8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.961 High
EPSS
Percentile
99.5%
05/08/2018
Critical
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions.
Internet Explorer 11
Microsoft Edge (EdgeHTML-based)
Internet Explorer 9
Internet Explorer 10
ChakraCore
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-0943
CVE-2018-0945
CVE-2018-0946
CVE-2018-0951
CVE-2018-0953
CVE-2018-0954
CVE-2018-1021
CVE-2018-8123
CVE-2018-1022
CVE-2018-8130
CVE-2018-8178
CVE-2018-8128
CVE-2018-8133
CVE-2018-8114
CVE-2018-0955
CVE-2018-8139
CVE-2018-1025
CVE-2018-8112
CVE-2018-8145
CVE-2018-8126
CVE-2018-8137
CVE-2018-8122
CVE-2018-8179
CVE-2018-8177
ACE
CVE-2018-09437.6Critical
CVE-2018-09457.6Critical
CVE-2018-09467.6Critical
CVE-2018-09517.6Critical
CVE-2018-09537.6Critical
CVE-2018-09547.6Critical
CVE-2018-10214.3Warning
CVE-2018-81234.3Warning
CVE-2018-10227.6Critical
CVE-2018-81307.6Critical
CVE-2018-81787.6Critical
CVE-2018-81287.6Critical
CVE-2018-81337.6Critical
CVE-2018-81147.6Critical
CVE-2018-09557.6Critical
CVE-2018-81397.6Critical
CVE-2018-10254.3Warning
CVE-2018-81124.3Warning
CVE-2018-81457.6Critical
CVE-2018-81266.8High
CVE-2018-81377.6Critical
CVE-2018-81227.6Critical
CVE-2018-81797.6Critical
CVE-2018-81777.6Critical
4103723
4103716
4103731
4103721
4103730
4103718
4103727
4103725
4103768
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4103716
support.microsoft.com/kb/4103718
support.microsoft.com/kb/4103721
support.microsoft.com/kb/4103723
support.microsoft.com/kb/4103725
support.microsoft.com/kb/4103727
support.microsoft.com/kb/4103730
support.microsoft.com/kb/4103731
support.microsoft.com/kb/4103768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0946
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8112
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8114
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8122
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8123
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8126
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8128
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8130
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8133
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8137
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8145
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8178
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8179
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0943
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0945
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0946
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0951
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0953
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0954
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0955
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1021
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1022
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1025
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8112
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8114
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8122
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8123
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8126
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8128
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8130
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8133
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8137
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8139
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8145
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8177
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8178
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8179
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.961 High
EPSS
Percentile
99.5%