞 | |
| CVE-2018-0762 | Microsoft Windows ge和Internet Explorer scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0758 | Microsoft Windows Edge scripting引擎缓冲区错误漏洞 | |
| CVE-2018-0754 | Microsoft Windows Adobe Type Manager Font Driver (Atmfd.dll) 信息泄露漏洞 |
Showing top 20 of 32 CVEs. View all on vendor page → →
No comments yet