9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.879 High
EPSS
Percentile
98.7%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, gain privileges, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-1065 high
CVE-2019-0959 high
CVE-2019-0986 warning
CVE-2019-0973 high
CVE-2019-1040 warning
CVE-2019-0909 critical
CVE-2019-0948 warning
CVE-2019-1019 high
CVE-2019-1010 warning
CVE-2019-1027 warning
CVE-2019-1041 high
CVE-2019-1053 high
CVE-2019-0908 critical
CVE-2019-0722 critical
CVE-2019-1039 warning
CVE-2019-1007 warning
CVE-2019-1043 critical
CVE-2019-1025 critical
CVE-2019-1044 high
CVE-2019-0974 critical
CVE-2019-0709 critical
CVE-2019-0620 critical
CVE-2019-1045 high
CVE-2019-0905 critical
CVE-2019-1069 high
CVE-2019-1014 high
CVE-2019-0941 warning
CVE-2019-1026 warning
CVE-2019-0984 high
CVE-2019-0906 critical
CVE-2019-0943 high
CVE-2019-1028 warning
CVE-2019-1021 warning
CVE-2019-1015 warning
CVE-2019-1064 high
CVE-2019-1046 warning
CVE-2019-0888 critical
CVE-2019-0907 critical
CVE-2019-0711 high
CVE-2019-1050 warning
CVE-2019-1012 warning
CVE-2019-1018 high
CVE-2019-0904 critical
CVE-2019-1022 warning
CVE-2019-0713 high
CVE-2019-1017 high
CVE-2019-0998 high
CVE-2019-0710 high
CVE-2019-0983 high
CVE-2019-0972 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4503263
support.microsoft.com/kb/4503267
support.microsoft.com/kb/4503276
support.microsoft.com/kb/4503279
support.microsoft.com/kb/4503284
support.microsoft.com/kb/4503285
support.microsoft.com/kb/4503286
support.microsoft.com/kb/4503290
support.microsoft.com/kb/4503291
support.microsoft.com/kb/4503293
support.microsoft.com/kb/4503327
support.microsoft.com/kb/4507453
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0620
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0709
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0710
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0711
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0713
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0722
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0888
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0904
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0905
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0906
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0907
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0908
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0909
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0941
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0943
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0948
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0959
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0972
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0973
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0974
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0983
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0984
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0986
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0998
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1007
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1010
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1012
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1014
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1015
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1017
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1018
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1019
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1021
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1022
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1025
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1026
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1027
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1028
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1039
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1040
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1041
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1043
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1044
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1045
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1046
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1050
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1053
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1064
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1065
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1069
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190016
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190017
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.879 High
EPSS
Percentile
98.7%