7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.954 High
EPSS
Percentile
99.3%
02/13/2018
Critical
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code.
Internet Explorer 10
Microsoft Edge (EdgeHTML-based)
ChakraCore
Internet Explorer 11
Internet Explorer 9
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-0763
CVE-2018-0771
CVE-2018-0834
CVE-2018-0835
CVE-2018-0836
CVE-2018-0837
CVE-2018-0838
CVE-2018-0839
CVE-2018-0840
CVE-2018-0856
CVE-2018-0857
CVE-2018-0859
CVE-2018-0860
CVE-2018-0861
CVE-2018-0866
CVE-2018-0858
ACE
CVE-2018-07632.6Warning
CVE-2018-07714.3Warning
CVE-2018-08349.3Critical
CVE-2018-08357.6Critical
CVE-2018-08367.6Critical
CVE-2018-08377.6Critical
CVE-2018-08387.6Critical
CVE-2018-08394.3Warning
CVE-2018-08409.3Critical
CVE-2018-08567.6Critical
CVE-2018-08577.6Critical
CVE-2018-08597.6Critical
CVE-2018-08607.6Critical
CVE-2018-08619.3Critical
CVE-2018-08669.3Critical
CVE-2018-08589.3Critical
4074591
4074590
4088776
4074598
4074594
4074593
4074596
4074592
4074588
4074736
4530684
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4074588
support.microsoft.com/kb/4074590
support.microsoft.com/kb/4074591
support.microsoft.com/kb/4074592
support.microsoft.com/kb/4074593
support.microsoft.com/kb/4074594
support.microsoft.com/kb/4074596
support.microsoft.com/kb/4074598
support.microsoft.com/kb/4074736
support.microsoft.com/kb/4088776
support.microsoft.com/kb/4530684
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0834
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0866
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0763
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0771
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0834
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0835
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0836
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0837
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0838
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0839
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0840
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0856
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0857
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0858
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0859
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0860
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0861
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0866
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.954 High
EPSS
Percentile
99.3%