9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%
05/14/2019
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface.
Public exploits exist for this vulnerability.
Windows Server 2016 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Internet Explorer 11
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Internet Explorer 10
Windows 10 Version 1709 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows RT 8.1
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 7 for x64-based Systems Service Pack 1
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1903 for ARM64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 for x64-based Systems
Windows Server, version 1903 (Server Core installation)
Windows Server 2019 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2016
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2012 R2
Windows 10 Version 1607 for 32-bit Systems
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Microsoft Edge (EdgeHTML-based)
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2019
Internet Explorer 9
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1803 for 32-bit Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-0734
CVE-2019-0918
CVE-2019-0889
CVE-2019-0885
CVE-2019-0884
CVE-2019-0882
CVE-2019-0881
CVE-2019-0758
CVE-2019-0863
CVE-2019-0890
CVE-2019-0961
CVE-2019-0898
CVE-2019-0899
CVE-2019-0930
CVE-2019-0921
CVE-2019-0708
CVE-2019-0891
CVE-2019-0893
CVE-2019-0902
CVE-2019-0903
CVE-2019-0896
CVE-2019-0895
CVE-2019-0936
CVE-2019-0897
CVE-2019-0900
CVE-2019-0725
CVE-2019-0894
CVE-2019-0901
ADV190013
ACE
CVE-2019-09216.5High
CVE-2019-09187.5Critical
CVE-2019-08847.5Critical
CVE-2019-09306.5High
CVE-2019-08957.8Critical
CVE-2019-08897.8Critical
CVE-2019-08637.8Critical
CVE-2019-07586.5High
CVE-2019-08917.8Critical
CVE-2019-09367.8Critical
CVE-2019-09007.8Critical
CVE-2019-09616.5High
CVE-2019-09038.8Critical
CVE-2019-08857.8Critical
CVE-2019-08947.8Critical
CVE-2019-07089.8Critical
CVE-2019-08937.8Critical
CVE-2019-09028.8Critical
CVE-2019-08967.8Critical
CVE-2019-08826.5High
CVE-2019-08977.8Critical
CVE-2019-07259.8Critical
CVE-2019-09017.8Critical
CVE-2019-08987.8Critical
CVE-2019-07348.1Critical
CVE-2019-08907.8Critical
CVE-2019-08817.8Critical
CVE-2019-08997.8Critical
4499164
4499175
4498206
4499149
4499180
4503287
4503273
4516051
4516065
4516026
4516033
support.microsoft.com/kb/4498206
support.microsoft.com/kb/4499149
support.microsoft.com/kb/4499164
support.microsoft.com/kb/4499175
support.microsoft.com/kb/4499180
support.microsoft.com/kb/4503273
support.microsoft.com/kb/4503287
support.microsoft.com/kb/4516026
support.microsoft.com/kb/4516033
support.microsoft.com/kb/4516051
support.microsoft.com/kb/4516065
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0708
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0725
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0918
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0921
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0961
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV190013
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0708
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0725
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0734
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0758
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0863
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0881
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0882
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0884
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0885
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0889
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0890
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0891
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0893
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0894
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0895
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0896
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0897
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0898
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0899
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0900
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0901
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0902
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0903
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0918
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0921
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0930
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0936
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0961
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%