CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-0663 warning
CVE-2020-0767 critical
CVE-2020-0706 warning
CVE-2020-0713 critical
CVE-2020-0712 critical
CVE-2020-0711 critical
CVE-2020-0710 critical
CVE-2020-0674 critical
CVE-2020-0673 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4532691
support.microsoft.com/kb/4532693
support.microsoft.com/kb/4537762
support.microsoft.com/kb/4537764
support.microsoft.com/kb/4537767
support.microsoft.com/kb/4537776
support.microsoft.com/kb/4537789
support.microsoft.com/kb/4537814
support.microsoft.com/kb/4537820
support.microsoft.com/kb/4537821
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0663
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0673
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0674
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0706
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0710
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0711
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0712
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0713
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0767
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%