10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.974 High
EPSS
Percentile
99.9%
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service gain privileges, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2014-1816 warning
CVE-2014-6532 critical
CVE-2014-0266 high
CVE-2014-4076 high
CVE-2014-6321 critical
CVE-2014-6322 warning
CVE-2014-6324 critical
CVE-2014-1767 high
CVE-2014-4077 critical
CVE-2014-4074 high
CVE-2014-1807 high
CVE-2013-5065 high
CVE-2014-0300 high
CVE-2014-0323 high
CVE-2014-4971 high
CVE-2014-0301 critical
CVE-2014-0262 high
CVE-2014-0263 critical
CVE-2014-4115 high
CVE-2014-4113 high
CVE-2014-0315 high
CVE-2014-0316 high
CVE-2014-0317 high
CVE-2014-0255 warning
CVE-2014-0318 high
CVE-2014-4118 critical
CVE-2014-6352 critical
CVE-2014-6332 critical
CVE-2014-0296 high
CVE-2014-0256 warning
CVE-2014-1811 warning
CVE-2014-0254 high
CVE-2014-1819 high
CVE-2014-6355 warning
CVE-2014-2780 high
CVE-2014-2781 high
CVE-2014-1812 critical
CVE-2014-4064 warning
CVE-2014-6318 warning
CVE-2014-1814 high
CVE-2014-4060 high
CVE-2014-1824 critical
CVE-2014-6317 high
CVE-2014-4114 critical
CVE-2014-4148 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Write Local Files. Exploitation of vulnerabilities with this impact can lead to writing into some inaccessible files. Files that can be read depends on concrete program errors.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Read Local Files. Exploitation of vulnerabilities with this impact can lead to reading some inaccessible files. Files that can be read depends on conсrete program errors.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
Loss of integrity. Exploitation of vulnerabilities with this impact can lead to partial system fault or system components connection disruption.
support.microsoft.com/kb/2592687
support.microsoft.com/kb/2889913
support.microsoft.com/kb/2904659
support.microsoft.com/kb/2912390
support.microsoft.com/kb/2913602
support.microsoft.com/kb/2914368
support.microsoft.com/kb/2916036
support.microsoft.com/kb/2918614
support.microsoft.com/kb/2919355
support.microsoft.com/kb/2922229
support.microsoft.com/kb/2923392
support.microsoft.com/kb/2926765
support.microsoft.com/kb/2928120
support.microsoft.com/kb/2929961
support.microsoft.com/kb/2930275
support.microsoft.com/kb/2933528
support.microsoft.com/kb/2933826
support.microsoft.com/kb/2934418
support.microsoft.com/kb/2939576
support.microsoft.com/kb/2957189
support.microsoft.com/kb/2957482
support.microsoft.com/kb/2961072
support.microsoft.com/kb/2961858
support.microsoft.com/kb/2961899
support.microsoft.com/kb/2962073
support.microsoft.com/kb/2962123
support.microsoft.com/kb/2962478
support.microsoft.com/kb/2962485
support.microsoft.com/kb/2962486
support.microsoft.com/kb/2962488
support.microsoft.com/kb/2962490
support.microsoft.com/kb/2965788
support.microsoft.com/kb/2966034
support.microsoft.com/kb/2966061
support.microsoft.com/kb/2966631
support.microsoft.com/kb/2969259
support.microsoft.com/kb/2971850
support.microsoft.com/kb/2972280
support.microsoft.com/kb/2973201
support.microsoft.com/kb/2973408
support.microsoft.com/kb/2973906
support.microsoft.com/kb/2973932
support.microsoft.com/kb/2974286
support.microsoft.com/kb/2975681
support.microsoft.com/kb/2975684
support.microsoft.com/kb/2975685
support.microsoft.com/kb/2975689
support.microsoft.com/kb/2976897
support.microsoft.com/kb/2978668
support.microsoft.com/kb/2978742
support.microsoft.com/kb/2984615
support.microsoft.com/kb/2988948
support.microsoft.com/kb/2989935
support.microsoft.com/kb/2991963
support.microsoft.com/kb/2992611
support.microsoft.com/kb/2992719
support.microsoft.com/kb/2993254
support.microsoft.com/kb/2993651
support.microsoft.com/kb/2993958
support.microsoft.com/kb/2998579
support.microsoft.com/kb/3000061
support.microsoft.com/kb/3000869
support.microsoft.com/kb/3002885
support.microsoft.com/kb/3003743
support.microsoft.com/kb/3005607
support.microsoft.com/kb/3006226
support.microsoft.com/kb/3010788
support.microsoft.com/kb/3011443
support.microsoft.com/kb/3011780
support.microsoft.com/kb/3013126
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-5065
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0254
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0255
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0256
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0262
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0263
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0266
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0296
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0300
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0301
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0315
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0316
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0317
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0318
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0323
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1767
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1807
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1811
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1812
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1814
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1816
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1819
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1824
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2780
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2781
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4060
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4064
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4074
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4076
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4077
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4113
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4114
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4115
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4118
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4148
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-4971
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6317
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6318
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6321
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6322
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6324
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6332
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6352
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6355
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-6532
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2003/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Microsoft-Windows-XP/
threats.kaspersky.com/en/product/Windows-RT/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.974 High
EPSS
Percentile
99.9%