8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.945 High
EPSS
Percentile
99.2%
07/12/2016
High
Multiple serious vulnerabilities have been found in Microsoft browsers. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code or obtain sensitive information.
Microsoft Internet Explorer version from 9 through 11
Microsoft Edge
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-3204
CVE-2016-3248
CVE-2016-3259
CVE-2016-3260
CVE-2016-3261
CVE-2016-3264
CVE-2016-3265
CVE-2016-3269
CVE-2016-3271
CVE-2016-3273
CVE-2016-3274
CVE-2016-3276
CVE-2016-3277
CVE-2016-3240
CVE-2016-3241
CVE-2016-3242
CVE-2016-3243
CVE-2016-3244
CVE-2016-3245
CVE-2016-3246
ACE
CVE-2016-32049.3Critical
CVE-2016-32489.3Critical
CVE-2016-32599.3Critical
CVE-2016-32609.3Critical
CVE-2016-32612.6Warning
CVE-2016-32647.6Critical
CVE-2016-32659.3Critical
CVE-2016-32699.3Critical
CVE-2016-32714.3Warning
CVE-2016-32732.6Warning
CVE-2016-32742.6Warning
CVE-2016-32762.6Warning
CVE-2016-32772.6Warning
CVE-2016-32407.6Critical
CVE-2016-32417.6Critical
CVE-2016-32427.6Critical
CVE-2016-32437.6Critical
CVE-2016-32444.3Warning
CVE-2016-32454.3Warning
CVE-2016-32467.6Critical
support.microsoft.com/kb/3163912
support.microsoft.com/kb/3169658
support.microsoft.com/kb/3170106
support.microsoft.com/kb/3172985
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3241
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3242
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3243
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3244
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3245
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3248
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3259
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3260
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3261
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3264
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3265
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3269
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3273
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3274
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3276
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3277
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3204
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3240
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3241
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3242
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3243
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3244
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3245
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3246
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3248
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3259
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3260
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3261
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3264
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3265
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3269
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3271
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3273
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3274
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3276
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3277
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.945 High
EPSS
Percentile
99.2%