9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.279 Low
EPSS
Percentile
96.9%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-1246 critical
CVE-2019-1292 high
CVE-2019-1215 high
CVE-2019-1250 critical
CVE-2019-1293 warning
CVE-2019-1273 warning
CVE-2019-1249 critical
CVE-2019-0788 critical
CVE-2019-1242 critical
CVE-2019-1270 warning
CVE-2019-1286 warning
CVE-2019-1240 critical
CVE-2019-1252 warning
CVE-2019-1291 critical
CVE-2019-1251 warning
CVE-2019-1216 warning
CVE-2019-1278 warning
CVE-2019-1272 high
CVE-2019-1256 high
CVE-2019-1303 high
CVE-2019-1248 critical
CVE-2019-1232 warning
CVE-2019-1271 high
CVE-2019-0787 critical
CVE-2019-1241 critical
CVE-2019-1247 critical
CVE-2019-1290 critical
CVE-2019-1269 high
CVE-2019-1244 warning
CVE-2019-1253 high
CVE-2019-1267 high
CVE-2019-1280 critical
CVE-2019-1287 warning
CVE-2019-1277 warning
CVE-2019-1268 high
CVE-2019-1285 high
CVE-2019-0928 high
CVE-2019-1289 warning
CVE-2019-1219 warning
CVE-2019-1214 high
CVE-2019-1243 critical
CVE-2019-1282 warning
CVE-2019-1274 warning
CVE-2019-1294 warning
CVE-2019-1235 high
CVE-2019-1254 warning
CVE-2019-1245 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4512578
support.microsoft.com/kb/4515384
support.microsoft.com/kb/4516044
support.microsoft.com/kb/4516055
support.microsoft.com/kb/4516058
support.microsoft.com/kb/4516062
support.microsoft.com/kb/4516064
support.microsoft.com/kb/4516066
support.microsoft.com/kb/4516067
support.microsoft.com/kb/4516068
support.microsoft.com/kb/4516070
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0787
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0788
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0928
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1214
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1215
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1216
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1219
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1232
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1235
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1240
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1241
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1242
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1243
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1244
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1245
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1246
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1247
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1248
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1249
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1250
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1251
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1252
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1253
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1254
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1256
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1267
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1268
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1269
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1270
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1271
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1272
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1273
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1274
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1277
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1278
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1280
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1282
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1285
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1286
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1287
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1289
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1290
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1291
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1292
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1293
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1294
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1303
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.279 Low
EPSS
Percentile
96.9%