7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.963 High
EPSS
Percentile
99.5%
04/10/2018
Critical
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code.
Microsoft Edge (EdgeHTML-based)
Internet Explorer 9
Internet Explorer 10
ChakraCore
Internet Explorer 11
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-0981
CVE-2018-0994
CVE-2018-0997
CVE-2018-0990
CVE-2018-1023
CVE-2018-1000
CVE-2018-0892
CVE-2018-1001
CVE-2018-1019
CVE-2018-1018
CVE-2018-0998
CVE-2018-1020
CVE-2018-0988
CVE-2018-0979
CVE-2018-0980
CVE-2018-0987
CVE-2018-0995
CVE-2018-0989
CVE-2018-0870
CVE-2018-0991
CVE-2018-0993
CVE-2018-0996
ACE
CVE-2018-09812.6Warning
CVE-2018-09947.6Critical
CVE-2018-09977.6Critical
CVE-2018-09907.6Critical
CVE-2018-10237.6Critical
CVE-2018-10002.6Warning
CVE-2018-08924.3Warning
CVE-2018-10017.6Critical
CVE-2018-10197.6Critical
CVE-2018-10187.6Critical
CVE-2018-09984.3Warning
CVE-2018-10207.6Critical
CVE-2018-09887.6Critical
CVE-2018-09797.6Critical
CVE-2018-09807.6Critical
CVE-2018-09874.3Warning
CVE-2018-09957.6Critical
CVE-2018-09894.3Warning
CVE-2018-08707.6Critical
CVE-2018-09917.6Critical
CVE-2018-09937.6Critical
CVE-2018-09967.6Critical
4093112
4093114
4093111
4093107
4093109
4093119
4093118
4093123
4092946
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4092946
support.microsoft.com/kb/4093107
support.microsoft.com/kb/4093109
support.microsoft.com/kb/4093111
support.microsoft.com/kb/4093112
support.microsoft.com/kb/4093114
support.microsoft.com/kb/4093118
support.microsoft.com/kb/4093119
support.microsoft.com/kb/4093123
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0892
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0991
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1001
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1018
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1019
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1023
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0870
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0892
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0979
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0980
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0981
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0987
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0988
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0989
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0990
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0991
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0993
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0994
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0995
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0996
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0997
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0998
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1000
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1001
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1018
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1019
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1020
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1023
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.963 High
EPSS
Percentile
99.5%