10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.902 High
EPSS
Percentile
98.8%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, cause denial of service, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-1143 high
CVE-2019-0720 critical
CVE-2019-1179 critical
CVE-2019-1175 critical
CVE-2019-1190 critical
CVE-2019-0715 high
CVE-2019-1174 critical
CVE-2019-1227 high
CVE-2019-0716 warning
CVE-2019-1176 critical
CVE-2019-1144 critical
CVE-2019-9506 critical
CVE-2019-9513 critical
CVE-2019-1226 critical
CVE-2019-1177 critical
CVE-2019-1186 critical
CVE-2019-9511 critical
CVE-2019-1153 high
CVE-2019-1147 critical
CVE-2019-1078 high
CVE-2019-1171 high
CVE-2019-0714 high
CVE-2019-1145 critical
CVE-2019-9514 critical
CVE-2019-1170 critical
CVE-2019-1187 critical
CVE-2019-1151 critical
CVE-2019-9512 critical
CVE-2019-1146 critical
CVE-2019-1148 high
CVE-2019-1178 critical
CVE-2019-1180 critical
CVE-2019-1181 critical
CVE-2019-1157 critical
CVE-2019-1163 high
CVE-2019-0718 high
CVE-2019-1172 warning
CVE-2019-1155 critical
CVE-2019-0723 high
CVE-2019-1185 critical
CVE-2019-1149 critical
CVE-2019-1206 critical
CVE-2019-1159 critical
CVE-2019-1188 critical
CVE-2019-1173 critical
CVE-2019-1212 critical
CVE-2019-1162 critical
CVE-2019-1150 critical
CVE-2019-1164 critical
CVE-2019-9518 critical
CVE-2019-1222 critical
CVE-2019-1223 critical
CVE-2019-1152 critical
CVE-2019-1198 high
CVE-2019-1158 high
CVE-2019-1183 critical
CVE-2019-1156 critical
CVE-2019-1225 critical
CVE-2019-1182 critical
CVE-2019-1057 critical
CVE-2019-1224 critical
CVE-2019-0736 critical
CVE-2019-1168 critical
CVE-2019-0965 critical
CVE-2019-0717 high
CVE-2019-1184 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4511553
support.microsoft.com/kb/4512488
support.microsoft.com/kb/4512489
support.microsoft.com/kb/4512497
support.microsoft.com/kb/4512501
support.microsoft.com/kb/4512507
support.microsoft.com/kb/4512508
support.microsoft.com/kb/4512516
support.microsoft.com/kb/4512517
support.microsoft.com/kb/4540673
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV190023
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0714
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0715
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0716
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0717
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0718
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0720
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0723
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0736
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0965
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1057
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1078
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1143
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1144
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1145
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1146
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1147
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1148
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1149
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1150
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1151
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1152
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1153
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1155
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1156
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1157
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1158
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1159
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1162
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1163
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1164
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1168
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1170
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1171
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1172
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1173
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1174
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1175
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1176
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1177
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1178
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1179
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1180
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1181
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1182
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1183
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1184
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1185
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1186
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1187
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1188
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1190
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1198
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1206
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1212
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1222
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1223
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1224
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1225
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1226
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1227
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-9506
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-9511
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-9512
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-9513
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-9514
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-9518
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.902 High
EPSS
Percentile
98.8%