8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.939 High
EPSS
Percentile
99.1%
06/14/2016
High
Multiple serious vulnerabilities have been found in Microsoft Edge. Malicious users can exploit these vulnerabilities to bypass security restrictions, perform privilege escalation, execute arbitrary code or obtain sensitive information.
Microsoft Edge
Microsoft Internet Explorer versions 9 through 11
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-3207
CVE-2016-3206
CVE-2016-3205
CVE-2016-3215
CVE-2016-3214
CVE-2016-3213
CVE-2016-3212
CVE-2016-3211
CVE-2016-3210
CVE-2016-3203
CVE-2016-3202
CVE-2016-3201
CVE-2016-3199
CVE-2016-3198
CVE-2016-0199
CVE-2016-0200
CVE-2016-3222
ACE
CVE-2016-32077.6Critical
CVE-2016-32067.6Critical
CVE-2016-32057.6Critical
CVE-2016-32154.3Warning
CVE-2016-32149.3Critical
CVE-2016-32139.3Critical
CVE-2016-32124.3Warning
CVE-2016-32119.3Critical
CVE-2016-32109.3Critical
CVE-2016-32039.3Critical
CVE-2016-32027.6Critical
CVE-2016-32014.3Warning
CVE-2016-31999.3Critical
CVE-2016-31984.3Warning
CVE-2016-01999.3Critical
CVE-2016-02009.3Critical
CVE-2016-32229.3Critical
Public exploits exist for this vulnerability.
support.microsoft.com/kb/3160005
support.microsoft.com/kb/3163017
support.microsoft.com/kb/3163018
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0199
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0200
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3199
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3202
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3203
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3211
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3212
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3214
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3222
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0199
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0200
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3198
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3199
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3201
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3202
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3203
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3205
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3206
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3207
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3210
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3211
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3212
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3213
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3214
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3215
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3222
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.939 High
EPSS
Percentile
99.1%