CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.8%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-0673 critical
CVE-2019-0674 critical
CVE-2019-0671 critical
CVE-2019-0636 warning
CVE-2019-0623 high
CVE-2019-0661 warning
CVE-2019-0599 critical
CVE-2019-0595 critical
CVE-2019-0664 warning
CVE-2019-0615 warning
CVE-2019-0659 warning
CVE-2019-0600 warning
CVE-2019-0619 warning
CVE-2019-0627 warning
CVE-2019-0631 warning
CVE-2019-0660 warning
CVE-2019-0616 warning
CVE-2019-0656 high
CVE-2019-0626 critical
CVE-2019-0633 critical
CVE-2019-0618 critical
CVE-2019-0625 critical
CVE-2019-0628 warning
CVE-2019-0602 warning
CVE-2019-0601 warning
CVE-2019-0637 warning
CVE-2019-0621 warning
CVE-2019-0635 high
CVE-2019-0597 critical
CVE-2019-0596 critical
CVE-2019-0632 warning
CVE-2019-0630 critical
CVE-2019-0598 critical
CVE-2019-0662 critical
CVE-2019-0663 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4486993
support.microsoft.com/kb/4486996
support.microsoft.com/kb/4487000
support.microsoft.com/kb/4487017
support.microsoft.com/kb/4487018
support.microsoft.com/kb/4487020
support.microsoft.com/kb/4487025
support.microsoft.com/kb/4487026
support.microsoft.com/kb/4487028
support.microsoft.com/kb/4487044
support.microsoft.com/kb/4489868
support.microsoft.com/kb/4489871
support.microsoft.com/kb/4489872
support.microsoft.com/kb/4489881
support.microsoft.com/kb/4489882
support.microsoft.com/kb/4489883
support.microsoft.com/kb/4489884
support.microsoft.com/kb/4489886
support.microsoft.com/kb/4489891
support.microsoft.com/kb/4489899
support.microsoft.com/kb/4493441
support.microsoft.com/kb/4493446
support.microsoft.com/kb/4493450
support.microsoft.com/kb/4493451
support.microsoft.com/kb/4493464
support.microsoft.com/kb/4493467
support.microsoft.com/kb/4493470
support.microsoft.com/kb/4493474
support.microsoft.com/kb/4493475
support.microsoft.com/kb/4493509
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190006
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0595
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0596
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0597
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0598
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0599
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0600
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0601
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0602
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0615
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0616
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0618
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0619
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0621
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0623
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0625
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0626
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0627
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0628
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0630
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0631
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0632
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0633
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0635
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0636
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0637
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0656
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0659
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0660
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0661
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0662
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0663
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0664
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0671
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0673
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0674
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.8%