Improper input validation in Microsoft Edge - CVE-2018-8530
Published: October 9, 2018
Microsoft Edge
Detailed vulnerability description
The vulnerability exists due to improper handling of requests of different origins by Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, bypass Same-Origin Policy (SOP) restrictions, allow requests that should otherwise be ignored and possibly force the browser to send data that would otherwise be restricted.