CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.7%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, spoof user interface, bypass security restrictions, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-1318 high
CVE-2019-1339 critical
CVE-2019-1368 warning
CVE-2019-1311 critical
CVE-2019-1340 critical
CVE-2019-1326 critical
CVE-2019-1346 high
CVE-2019-1344 high
CVE-2019-1337 high
CVE-2019-1320 critical
CVE-2019-1230 high
CVE-2019-1336 critical
CVE-2019-1322 critical
CVE-2019-1060 critical
CVE-2019-1321 critical
CVE-2019-1315 critical
CVE-2019-1166 high
CVE-2019-1333 critical
CVE-2019-1319 critical
CVE-2019-1334 high
CVE-2019-1345 high
CVE-2019-1341 critical
CVE-2019-1323 critical
CVE-2019-1347 high
CVE-2019-1365 critical
CVE-2019-1359 critical
CVE-2019-1342 critical
CVE-2019-1316 critical
CVE-2019-1358 critical
CVE-2019-1378 critical
CVE-2019-1343 high
CVE-2019-1317 high
CVE-2019-1325 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4517388
support.microsoft.com/kb/4517389
support.microsoft.com/kb/4519335
support.microsoft.com/kb/4519336
support.microsoft.com/kb/4519337
support.microsoft.com/kb/4519338
support.microsoft.com/kb/4519764
support.microsoft.com/kb/4519765
support.microsoft.com/kb/4519990
support.microsoft.com/kb/4519998
support.microsoft.com/kb/4520004
support.microsoft.com/kb/4520005
support.microsoft.com/kb/4520008
support.microsoft.com/kb/4520010
support.microsoft.com/kb/4520011
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1060
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1166
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1230
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1311
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1315
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1316
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1317
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1318
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1319
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1320
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1321
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1322
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1323
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1325
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1326
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1333
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1334
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1336
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1337
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1339
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1340
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1341
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1342
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1343
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1344
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1345
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1346
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1347
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1358
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1359
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1365
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1368
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1378
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.7%