9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.5 High
AI Score
Confidence
High
0.953 High
EPSS
Percentile
99.4%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-0782 warning
CVE-2019-0694 warning
CVE-2019-0797 high
CVE-2019-0766 high
CVE-2019-0772 critical
CVE-2019-0704 warning
CVE-2019-0776 warning
CVE-2019-0759 warning
CVE-2019-0765 critical
CVE-2019-0754 warning
CVE-2019-0775 warning
CVE-2019-0756 critical
CVE-2019-0603 critical
CVE-2019-0755 warning
CVE-2019-0726 critical
CVE-2019-0683 warning
CVE-2019-0696 high
CVE-2019-0701 high
CVE-2019-0692 warning
CVE-2019-0614 warning
CVE-2019-0703 warning
CVE-2019-0821 warning
CVE-2019-0695 high
CVE-2019-0702 warning
CVE-2019-0689 warning
CVE-2019-0690 high
CVE-2019-0617 critical
CVE-2019-0693 warning
CVE-2019-0697 critical
CVE-2019-0784 critical
CVE-2019-0767 warning
CVE-2019-0682 warning
CVE-2019-0698 critical
CVE-2019-0774 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4489868
support.microsoft.com/kb/4489871
support.microsoft.com/kb/4489872
support.microsoft.com/kb/4489881
support.microsoft.com/kb/4489882
support.microsoft.com/kb/4489883
support.microsoft.com/kb/4489884
support.microsoft.com/kb/4489886
support.microsoft.com/kb/4489891
support.microsoft.com/kb/4489899
support.microsoft.com/kb/4493441
support.microsoft.com/kb/4493464
support.microsoft.com/kb/4507435
support.microsoft.com/kb/4507448
support.microsoft.com/kb/4507450
support.microsoft.com/kb/4507453
support.microsoft.com/kb/4507455
support.microsoft.com/kb/4507457
support.microsoft.com/kb/4507458
support.microsoft.com/kb/4507460
support.microsoft.com/kb/4507462
support.microsoft.com/kb/4507464
support.microsoft.com/kb/4507469
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0603
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0614
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0617
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0682
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0683
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0689
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0690
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0692
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0693
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0694
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0695
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0696
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0697
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0698
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0701
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0702
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0703
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0704
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0726
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0754
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0755
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0756
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0759
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0765
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0766
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0767
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0772
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0774
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0775
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0776
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0782
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0784
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0797
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0821
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190010
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.5 High
AI Score
Confidence
High
0.953 High
EPSS
Percentile
99.4%