7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
8.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
0.964 High
EPSS
Percentile
99.6%
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-8384 critical
CVE-2018-8372 critical
CVE-2018-8385 critical
CVE-2018-8266 critical
CVE-2018-8380 critical
CVE-2018-8359 critical
CVE-2018-8381 critical
CVE-2018-8355 critical
CVE-2018-8390 critical
CVE-2018-8387 critical
CVE-2018-8357 high
CVE-2018-8353 critical
CVE-2018-8383 warning
CVE-2018-8377 critical
CVE-2018-8389 critical
CVE-2018-8316 critical
CVE-2018-8388 warning
CVE-2018-8371 critical
CVE-2018-8351 warning
CVE-2018-8373 critical
CVE-2018-8403 critical
CVE-2018-8370 warning
CVE-2018-8358 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4343205
support.microsoft.com/kb/4343885
support.microsoft.com/kb/4343887
support.microsoft.com/kb/4343892
support.microsoft.com/kb/4343897
support.microsoft.com/kb/4343898
support.microsoft.com/kb/4343899
support.microsoft.com/kb/4343900
support.microsoft.com/kb/4343901
support.microsoft.com/kb/4343909
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8266
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8316
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8351
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8353
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8355
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8357
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8358
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8359
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8370
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8371
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8372
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8373
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8377
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8380
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8381
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8383
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8384
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8385
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8387
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8388
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8389
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8390
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8403
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
8.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
0.964 High
EPSS
Percentile
99.6%