7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
0.951 High
EPSS
Percentile
99.3%
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
Technical details
Vulnerability (4) allows to bypass Mark of the Web Tagging (MOTW).
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-8227 critical
CVE-2018-8229 critical
CVE-2018-8243 critical
CVE-2018-8236 critical
CVE-2018-8113 warning
CVE-2018-8234 warning
CVE-2018-8249 critical
CVE-2018-8110 critical
CVE-2018-8235 warning
CVE-2018-8267 critical
CVE-2018-0871 warning
CVE-2018-8111 critical
CVE-2018-0978 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4230450
support.microsoft.com/kb/4284815
support.microsoft.com/kb/4284819
support.microsoft.com/kb/4284826
support.microsoft.com/kb/4284835
support.microsoft.com/kb/4284855
support.microsoft.com/kb/4284860
support.microsoft.com/kb/4284874
support.microsoft.com/kb/4284880
support.microsoft.com/kb/4532691
support.microsoft.com/kb/4532693
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0871
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0978
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8110
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8111
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8113
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8227
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8229
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8234
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8235
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8236
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8243
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8249
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8267
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
0.951 High
EPSS
Percentile
99.3%