7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.957 High
EPSS
Percentile
99.4%
03/13/2018
Critical
Multiple vulnerabilities were found in Microsoft Internet Explorer and Edge. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.
ChakraCore
Microsoft Edge (EdgeHTML-based)
Internet Explorer 10
Internet Explorer 9
Internet Explorer 11
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-0872
CVE-2018-0873
CVE-2018-0874
CVE-2018-0876
CVE-2018-0879
CVE-2018-0889
CVE-2018-0891
CVE-2018-0893
CVE-2018-0927
CVE-2018-0929
CVE-2018-0930
CVE-2018-0931
CVE-2018-0932
CVE-2018-0933
CVE-2018-0934
CVE-2018-0935
CVE-2018-0936
CVE-2018-0937
CVE-2018-0939
CVE-2018-0942
CVE-2018-0925
ACE
CVE-2018-08727.6Critical
CVE-2018-08737.6Critical
CVE-2018-08747.6Critical
CVE-2018-08767.6Critical
CVE-2018-08795.0Warning
CVE-2018-08897.6Critical
CVE-2018-08914.3Warning
CVE-2018-08937.6Critical
CVE-2018-09274.3Warning
CVE-2018-09294.3Warning
CVE-2018-09307.6Critical
CVE-2018-09317.6Critical
CVE-2018-09324.3Warning
CVE-2018-09337.6Critical
CVE-2018-09347.6Critical
CVE-2018-09357.6Critical
CVE-2018-09367.6Critical
CVE-2018-09377.6Critical
CVE-2018-09394.3Warning
CVE-2018-09422.1Warning
CVE-2018-09257.6Critical
4088782
4088787
4088786
4088779
4089187
4088877
4088875
4088776
4088876
4096040
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4088776
support.microsoft.com/kb/4088779
support.microsoft.com/kb/4088782
support.microsoft.com/kb/4088786
support.microsoft.com/kb/4088787
support.microsoft.com/kb/4088875
support.microsoft.com/kb/4088876
support.microsoft.com/kb/4088877
support.microsoft.com/kb/4089187
support.microsoft.com/kb/4096040
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0874
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0876
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0927
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0939
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0942
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0872
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0873
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0874
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0876
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0879
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0889
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0891
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0893
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0925
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0927
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0929
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0930
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0931
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0932
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0933
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0934
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0935
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0936
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0937
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0939
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0942
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.957 High
EPSS
Percentile
99.4%