CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.8%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-1483 high
CVE-2019-1484 high
CVE-2019-1489 warning
CVE-2019-1488 warning
CVE-2019-1470 warning
CVE-2019-1453 warning
CVE-2019-1465 warning
CVE-2019-1458 high
CVE-2019-1474 warning
CVE-2019-1472 warning
CVE-2019-1476 high
CVE-2019-1471 high
CVE-2019-1467 warning
CVE-2019-1468 critical
CVE-2019-1477 high
CVE-2019-1469 warning
CVE-2019-1466 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4530681
support.microsoft.com/kb/4530684
support.microsoft.com/kb/4530689
support.microsoft.com/kb/4530691
support.microsoft.com/kb/4530698
support.microsoft.com/kb/4530702
support.microsoft.com/kb/4530714
support.microsoft.com/kb/4530715
support.microsoft.com/kb/4530717
support.microsoft.com/kb/4530730
support.microsoft.com/kb/4565503
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1453
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1458
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1465
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1466
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1467
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1468
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1469
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1470
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1471
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1472
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1474
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1476
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1477
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1483
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1484
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1488
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1489
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows-XP/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.8%