8.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.963 High
EPSS
Percentile
99.5%
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-0758 critical
CVE-2018-0762 critical
CVE-2018-0766 warning
CVE-2018-0767 warning
CVE-2018-0768 critical
CVE-2018-0769 critical
CVE-2018-0770 critical
CVE-2018-0772 critical
CVE-2018-0773 critical
CVE-2018-0774 critical
CVE-2018-0775 critical
CVE-2018-0776 critical
CVE-2018-0777 critical
CVE-2018-0778 critical
CVE-2018-0780 warning
CVE-2018-0781 critical
CVE-2018-0800 warning
CVE-2018-0803 high
CVE-2018-0818 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4056568
support.microsoft.com/kb/4056888
support.microsoft.com/kb/4056890
support.microsoft.com/kb/4056891
support.microsoft.com/kb/4056892
support.microsoft.com/kb/4056893
support.microsoft.com/kb/4056894
support.microsoft.com/kb/4056895
support.microsoft.com/kb/4056896
support.microsoft.com/kb/4088776
support.microsoft.com/kb/4088779
support.microsoft.com/kb/4088782
support.microsoft.com/kb/4088786
support.microsoft.com/kb/4088787
support.microsoft.com/kb/4088875
support.microsoft.com/kb/4088876
support.microsoft.com/kb/4088877
support.microsoft.com/kb/4088878
support.microsoft.com/kb/4089187
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0758
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0762
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0766
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0767
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0768
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0769
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0770
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0772
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0773
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0774
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0775
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0776
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0777
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0778
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0780
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0781
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0800
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0803
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0818
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
8.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.963 High
EPSS
Percentile
99.5%