7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.962 High
EPSS
Percentile
99.5%
Multiple vulnerabilities were found in Microsoft Edge and Internet Explorer. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, obtain sensitive information, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-0949 warning
CVE-2018-8278 high
CVE-2018-8242 critical
CVE-2018-8286 critical
CVE-2018-8279 critical
CVE-2018-8324 warning
CVE-2018-8294 critical
CVE-2018-8296 critical
CVE-2018-8297 warning
CVE-2018-8262 critical
CVE-2018-8125 critical
CVE-2018-8276 warning
CVE-2018-8280 critical
CVE-2018-8290 critical
CVE-2018-8274 critical
CVE-2018-8325 warning
CVE-2018-8301 critical
CVE-2018-8289 warning
CVE-2018-8288 critical
CVE-2018-8291 critical
CVE-2018-8275 critical
CVE-2018-8287 critical
CVE-2018-8298 critical
CVE-2018-8283 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4338814
support.microsoft.com/kb/4338815
support.microsoft.com/kb/4338816
support.microsoft.com/kb/4338818
support.microsoft.com/kb/4338819
support.microsoft.com/kb/4338821
support.microsoft.com/kb/4338825
support.microsoft.com/kb/4338826
support.microsoft.com/kb/4338829
support.microsoft.com/kb/4338830
support.microsoft.com/kb/4338831
support.microsoft.com/kb/4339093
support.microsoft.com/kb/4345418
support.microsoft.com/kb/4345419
support.microsoft.com/kb/4345420
support.microsoft.com/kb/4345421
support.microsoft.com/kb/4345424
support.microsoft.com/kb/4345425
support.microsoft.com/kb/4345455
support.microsoft.com/kb/4345459
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-0949
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8125
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8242
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8262
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8274
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8275
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8276
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8278
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8279
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8280
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8283
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8286
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8287
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8288
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8289
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8290
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8291
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8294
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8296
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8297
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8298
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8301
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8324
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8325
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.962 High
EPSS
Percentile
99.5%