7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
8 High
AI Score
Confidence
High
0.94 High
EPSS
Percentile
99.2%
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer and Microsoft Edge. Malicious users can exploit these vulnerabilities to execute arbitrary code and obtain sensitive information.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2017-8496 critical
CVE-2017-8497 critical
CVE-2017-8498 warning
CVE-2017-8499 critical
CVE-2017-8504 warning
CVE-2017-8517 critical
CVE-2017-8519 critical
CVE-2017-8520 critical
CVE-2017-8521 critical
CVE-2017-8522 critical
CVE-2017-8523 warning
CVE-2017-8524 critical
CVE-2017-8529 warning
CVE-2017-8530 high
CVE-2017-8547 critical
CVE-2017-8548 critical
CVE-2017-8549 critical
CVE-2017-8555 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4021558
support.microsoft.com/kb/4022714
support.microsoft.com/kb/4022715
support.microsoft.com/kb/4022719
support.microsoft.com/kb/4022724
support.microsoft.com/kb/4022725
support.microsoft.com/kb/4022726
support.microsoft.com/kb/4022727
support.microsoft.com/kb/4036586
support.microsoft.com/kb/4038777
support.microsoft.com/kb/4038781
support.microsoft.com/kb/4038782
support.microsoft.com/kb/4038783
support.microsoft.com/kb/4038788
support.microsoft.com/kb/4038792
support.microsoft.com/kb/4038799
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8496
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8496
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8497
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8497
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8498
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8498
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8499
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8499
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8504
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8504
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8517
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8517
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8519
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8519
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8520
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8520
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8521
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8521
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8522
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8522
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8523
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8523
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8524
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8524
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8529
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8529
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8530
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8547
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8547
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8548
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8548
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8549
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8549
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8555
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8555
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
8 High
AI Score
Confidence
High
0.94 High
EPSS
Percentile
99.2%