8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.033 Low
EPSS
Percentile
91.2%
03/10/2020
Critical
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Internet Explorer 11
Internet Explorer 9
Microsoft Edge (EdgeHTML-based)
ChakraCore
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2020-0829
CVE-2020-0811
CVE-2020-0812
CVE-2020-0813
CVE-2020-0816
CVE-2020-0828
CVE-2020-0832
CVE-2020-0833
CVE-2020-0830
CVE-2020-0831
CVE-2020-0825
CVE-2020-0824
CVE-2020-0768
CVE-2020-0826
CVE-2020-0847
CVE-2020-0827
CVE-2020-0848
CVE-2020-0823
ACE
CVE-2020-08297.6Critical
CVE-2020-08117.6Critical
CVE-2020-08127.6Critical
CVE-2020-08135.0Warning
CVE-2020-08169.3Critical
CVE-2020-08287.6Critical
CVE-2020-08327.6Critical
CVE-2020-08337.6Critical
CVE-2020-08307.6Critical
CVE-2020-08317.6Critical
CVE-2020-08257.6Critical
CVE-2020-08247.6Critical
CVE-2020-07687.6Critical
CVE-2020-08267.6Critical
CVE-2020-08477.6Critical
CVE-2020-08277.6Critical
CVE-2020-08487.6Critical
CVE-2020-08237.6Critical
4538461
4541510
4540689
4541509
4540681
4540693
4540673
4540670
4540671
4540688
support.microsoft.com/kb/4538461
support.microsoft.com/kb/4540670
support.microsoft.com/kb/4540671
support.microsoft.com/kb/4540673
support.microsoft.com/kb/4540681
support.microsoft.com/kb/4540688
support.microsoft.com/kb/4540689
support.microsoft.com/kb/4540693
support.microsoft.com/kb/4541509
support.microsoft.com/kb/4541510
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0824
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0832
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0848
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0768
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0811
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0812
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0813
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0816
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0823
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0824
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0825
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0826
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0827
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0828
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0829
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0830
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0831
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0832
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0833
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0847
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0848
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-VBScript-engine/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.033 Low
EPSS
Percentile
91.2%