9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.279 Low
EPSS
Percentile
96.9%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, spoof user interface, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-0986 warning
CVE-2019-0973 high
CVE-2019-1040 warning
CVE-2019-0909 critical
CVE-2019-0948 warning
CVE-2019-1019 high
CVE-2019-1010 warning
CVE-2019-1053 high
CVE-2019-0908 critical
CVE-2019-0977 warning
CVE-2019-1009 warning
CVE-2019-0722 critical
CVE-2019-1039 warning
CVE-2019-1043 critical
CVE-2019-1025 critical
CVE-2019-0974 critical
CVE-2019-1045 high
CVE-2019-0905 critical
CVE-2019-1014 high
CVE-2019-0941 warning
CVE-2019-0985 high
CVE-2019-0960 high
CVE-2019-0984 high
CVE-2019-0906 critical
CVE-2019-0943 high
CVE-2019-1047 warning
CVE-2019-1028 warning
CVE-2019-1048 warning
CVE-2019-1015 warning
CVE-2019-1049 warning
CVE-2019-1046 warning
CVE-2019-0888 critical
CVE-2019-0907 critical
CVE-2019-1011 warning
CVE-2019-1013 warning
CVE-2019-1012 warning
CVE-2019-0968 warning
CVE-2019-0904 critical
CVE-2019-0713 high
CVE-2019-1017 high
CVE-2019-0972 high
CVE-2019-1016 warning
CVE-2019-1081 warning
CVE-2019-1005 critical
CVE-2019-1055 critical
CVE-2019-1080 critical
CVE-2019-0920 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4503259
support.microsoft.com/kb/4503269
support.microsoft.com/kb/4503273
support.microsoft.com/kb/4503287
support.microsoft.com/kb/4503292
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0713
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0722
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0888
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0904
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0905
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0906
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0907
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0908
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0909
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0920
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0941
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0943
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0948
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0960
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0968
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0972
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0973
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0974
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0977
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0984
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0985
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0986
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1005
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1009
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1010
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1011
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1012
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1013
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1014
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1015
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1016
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1017
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1019
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1025
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1028
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1039
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1040
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1043
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1045
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1046
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1047
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1048
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1049
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1053
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1055
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1080
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1081
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.279 Low
EPSS
Percentile
96.9%