This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:microsoft:windows_7:-:sp1:~~~~x64~
Detail
VendorMicrosoftFirst view 2012-09-18
ProductWindows 7Last view2019-06-12
Version-TypeOs
Edition~~~~x64~ 
Language 
Updatesp1 
 
CPE Productcpe:/o:microsoft:windows_7

Activity : Overall

Related : CVE

 DateAlertAccess VectorAccess ComplexityAuthentication
92019-06-12CVE-2019-0722NetworkLowRequires ...
5.52019-06-12CVE-2019-0713Adjacent ...LowRequires ...
5.52019-04-08CVE-2019-0690Adjacent ...LowRequires ...
5.52019-03-05CVE-2019-0635Adjacent ...LowRequires ...
7.72018-10-10CVE-2018-8489Adjacent ...LowRequires ...
Hide | Show 6 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
5.22018-09-12CVE-2018-8434Adjacent ...MediumRequires ...
7.22018-04-02CVE-2018-1038LocalLowNone Requ...
9.32015-08-14CVE-2015-2473NetworkMediumNone Requ...
7.22015-04-21CVE-2015-1701LocalLowNone Requ...
52012-11-13CVE-2012-2532NetworkLowNone Requ...
9.32012-09-18CVE-2012-4969NetworkMediumNone Requ...

CWE : Common Weakness Enumeration

%idName
44% (4)CWE-20Improper Input Validation
33% (3)CWE-200Information Exposure
22% (2)CWE-264Permissions, Privileges, and Access Controls

Oval Markup Language : Definitions

OvalIDName
oval:org.mitre.oval:def:15729execCommand Use After Free Vulnerability - MS12-063
oval:org.mitre.oval:def:28883Microsoft windows kernel memory disclosure vulnerability - CVE-2015-1701 (MS1...
oval:org.mitre.oval:def:15786FTP Command Injection Vulnerability - MS12-073

SAINT Exploits

DescriptionLink
Internet Explorer CMshtmlEd execCommand Use After FreeMore info here

OpenVAS Exploits

idDescription
2012-11-14Name : Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
File : nvt/secpod_ms12-073.nasl
2012-09-18Name : Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
File : nvt/gb_ms_ie_code_exec_vuln_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0190Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity : Category II - VMSKEY : V0061299
2015-A-0108Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity : Category II - VMSKEY : V0060653
2012-B-0111Multiple Vulnerabilities in Microsoft Internet Information Services (IIS)
Severity : Category I - VMSKEY : V0034953

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2018-05-29Total Meltdown side-channel information leak attempt
RuleID : 46432 - Type : OS-WINDOWS - Revision : 1
2018-05-29Total Meltdown side-channel information leak attempt
RuleID : 46431 - Type : OS-WINDOWS - Revision : 1
2018-05-29Total Meltdown side-channel information leak attempt
RuleID : 46430 - Type : OS-WINDOWS - Revision : 1
2018-05-29Total Meltdown side-channel information leak attempt
RuleID : 46429 - Type : OS-WINDOWS - Revision : 1
2015-06-23Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34499 - Type : OS-WINDOWS - Revision : 3
Hide | Show 20 More...
DateDescription
2015-06-23Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34498 - Type : OS-WINDOWS - Revision : 3
2014-02-21Styx exploit kit eot outbound connection
RuleID : 29453 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit landing page request
RuleID : 29452 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit outbound jar request
RuleID : 29451 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit outbound connection attempt
RuleID : 29450 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit landing page
RuleID : 29449 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit landing page
RuleID : 29448 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit jar outbound connection
RuleID : 29446 - Type : EXPLOIT-KIT - Revision : 7
2014-02-21Styx exploit kit fonts download page
RuleID : 29445 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Styx exploit kit landing page request
RuleID : 28478 - Type : EXPLOIT-KIT - Revision : 4
2014-01-10Styx exploit kit outbound pdf request
RuleID : 28477 - Type : EXPLOIT-KIT - Revision : 5
2014-01-10Styx exploit kit malicious redirection attempt
RuleID : 27815 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Styx exploit kit landing page request
RuleID : 27814 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Styx exploit kit landing page with payload
RuleID : 27813 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit possible jar download
RuleID : 27706 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27705 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27704 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit plugin detection
RuleID : 27703 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Gong Da exploit kit landing page
RuleID : 27702 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da Jar file download
RuleID : 27701 - Type : EXPLOIT-KIT - Revision : 2

Nessus® Vulnerability Scanner

idDescription
2015-08-11Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-082.nasl - Type : ACT_GATHER_INFO
2015-05-12Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-051.nasl - Type : ACT_GATHER_INFO
2012-11-16Name : The Microsoft IIS service running on the remote system contains flaws that co...
File : iis_ftp7_ms12-073.nasl - Type : ACT_ATTACK
2012-11-14Name : The Microsoft IIS service running on the remote system contains flaws that co...
File : smb_nt_ms12-073.nasl - Type : ACT_GATHER_INFO
2012-09-21Name : The remote host is affected by code execution vulnerabilities.
File : smb_nt_ms12-063.nasl - Type : ACT_GATHER_INFO