7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.968 High
EPSS
Percentile
99.7%
4489881
4489891
4489878
4489886
4489899
4489871
4489868
4489872
4489882
4489873
03/12/2019
Critical
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, gain privileges, obtain sensitive information.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft Edge
ChakraCore
Internet Explorer 11
Internet Explorer 10
Internet Explorer 9
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-0773
CVE-2019-0763
CVE-2019-0783
CVE-2019-0780
CVE-2019-0667
CVE-2019-0762
CVE-2019-0761
CVE-2019-0769
CVE-2019-0768
CVE-2019-0592
CVE-2019-0680
CVE-2019-0770
CVE-2019-0678
CVE-2019-0771
CVE-2019-0779
CVE-2019-0746
CVE-2019-0666
CVE-2019-0639
CVE-2019-0665
CVE-2019-0612
CVE-2019-0609
CVE-2019-0611
ACE
CVE-2019-07737.6Critical
CVE-2019-07637.6Critical
CVE-2019-07837.6Critical
CVE-2019-07807.6Critical
CVE-2019-06677.6Critical
CVE-2019-07624.3Warning
CVE-2019-07614.3Warning
CVE-2019-07697.6Critical
CVE-2019-07684.3Warning
CVE-2019-05927.6Critical
CVE-2019-06807.6Critical
CVE-2019-07707.6Critical
CVE-2019-06784.0Warning
CVE-2019-07717.6Critical
CVE-2019-07797.6Critical
CVE-2019-07464.3Warning
CVE-2019-06667.6Critical
CVE-2019-06397.6Critical
CVE-2019-06657.6Critical
CVE-2019-06122.6Warning
CVE-2019-06097.6Critical
CVE-2019-06117.6Critical
support.microsoft.com/kb/4489868
support.microsoft.com/kb/4489871
support.microsoft.com/kb/4489872
support.microsoft.com/kb/4489873
support.microsoft.com/kb/4489878
support.microsoft.com/kb/4489881
support.microsoft.com/kb/4489882
support.microsoft.com/kb/4489886
support.microsoft.com/kb/4489891
support.microsoft.com/kb/4489899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0639
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0665
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0667
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0678
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0770
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0783
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0592
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0612
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0665
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0666
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0667
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0678
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0680
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0746
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0761
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0762
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0763
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0768
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0770
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0779
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0780
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0783
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.968 High
EPSS
Percentile
99.7%