8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.05 Low
EPSS
Percentile
92.7%
04/14/2020
Critical
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
ChakraCore
Microsoft Edge (EdgeHTML-based)
Internet Explorer 9
Internet Explorer 11
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2020-0968
CVE-2020-0969
CVE-2020-0966
CVE-2020-0970
CVE-2020-0967
CVE-2020-0895
ACE
CVE-2020-09687.6Critical
CVE-2020-09679.3Critical
CVE-2020-08957.6Critical
CVE-2020-09669.3Critical
CVE-2020-09697.6Critical
CVE-2020-09707.6Critical
4549949
4550927
4550929
4550964
4550917
4549951
4550961
4550922
4550930
4550905
support.microsoft.com/kb/4549949
support.microsoft.com/kb/4549951
support.microsoft.com/kb/4550905
support.microsoft.com/kb/4550917
support.microsoft.com/kb/4550922
support.microsoft.com/kb/4550927
support.microsoft.com/kb/4550929
support.microsoft.com/kb/4550930
support.microsoft.com/kb/4550961
support.microsoft.com/kb/4550964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0970
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0895
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0966
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0967
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0968
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0969
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0970
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.05 Low
EPSS
Percentile
92.7%