9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
69.1%
03/03/2022
Warning
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges.
Microsoft Edge (Chromium-based)
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
CVE-2022-0789
CVE-2022-0790
CVE-2022-0808
CVE-2022-0807
CVE-2022-0802
CVE-2022-0795
CVE-2022-0794
CVE-2022-0809
CVE-2022-0793
CVE-2022-0800
CVE-2022-0806
CVE-2022-0797
CVE-2022-0801
CVE-2022-0791
CVE-2022-0796
CVE-2022-0798
CVE-2022-0804
CVE-2022-0803
CVE-2022-0792
CVE-2022-0799
CVE-2022-0805
ACE
CVE-2022-07926.5High
CVE-2022-08076.5High
CVE-2022-07918.8Critical
CVE-2022-08088.8Critical
CVE-2022-08026.5High
CVE-2022-08058.8Critical
CVE-2022-08036.5High
CVE-2022-07998.8Critical
CVE-2022-08066.5High
CVE-2022-07988.8Critical
CVE-2022-07948.8Critical
CVE-2022-07958.8Critical
CVE-2022-07968.8Critical
CVE-2022-08008.8Critical
CVE-2022-08046.5High
CVE-2022-07909.6Critical
CVE-2022-07938.8Critical
CVE-2022-07898.8Critical
CVE-2022-08098.8Critical
CVE-2022-08016.1High
CVE-2022-07978.8Critical
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0809
nvd.nist.gov/vuln/detail/CVE-2022-0789
nvd.nist.gov/vuln/detail/CVE-2022-0790
nvd.nist.gov/vuln/detail/CVE-2022-0791
nvd.nist.gov/vuln/detail/CVE-2022-0792
nvd.nist.gov/vuln/detail/CVE-2022-0793
nvd.nist.gov/vuln/detail/CVE-2022-0794
nvd.nist.gov/vuln/detail/CVE-2022-0795
nvd.nist.gov/vuln/detail/CVE-2022-0796
nvd.nist.gov/vuln/detail/CVE-2022-0797
nvd.nist.gov/vuln/detail/CVE-2022-0798
nvd.nist.gov/vuln/detail/CVE-2022-0799
nvd.nist.gov/vuln/detail/CVE-2022-0800
nvd.nist.gov/vuln/detail/CVE-2022-0801
nvd.nist.gov/vuln/detail/CVE-2022-0802
nvd.nist.gov/vuln/detail/CVE-2022-0803
nvd.nist.gov/vuln/detail/CVE-2022-0804
nvd.nist.gov/vuln/detail/CVE-2022-0805
nvd.nist.gov/vuln/detail/CVE-2022-0806
nvd.nist.gov/vuln/detail/CVE-2022-0807
nvd.nist.gov/vuln/detail/CVE-2022-0808
nvd.nist.gov/vuln/detail/CVE-2022-0809
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
support.microsoft.com/en-us/topic/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1
threats.kaspersky.com/en/product/Microsoft-Edge/
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
69.1%