CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.6%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2016-7239 warning
CVE-2016-7209 high
CVE-2016-7227 warning
CVE-2016-7208 critical
CVE-2016-7195 critical
CVE-2016-7196 critical
CVE-2016-7198 critical
CVE-2016-7199 warning
CVE-2016-7200 critical
CVE-2016-7201 critical
CVE-2016-7202 critical
CVE-2016-7203 critical
CVE-2016-7204 warning
CVE-2016-7243 critical
CVE-2016-7242 critical
CVE-2016-7241 critical
CVE-2016-7240 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/3197867
support.microsoft.com/kb/3197868
support.microsoft.com/kb/3197873
support.microsoft.com/kb/3197874
support.microsoft.com/kb/3197876
support.microsoft.com/kb/3197877
support.microsoft.com/kb/3198585
support.microsoft.com/kb/3198586
support.microsoft.com/kb/3200970
support.microsoft.com/kb/3205383
support.microsoft.com/kb/3205386
support.microsoft.com/kb/3205394
support.microsoft.com/kb/3205400
support.microsoft.com/kb/3205401
support.microsoft.com/kb/3205408
support.microsoft.com/kb/3205409
support.microsoft.com/kb/3206632
support.microsoft.com/kb/3207752
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7195
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7196
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7198
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7199
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7200
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7201
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7202
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7203
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7204
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7208
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7209
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7227
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7239
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7240
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7241
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7242
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7243
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows/
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.6%