Total vulnerabilities in the database
A tampering vulnerability exists when Microsoft browsers do not properly validate input under specific conditions, aka 'Microsoft Browsers Tampering Vulnerability'.
CVSS v3:
CVSS v2:
CWEs:
OWASP TOP 10: