8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.901 High
EPSS
Percentile
98.7%
12/13/2016
Critical
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code.
Internet Explorer 9
Microsoft Windows Hyperlink Object Library
Internet Explorer 11
Internet Explorer 10
Microsoft Edge (EdgeHTML-based)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-7281
CVE-2016-7280
CVE-2016-7279
CVE-2016-7278
CVE-2016-7297
CVE-2016-7181
CVE-2016-7206
CVE-2016-7296
CVE-2016-7288
CVE-2016-7287
CVE-2016-7286
CVE-2016-7284
CVE-2016-7283
CVE-2016-7282
ACE
CVE-2016-72812.6Warning
CVE-2016-72804.3Warning
CVE-2016-72797.6Critical
CVE-2016-72782.6Warning
CVE-2016-72977.6Critical
CVE-2016-71817.6Critical
CVE-2016-72064.3Warning
CVE-2016-72967.6Critical
CVE-2016-72887.6Critical
CVE-2016-72877.6Critical
CVE-2016-72867.6Critical
CVE-2016-72844.3Warning
CVE-2016-72839.3Critical
CVE-2016-72824.3Warning
3205386
3205383
3205401
3205400
3205408
3205409
3207752
3205394
3206632
4338825
4338819
4338826
Public exploits exist for this vulnerability.
support.microsoft.com/kb/3205383
support.microsoft.com/kb/3205386
support.microsoft.com/kb/3205394
support.microsoft.com/kb/3205400
support.microsoft.com/kb/3205401
support.microsoft.com/kb/3205408
support.microsoft.com/kb/3205409
support.microsoft.com/kb/3206632
support.microsoft.com/kb/3207752
support.microsoft.com/kb/4338819
support.microsoft.com/kb/4338825
support.microsoft.com/kb/4338826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7278
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7279
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7280
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7281
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7282
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7283
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7286
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7296
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7297
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7181
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7206
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7278
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7279
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7280
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7281
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7282
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7283
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7284
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7286
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7287
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7288
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7296
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7297
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.901 High
EPSS
Percentile
98.7%