9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.877 High
EPSS
Percentile
98.7%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-0785 critical
CVE-2019-1120 critical
CVE-2019-1130 high
CVE-2019-1127 critical
CVE-2019-1086 warning
CVE-2019-1128 critical
CVE-2019-0999 high
CVE-2019-1129 high
CVE-2019-1093 warning
CVE-2019-1108 warning
CVE-2019-1097 warning
CVE-2019-1087 warning
CVE-2019-1123 critical
CVE-2019-1089 high
CVE-2019-1095 warning
CVE-2019-1124 critical
CVE-2019-1091 warning
CVE-2019-1096 warning
CVE-2019-0880 warning
CVE-2019-1006 warning
CVE-2019-1117 critical
CVE-2019-1088 warning
CVE-2019-1071 warning
CVE-2019-1121 critical
CVE-2019-1094 warning
CVE-2019-1119 critical
CVE-2019-1122 critical
CVE-2019-0865 warning
CVE-2019-1037 high
CVE-2019-0966 high
CVE-2019-1102 critical
CVE-2019-1118 critical
CVE-2019-1085 warning
CVE-2019-0811 warning
CVE-2019-0887 critical
CVE-2019-1090 high
CVE-2019-1074 warning
CVE-2019-1073 warning
CVE-2019-1126 warning
CVE-2019-1082 high
CVE-2019-0975 high
CVE-2019-1067 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4507435
support.microsoft.com/kb/4507448
support.microsoft.com/kb/4507450
support.microsoft.com/kb/4507453
support.microsoft.com/kb/4507455
support.microsoft.com/kb/4507457
support.microsoft.com/kb/4507458
support.microsoft.com/kb/4507460
support.microsoft.com/kb/4507462
support.microsoft.com/kb/4507464
support.microsoft.com/kb/4507469
support.microsoft.com/kb/5008215
support.microsoft.com/kb/5008223
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0785
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0811
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0865
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0880
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0887
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0966
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0975
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0999
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1006
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1037
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1067
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1071
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1073
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1074
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1082
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1085
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1086
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1087
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1088
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1089
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1090
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1091
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1093
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1094
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1095
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1096
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1097
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1102
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1108
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1117
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1118
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1119
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1120
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1121
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1122
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1123
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1124
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1126
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1127
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1128
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1129
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1130
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.877 High
EPSS
Percentile
98.7%