8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
58.4%
03/13/2023
High
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, gain privileges, spoof user interface, execute arbitrary code.
Microsoft Edge (Chromium-based)
Microsoft Edge (Chromium-based) Extended Stable
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
CVE-2023-1233
CVE-2023-1220
CVE-2023-1228
CVE-2023-1229
CVE-2023-1219
CVE-2023-1214
CVE-2023-1236
CVE-2023-1234
CVE-2023-1224
CVE-2023-1217
CVE-2023-1223
CVE-2023-1231
CVE-2023-1222
CVE-2023-1213
CVE-2023-1221
CVE-2023-1218
CVE-2023-1230
CVE-2023-1216
CVE-2023-1235
CVE-2023-1215
CVE-2023-1232
ACE
CVE-2023-12295.0Warning
CVE-2023-12245.0Warning
CVE-2023-12185.0Warning
CVE-2023-12305.0Warning
CVE-2023-12235.0Warning
CVE-2023-12165.0Warning
CVE-2023-12175.0Warning
CVE-2023-12155.0Warning
CVE-2023-12208.8Critical
CVE-2023-12315.0Warning
CVE-2023-12335.0Warning
CVE-2023-12365.0Warning
CVE-2023-12225.0Warning
CVE-2023-12215.0Warning
CVE-2023-12325.0Warning
CVE-2023-12145.0Warning
CVE-2023-12345.0Warning
CVE-2023-12198.8Critical
CVE-2023-12355.0Warning
CVE-2023-12285.0Warning
CVE-2023-12135.0Warning
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1214
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1219
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1220
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1221
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1222
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1223
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1230
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1232
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1233
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1234
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1235
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1236
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1213
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1214
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1215
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1216
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1217
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1218
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1219
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1220
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1221
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1222
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1223
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1224
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1228
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1229
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1230
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1231
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1232
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1233
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1234
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1235
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1236
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
support.microsoft.com/en-us/topic/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1
threats.kaspersky.com/en/product/Microsoft-Edge/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
58.4%