7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.971 High
EPSS
Percentile
99.8%
11/08/2016
Critical
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code.
Internet Explorer 9
Microsoft Windows Hyperlink Object Library
Internet Explorer 11
Internet Explorer 10
Microsoft Edge (EdgeHTML-based)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-7239
CVE-2016-7209
CVE-2016-7227
CVE-2016-7208
CVE-2016-7195
CVE-2016-7196
CVE-2016-7198
CVE-2016-7199
CVE-2016-7200
CVE-2016-7201
CVE-2016-7202
CVE-2016-7203
CVE-2016-7204
CVE-2016-7243
CVE-2016-7242
CVE-2016-7241
CVE-2016-7240
ACE
CVE-2016-72392.6Warning
CVE-2016-72092.6Warning
CVE-2016-72272.6Warning
CVE-2016-72087.6Critical
CVE-2016-71957.6Critical
CVE-2016-71967.6Critical
CVE-2016-71987.6Critical
CVE-2016-71992.6Warning
CVE-2016-72007.6Critical
CVE-2016-72017.6Critical
CVE-2016-72027.6Critical
CVE-2016-72037.6Critical
CVE-2016-72042.6Warning
CVE-2016-72437.6Critical
CVE-2016-72427.6Critical
CVE-2016-72417.6Critical
CVE-2016-72407.6Critical
3200970
3197867
3197868
3197873
3197874
3197876
3197877
3198585
3198586
3205386
3205383
3205401
3205400
3205408
3205409
3207752
3205394
3206632
Public exploits exist for this vulnerability.
support.microsoft.com/kb/3197867
support.microsoft.com/kb/3197868
support.microsoft.com/kb/3197873
support.microsoft.com/kb/3197874
support.microsoft.com/kb/3197876
support.microsoft.com/kb/3197877
support.microsoft.com/kb/3198585
support.microsoft.com/kb/3198586
support.microsoft.com/kb/3200970
support.microsoft.com/kb/3205383
support.microsoft.com/kb/3205386
support.microsoft.com/kb/3205394
support.microsoft.com/kb/3205400
support.microsoft.com/kb/3205401
support.microsoft.com/kb/3205408
support.microsoft.com/kb/3205409
support.microsoft.com/kb/3206632
support.microsoft.com/kb/3207752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7195
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7196
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7199
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7200
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7202
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7203
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7208
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7239
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7241
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7242
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7243
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7195
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7196
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7198
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7199
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7200
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7201
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7202
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7203
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7204
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7208
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7209
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7227
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7239
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7240
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7241
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7242
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7243
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.971 High
EPSS
Percentile
99.8%