Количество 4
Количество 4
CVE-2019-1054
A security feature bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW). Failing to set the MOTW means that a large number of Microsoft security technologies are bypassed. In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass. Alternatively, in an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass. Additionally, compromised websites or websites that accept or host user-provided content could contain specially crafted content to exploit the security feature bypass. However, in all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachm
CVE-2019-1054
Microsoft Edge Security Feature Bypass Vulnerability
GHSA-cw3h-wqmv-phpq
A security feature bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW), aka 'Microsoft Edge Security Feature Bypass Vulnerability'.
BDU:2019-02485
Уязвимость механизма Mark of the Web Tagging (MOTW) браузера Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности и оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-1054 A security feature bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW). Failing to set the MOTW means that a large number of Microsoft security technologies are bypassed. In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass. Alternatively, in an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass. Additionally, compromised websites or websites that accept or host user-provided content could contain specially crafted content to exploit the security feature bypass. However, in all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachm | CVSS3: 5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-1054 Microsoft Edge Security Feature Bypass Vulnerability | CVSS3: 5 | 1% Низкий | больше 6 лет назад | |
GHSA-cw3h-wqmv-phpq A security feature bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW), aka 'Microsoft Edge Security Feature Bypass Vulnerability'. | CVSS3: 5 | 1% Низкий | больше 3 лет назад | |
BDU:2019-02485 Уязвимость механизма Mark of the Web Tagging (MOTW) браузера Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности и оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 5 | 1% Низкий | больше 6 лет назад |
Уязвимостей на страницу