This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:microsoft:windows_7:-:sp1:~~~~x86~
Detail
VendorMicrosoftFirst view 2012-09-18
ProductWindows 7Last view2019-02-25
Version-TypeOs
Edition~~~~x86~ 
Language 
Updatesp1 
 
CPE Productcpe:/o:microsoft:windows_7

Activity : Overall

Related : CVE

 DateAlertAccess VectorAccess ComplexityAuthentication
6.82019-02-25CVE-2019-9116NetworkMediumNone Requ...
9.32017-06-29CVE-2017-8558NetworkMediumNone Requ...
9.32015-08-14CVE-2015-2473NetworkMediumNone Requ...
7.22015-04-21CVE-2015-1701LocalLowNone Requ...
9.32012-09-18CVE-2012-4969NetworkMediumNone Requ...

CWE : Common Weakness Enumeration

%idName
33% (1)CWE-426Untrusted Search Path
33% (1)CWE-284Access Control (Authorization) Issues
33% (1)CWE-264Permissions, Privileges, and Access Controls

Oval Markup Language : Definitions

OvalIDName
oval:org.mitre.oval:def:15729execCommand Use After Free Vulnerability - MS12-063
oval:org.mitre.oval:def:28883Microsoft windows kernel memory disclosure vulnerability - CVE-2015-1701 (MS1...

SAINT Exploits

DescriptionLink
Internet Explorer CMshtmlEd execCommand Use After FreeMore info here

OpenVAS Exploits

idDescription
2012-09-18Name : Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
File : nvt/gb_ms_ie_code_exec_vuln_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0190Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity : Category II - VMSKEY : V0061299
2015-A-0108Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity : Category II - VMSKEY : V0060653

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2017-08-01Microsoft Windows MsMpEng custom apicall instruction use detected
RuleID : 43381 - Type : OS-WINDOWS - Revision : 2
2017-08-01Microsoft Windows MsMpEng custom apicall instruction use detected
RuleID : 43380 - Type : OS-WINDOWS - Revision : 2
2015-06-23Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34499 - Type : OS-WINDOWS - Revision : 3
2015-06-23Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34498 - Type : OS-WINDOWS - Revision : 3
2014-02-21Styx exploit kit eot outbound connection
RuleID : 29453 - Type : EXPLOIT-KIT - Revision : 2
Hide | Show 20 More...
DateDescription
2014-02-21Styx exploit kit landing page request
RuleID : 29452 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit outbound jar request
RuleID : 29451 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit outbound connection attempt
RuleID : 29450 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit landing page
RuleID : 29449 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit landing page
RuleID : 29448 - Type : EXPLOIT-KIT - Revision : 2
2014-02-21Styx exploit kit jar outbound connection
RuleID : 29446 - Type : EXPLOIT-KIT - Revision : 7
2014-02-21Styx exploit kit fonts download page
RuleID : 29445 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Styx exploit kit landing page request
RuleID : 28478 - Type : EXPLOIT-KIT - Revision : 4
2014-01-10Styx exploit kit outbound pdf request
RuleID : 28477 - Type : EXPLOIT-KIT - Revision : 5
2014-01-10Styx exploit kit malicious redirection attempt
RuleID : 27815 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Styx exploit kit landing page request
RuleID : 27814 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Styx exploit kit landing page with payload
RuleID : 27813 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit possible jar download
RuleID : 27706 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27705 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27704 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da exploit kit plugin detection
RuleID : 27703 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Gong Da exploit kit landing page
RuleID : 27702 - Type : EXPLOIT-KIT - Revision : 3
2014-01-10Gong Da Jar file download
RuleID : 27701 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Nailed exploit kit Internet Explorer exploit download - autopwn
RuleID : 27081 - Type : EXPLOIT-KIT - Revision : 2
2014-01-10Styx exploit kit plugin detection connection jovf
RuleID : 27042-community - Type : EXPLOIT-KIT - Revision : 5

Nessus® Vulnerability Scanner

idDescription
2017-06-23Name : The remote host has an antimalware application installed that is affected by ...
File : microsoft_mpeng_1_1_13903.nasl - Type : ACT_GATHER_INFO
2015-08-11Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-082.nasl - Type : ACT_GATHER_INFO
2015-05-12Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-051.nasl - Type : ACT_GATHER_INFO
2012-09-21Name : The remote host is affected by code execution vulnerabilities.
File : smb_nt_ms12-063.nasl - Type : ACT_GATHER_INFO