8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
72.1%
04/28/2022
Warning
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.
Microsoft Edge (Chromium-based)
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
CVE-2022-1480
CVE-2022-1500
CVE-2022-1494
CVE-2022-1482
CVE-2022-1478
CVE-2022-1490
CVE-2022-1498
CVE-2022-1492
CVE-2022-1491
CVE-2022-1484
CVE-2022-1488
CVE-2022-1485
CVE-2022-1493
CVE-2022-1497
CVE-2022-1477
CVE-2022-1501
CVE-2022-1479
CVE-2022-1481
CVE-2022-1495
CVE-2022-1486
CVE-2022-29146
CVE-2022-29147
CVE-2022-1483
CVE-2022-1499
CVE-2022-1487
ACE
CVE-2022-14976.5High
CVE-2022-14908.8Critical
CVE-2022-14778.8Critical
CVE-2022-14826.5High
CVE-2022-14877.5Critical
CVE-2022-14884.3Warning
CVE-2022-14788.8Critical
CVE-2022-14857.5Critical
CVE-2022-15006.5High
CVE-2022-14918.8Critical
CVE-2022-14926.1High
CVE-2022-14954.3Warning
CVE-2022-14818.8Critical
CVE-2022-14838.8Critical
CVE-2022-14868.8Critical
CVE-2022-14946.1High
CVE-2022-14848.8Critical
CVE-2022-14938.8Critical
CVE-2022-15016.5High
CVE-2022-14798.8Critical
CVE-2022-14984.3Warning
CVE-2022-14805.0Warning
CVE-2022-14996.3High
CVE-2022-291468.3Critical
CVE-2022-291473.1Warning
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1480
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1481
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1483
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1484
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1485
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1493
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1495
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29147
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1477
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1478
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1479
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1480
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1481
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1482
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1483
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1484
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1485
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1486
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1487
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1488
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1490
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1491
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1492
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1493
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1494
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1495
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1497
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1498
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1499
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1500
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1501
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29146
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29147
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
support.microsoft.com/en-us/topic/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1
threats.kaspersky.com/en/product/Microsoft-Edge/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
72.1%