This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:microsoft:windows_nt
Detail
VendorMicrosoftFirst view 1995-01-01
ProductWindows NtLast view2014-04-23
VersionTypeOs
Edition 
Language 
Update 

Activity : Overall

COMMON PLATFORM ENUMERATION : Repartition per Version

CPE NameAffected CVE
cpe:/o:microsoft:windows_nt:4.0132
cpe:/o:microsoft:windows_nt84
cpe:/o:microsoft:windows_nt:4.0::terminal_server61
cpe:/o:microsoft:windows_nt:4.0::server60
cpe:/o:microsoft:windows_nt:4.0:sp6a:~~server~~x86~58
Hide | Show 45 More...
CPE NameAffected CVE
cpe:/o:microsoft:windows_nt:4.0:sp2:~~server~~x86~55
cpe:/o:microsoft:windows_nt:4.0:sp1:~~server~~x86~54
cpe:/o:microsoft:windows_nt:4.0:sp3:~~server~~x86~54
cpe:/o:microsoft:windows_nt:4.0:sp4:~~server~~x86~54
cpe:/o:microsoft:windows_nt:4.0:sp5:~~server~~x86~54
cpe:/o:microsoft:windows_nt:4.0:sp6:~~terminal_server~~x86~53
cpe:/o:microsoft:windows_nt:4.0:sp1:~~terminal_server~~x86~52
cpe:/o:microsoft:windows_nt:4.0:sp2:~~terminal_server~~x86~52
cpe:/o:microsoft:windows_nt:4.0:sp3:~~terminal_server~~x86~52
cpe:/o:microsoft:windows_nt:4.0:sp4:~~terminal_server~~x86~52
cpe:/o:microsoft:windows_nt:4.0:sp5:~~terminal_server~~x86~52
cpe:/o:microsoft:windows_nt:4.0:sp6:~~server~~x86~52
cpe:/o:microsoft:windows_nt:4.0:sp6a:enterprise_server51
cpe:/o:microsoft:windows_nt:4.0:sp6a:~~workstation~~x86~50
cpe:/o:microsoft:windows_nt:4.0:sp2:enterprise_server49
cpe:/o:microsoft:windows_nt:4.0:sp1:enterprise_server49
cpe:/o:microsoft:windows_nt:4.0:sp3:enterprise_server49
cpe:/o:microsoft:windows_nt:4.0:sp5:enterprise_server49
cpe:/o:microsoft:windows_nt:4.0:sp4:enterprise_server49
cpe:/o:microsoft:windows_nt:4.0:sp6:enterprise_server47
cpe:/o:microsoft:windows_nt:4.0:sp1:~~workstation~~x86~47
cpe:/o:microsoft:windows_nt:4.0:sp2:~~workstation~~x86~47
cpe:/o:microsoft:windows_nt:4.0:sp3:~~workstation~~x86~47
cpe:/o:microsoft:windows_nt:4.0:sp4:~~workstation~~x86~47
cpe:/o:microsoft:windows_nt:4.0:sp5:~~workstation~~x86~47
cpe:/o:microsoft:windows_nt:4.0::workstation45
cpe:/o:microsoft:windows_nt:4.0:sp6:~~workstation~~x86~45
cpe:/o:microsoft:windows_nt:4.0::enterprise_server44
cpe:/o:microsoft:windows_nt:4.0:sp236
cpe:/o:microsoft:windows_nt:4.0:sp135
cpe:/o:microsoft:windows_nt:4.0:sp431
cpe:/o:microsoft:windows_nt:4.0:sp331
cpe:/o:microsoft:windows_nt:4.0:sp6a:~~terminal_server~~x86~31
cpe:/o:microsoft:windows_nt:4.0:sp526
cpe:/o:microsoft:windows_nt:3.5.119
cpe:/o:microsoft:windows_nt:4.0:sp617
cpe:/o:microsoft:windows_nt:4.0:sp6a16
cpe:/o:microsoft:windows_nt:3.5.1:sp115
cpe:/o:microsoft:windows_nt:3.5.1:sp215
cpe:/o:microsoft:windows_nt:3.5.1:sp514
cpe:/o:microsoft:windows_nt:3.5.1:sp314
cpe:/o:microsoft:windows_nt:3.5.1:sp412
cpe:/o:microsoft:windows_nt:terminal_server12
cpe:/o:microsoft:windows_nt:3.0.110
cpe:/o:microsoft:windows_nt:3.110

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
6.42014-04-23CVE-2011-5279NetworkLowNone Requ...
7.22010-01-21CVE-2010-0232LocalLowNone Requ...
7.12008-10-20CVE-2008-4609NetworkMediumNone Requ...
4.32008-08-29CVE-2008-3860NetworkMediumNone Requ...
9.32008-08-12CVE-2008-3018NetworkMediumNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
9.32008-07-07CVE-2008-2430NetworkMediumNone Requ...
6.82008-06-24CVE-2008-2841NetworkMediumNone Requ...
9.32008-06-24CVE-2008-2427NetworkMediumNone Requ...
9.32008-06-23CVE-2008-2821NetworkMediumNone Requ...
6.42008-06-12CVE-2008-2674NetworkLowNone Requ...
4.32008-05-13CVE-2008-2163NetworkMediumNone Requ...
7.82008-01-11CVE-2007-6423NetworkLowNone Requ...
52007-12-20CVE-2007-6334NetworkLowNone Requ...
9.32007-11-19CVE-2007-6026NetworkMediumNone Requ...
7.62007-09-18CVE-2007-4938NetworkHighNone Requ...
7.12007-07-24CVE-2007-3958NetworkMediumNone Requ...
7.82007-06-28CVE-2007-3482NetworkLowNone Requ...
102007-05-17CVE-2007-2736NetworkLowNone Requ...
5.82007-05-16CVE-2007-1898NetworkMediumNone Requ...
52007-04-24CVE-2007-2186NetworkLowNone Requ...
6.92007-04-11CVE-2007-1973LocalMediumNone Requ...
6.82007-04-10CVE-2007-1912NetworkMediumNone Requ...
6.52007-03-28CVE-2007-1727NetworkLowRequires ...
52007-02-22CVE-2006-7039NetworkLowNone Requ...

CWE : Common Weakness Enumeration

%idName
25% (13)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
17% (9)CWE-264Permissions, Privileges, and Access Controls
13% (7)CWE-20Improper Input Validation
7% (4)CWE-16Configuration
5% (3)CWE-94Failure to Control Generation of Code ('Code Injection')
Hide | Show 9 More...
%idName
5% (3)CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')
3% (2)CWE-399Resource Management Errors
3% (2)CWE-287Improper Authentication
3% (2)CWE-255Credentials Management
3% (2)CWE-200Information Exposure
1% (1)CWE-189Numeric Errors
1% (1)CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (1)CWE-19Data Handling
1% (1)CWE-17Code

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idName
CAPEC-1Accessing Functionality Not Properly Constrained by ACLs
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-11Cause Web Server Misclassification
CAPEC-13Subverting Environment Variable Values
CAPEC-17Accessing, Modifying or Executing Executable Files
Hide | Show 20 More...
idName
CAPEC-21Exploitation of Session Variables, Resource IDs and other Trusted Credentials
CAPEC-27Leveraging Race Conditions via Symbolic Links
CAPEC-29Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-31Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-39Manipulating Opaque Client-based Data Tokens
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-59Session Credential Falsification through Prediction
CAPEC-60Reusing Session IDs (aka Session Replay)
CAPEC-61Session Fixation
CAPEC-62Cross Site Request Forgery (aka Session Riding)
CAPEC-75Manipulating Writeable Configuration Files
CAPEC-76Manipulating Input to File System Calls
CAPEC-77Manipulating User-Controlled Variables
CAPEC-89Pharming
CAPEC-111JSON Hijacking (aka JavaScript Hijacking)
CAPEC-118Data Leakage Attacks
CAPEC-119Resource Depletion
CAPEC-122Exploitation of Authorization
CAPEC-125Resource Depletion through Flooding

SAINT Exploits

DescriptionLink
Microsoft Jet Engine MDB file ColumnName buffer overflowMore info here
Windows LSASS buffer overflowMore info here
Windows Task Scheduler buffer overflowMore info here
Windows Cursor and Icon handling vulnerabilityMore info here
Windows password weaknessMore info here
Hide | Show 8 More...
DescriptionLink
Windows RPC DCOM interface buffer overflowMore info here
Microsoft SSL library PCT buffer overflowMore info here
Trend Micro ServerProtect CMON_ActiveUpdate buffer overflowMore info here
Trend Micro ServerProtect CMON_NetTestConnection buffer overflowMore info here
Trend Micro ServerProtect ENG_SendEMail buffer overflowMore info here
Trend Micro ServerProtect ENG_SetRealTimeScanConfigInfo buffer overflowMore info here
Microsoft WINS replication service pointer corruptionMore info here
Windows NetDDE buffer overflowMore info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
62144F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St...
61854Microsoft Windows #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
61133Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC...
60273Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass ...
60183Deerfield WebSite Pro Direct Request Arbitrary Source Disclosure
Hide | Show 20 More...
idDescription
60145Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
59732Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Fo...
59615ProxyView Embedded Windows NT Default Admin Account Password
59515Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
59513Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
59482Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation...
59333Microsoft Windows NT Winlogon Key Local Shutdown DoS
59325Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privil...
59260Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
59250Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
59249Windows NT Unprivileged Local Share Manipulation
58614McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio...
58321Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati...
58189Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC...
58090NTMail VRFY Functionality Persistence
57993Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem...
57795Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State...
57794Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl...
57793Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta...
55332Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS

ExploitDB Exploits

idDescription
21746MS Windows 2000/NT 4/XP Network Share Provider SMB Request Buffer Overflow (1)
20006Windows NT 4.0 Remote Registry Request Dos Vulnerability (2)
11199Windows NT - User Mode to Ring 0 Escalation Vulnerability
4367Trend Micro ServerProtect eng50.dll - Remote Stack Overflow Exploit
3022MS Windows ASN.1 - Remote Exploit (MS04-007)
Hide | Show 3 More...
idDescription
1065MS Windows (SMB) Transaction Response Handling Exploit (MS05-011)
771MS Internet Explorer .ANI files handling Downloader Exploit (MS05-002)
765MS Internet Explorer .ANI files handling Universal Exploit (MS05-002)

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2011-10-14Name : Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
File : nvt/gb_ms_windows_smb_share_passwd_null_sec_bypass_vuln.nasl
2011-08-12Name : Finger Service Remote Information Disclosure Vulnerability
File : nvt/gb_finger_remote_info_disc_vuln.nasl
2011-04-11Name : Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
File : nvt/gb_ms_windows_nic_security_bypass_vuln.nasl
2010-07-08Name : Microsoft Windows GDI Multiple Vulnerabilities (925902)
File : nvt/ms07-017.nasl
2010-04-26Name : Windows NT NNTP Component Buffer Overflow
File : nvt/gb_ms04_036.nasl
Hide | Show 20 More...
idDescription
2010-02-10Name : Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
File : nvt/secpod_ms10-015.nasl
2010-01-22Name : Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
File : nvt/gb_ms_kernel_prv_esc_vuln.nasl
2009-11-16Name : Microsoft RPC Interface Buffer Overrun (KB824146)
File : nvt/msrpc_dcom2.nasl
2009-09-10Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-06-23Name : Debian Security Advisory DSA 1819-1 (vlc)
File : nvt/deb_1819_1.nasl
2009-04-09Name : Mandriva Update for mplayer MDKSA-2007:192 (mplayer)
File : nvt/gb_mandriva_MDKSA_2007_192.nasl
2009-03-16Name : Microsoft MS03-034 security check
File : nvt/remote-MS03-034.nasl
2009-03-15Name : MS04-011 security check
File : nvt/remote-MS04-011.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200807-13 (vlc)
File : nvt/glsa_200807_13.nasl
2008-09-03Name : Windows Vulnerability in Microsoft Jet Database Engine
File : nvt/win_CVE-2007-6026.nasl
2008-08-19Name : Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (9...
File : nvt/secpod_ms08-044_900029.nasl
2006-03-26Name : Microsoft's SQL Version Query
File : nvt/mssql_version.nasl
2005-11-03Name : Checks for MS HOTFIX for snmp buffer overruns
File : nvt/smb_nt_ms02-006.nasl
2005-11-03Name : MUP overlong request kernel overflow Patch (Q311967)
File : nvt/smb_nt_ms02-017.nasl
2005-11-03Name : Windows Debugger flaw can Lead to Elevated Privileges (Q320206)
File : nvt/smb_nt_ms02-024.nasl
2005-11-03Name : Flaw in Certificate Enrollment Control (Q323172)
File : nvt/smb_nt_ms02-048.nasl
2005-11-03Name : Certificate Validation Flaw Could Enable Identity Spoofing (Q328145)
File : nvt/smb_nt_ms02-050.nasl
2005-11-03Name : Microsoft RDP flaws could allow sniffing and DOS(Q324380)
File : nvt/smb_nt_ms02-051.nasl
2005-11-03Name : Flaw in Microsoft VM Could Allow Code Execution (810030)
File : nvt/smb_nt_ms02-052.nasl
2005-11-03Name : Unchecked Buffer in Windows Help(Q323255)
File : nvt/smb_nt_ms02-055.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2008-A-0058Multiple Microsoft Office Filters Remote Code Execution Vulnerabilities
Severity : Category II - VMSKEY : V0016741
2008-A-0030Microsoft Jet Database Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0016013
2007-T-0035Trend Micro ServerProtect Multiple Remote Code Execution Vulnerabilities
Severity : Category I - VMSKEY : V0014876
2005-A-0001Multiple Vulnerabilities in Microsoft Windows
Severity : Category I - VMSKEY : V0005996

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10JET VBA access
RuleID : 985-community - Type : SERVER-IIS - Revision : 22
2014-01-10JET VBA access
RuleID : 985 - Type : SERVER-IIS - Revision : 22
2014-01-10JET VBA access
RuleID : 984-community - Type : SERVER-IIS - Revision : 25
2014-01-10JET VBA access
RuleID : 984 - Type : SERVER-IIS - Revision : 25
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9759 - Type : NETBIOS - Revision : 7
Hide | Show 20 More...
DateDescription
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9758 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian obje...
RuleID : 9757 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9756 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian object...
RuleID : 9755 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9754 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile object call attempt
RuleID : 9753 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian object cal...
RuleID : 9752 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9751 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9750 - Type : NETBIOS - Revision : 7
2014-01-10Alternate Data streams ASP file access attempt
RuleID : 975-community - Type : SERVER-IIS - Revision : 26
2014-01-10Alternate Data streams ASP file access attempt
RuleID : 975 - Type : SERVER-IIS - Revision : 26
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9749 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9748 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian attempt
RuleID : 9747 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9746 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9745 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9744 - Type : NETBIOS - Revision : 7
2014-01-10DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile little endian att...
RuleID : 9743 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile little endian a...
RuleID : 9742 - Type : NETBIOS - Revision : 5
2014-01-10DCERPC NCACN-IP-TCP v4 ISystemActivator CoGetInstanceFromFile attempt
RuleID : 9741 - Type : NETBIOS - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL10509.nasl - Type : ACT_GATHER_INFO
2011-09-15Name : It is possible to obtain the host SID for the remote host, without credentials.
File : smb_host2sid_null_session.nasl - Type : ACT_GATHER_INFO
2011-09-15Name : Nessus was able to enumerate local users, without credentials.
File : smb_sid2localuser_null_session.nasl - Type : ACT_GATHER_INFO
2010-11-23Name : The remote host has IP forwarding enabled.
File : ip_forwarding_enabled.nasl - Type : ACT_GATHER_INFO
2010-09-01Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20020212-snmp-msgshttp.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2010-09-01Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20090908-tcp24http.nasl - Type : ACT_GATHER_INFO
2010-02-09Name : The Windows kernel is affected by two vulnerabilities allowing a local attack...
File : smb_nt_ms10-015.nasl - Type : ACT_GATHER_INFO
2009-11-06Name : It is possible to access a network share.
File : smb_accessible_shares_unpriv.nasl - Type : ACT_GATHER_INFO
2009-09-08Name : Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d...
File : smb_nt_ms09-048.nasl - Type : ACT_GATHER_INFO
2009-06-19Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1819.nasl - Type : ACT_GATHER_INFO
2008-08-18Name : The remote web server is vulnerable to a cross-site scripting attack.
File : siteserver_xss.nasl - Type : ACT_ATTACK
2008-08-13Name : Arbitrary code can be executed on the remote host through the Microsoft Offic...
File : smb_nt_ms08-044.nasl - Type : ACT_GATHER_INFO
2008-08-01Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200807-13.nasl - Type : ACT_GATHER_INFO
2008-07-15Name : The remote Windows host contains an application that is affected by an intege...
File : vlc_0_8_6i.nasl - Type : ACT_GATHER_INFO
2008-07-11Name : The remote web server may be affected by several issues.
File : apache_2_2_9.nasl - Type : ACT_GATHER_INFO
2008-05-13Name : Arbitrary code can be executed on the remote host through the database engine.
File : smb_nt_ms08-028.nasl - Type : ACT_GATHER_INFO
2007-10-04Name : It is possible to log into the remote Windows host with a NULL session.
File : smb_null_session.nasl - Type : ACT_GATHER_INFO
2007-10-04Name : It is possible to log into the remote host.
File : smb_blank_admin_password.nasl - Type : ACT_GATHER_INFO
2007-10-04Name : It is possible to log into the remote host.
File : smb_guest_account.nasl - Type : ACT_GATHER_INFO
2007-10-03Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2007-192.nasl - Type : ACT_GATHER_INFO
2007-03-16Name : Arbitrary code can be executed on the remote host.
File : smb_kb828741.nasl - Type : ACT_GATHER_INFO
2007-02-21Name : It is possible to execute code on the remote host through the AntiVirus Agent.
File : trendmicro_serverprotect_multiple.nasl - Type : ACT_GATHER_INFO
2006-06-17Name : The remote mail server is affected by multiple denial of service flaws.
File : mercur_2005sp4.nasl - Type : ACT_GATHER_INFO
2006-06-13Name : It is possible to execute code on the remote host.
File : smb_nt_ms06-032.nasl - Type : ACT_GATHER_INFO
2006-05-10Name : A vulnerability in MSDTC could allow remote code execution.
File : smb_kb913580.nasl - Type : ACT_GATHER_INFO