Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2012-09-26 |
Product | Windows Rt | Last view | 2016-08-09 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:* | 200 |
cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:* | 10 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2016-08-09 | CVE-2016-3237 | Kerberos in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows man-in-the-middle attackers to bypass authentication via vectors related to a fallback to NTLM authentication during a domain account password change, aka "Kerberos Security Feature Bypass Vulnerability." |
7.8 | 2016-01-13 | CVE-2016-0016 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability." |
7.8 | 2016-01-13 | CVE-2016-0014 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Elevation of Privilege Vulnerability." |
4.3 | 2016-01-13 | CVE-2016-0008 | The graphics device interface in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Windows GDI32.dll ASLR Bypass Vulnerability." |
7.8 | 2016-01-13 | CVE-2016-0007 | The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006. |
7.3 | 2016-01-13 | CVE-2016-0006 | The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0007. |
7.2 | 2015-12-09 | CVE-2015-6174 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6171 and CVE-2015-6173. |
7.2 | 2015-12-09 | CVE-2015-6173 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6171 and CVE-2015-6174. |
7.2 | 2015-12-09 | CVE-2015-6171 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6173 and CVE-2015-6174. |
7.2 | 2015-12-09 | CVE-2015-6133 | Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability." |
7.2 | 2015-12-09 | CVE-2015-6132 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability." |
7.2 | 2015-12-09 | CVE-2015-6126 | Race condition in the Pragmatic General Multicast (PGM) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application, aka "Windows PGM UAF Elevation of Privilege Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6108 | The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6107 | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10 Gold and 1511, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
2.1 | 2015-11-11 | CVE-2015-6113 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass intended filesystem permissions by leveraging Low Integrity access, aka "Windows Kernel Security Feature Bypass Vulnerability." |
5.8 | 2015-11-11 | CVE-2015-6112 | SChannel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 lacks the required extended master-secret binding support to ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack," aka "Schannel TLS Triple Handshake Vulnerability." |
6.8 | 2015-11-11 | CVE-2015-6111 | IPSec in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles encryption negotiation, which allows remote authenticated users to cause a denial of service (system hang) via crafted IP traffic, aka "Windows IPSec Denial of Service Vulnerability." |
9.3 | 2015-11-11 | CVE-2015-6104 | The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6103. |
9.3 | 2015-11-11 | CVE-2015-6103 | The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6104. |
2.1 | 2015-11-11 | CVE-2015-6102 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability." |
6.9 | 2015-11-11 | CVE-2015-6101 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6100. |
6.9 | 2015-11-11 | CVE-2015-6100 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6101. |
7.2 | 2015-11-11 | CVE-2015-2478 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application that triggers a Winsock call referencing an invalid address, aka "Winsock Elevation of Privilege Vulnerability." |
7.2 | 2015-10-13 | CVE-2015-2554 | The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Windows Object Reference Elevation of Privilege Vulnerability." |
7.2 | 2015-10-13 | CVE-2015-2553 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles junctions during mountpoint creation, which makes it easier for local users to gain privileges by leveraging certain sandbox access, aka "Windows Mount Point Elevation of Privilege Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
29% (62) | CWE-264 | Permissions, Privileges, and Access Controls |
13% (28) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12% (25) | CWE-200 | Information Exposure |
10% (21) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
10% (21) | CWE-20 | Improper Input Validation |
4% (9) | CWE-416 | Use After Free |
3% (7) | CWE-399 | Resource Management Errors |
2% (5) | CWE-362 | Race Condition |
2% (5) | CWE-254 | Security Features |
1% (4) | CWE-426 | Untrusted Search Path |
1% (4) | CWE-310 | Cryptographic Issues |
1% (3) | CWE-476 | NULL Pointer Dereference |
1% (3) | CWE-190 | Integer Overflow or Wraparound |
1% (3) | CWE-19 | Data Handling |
0% (2) | CWE-189 | Numeric Errors |
0% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
0% (1) | CWE-415 | Double Free |
0% (1) | CWE-287 | Improper Authentication |
0% (1) | CWE-284 | Access Control (Authorization) Issues |
0% (1) | CWE-129 | Improper Validation of Array Index |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:15847 | TrueType Font Parsing Vulnerability - MS12-075 |
oval:org.mitre.oval:def:16067 | OpenType Font Parsing Vulnerability - MS12-078 |
oval:org.mitre.oval:def:16429 | MSXML Integer Truncation Vulnerability - MS13-002 |
oval:org.mitre.oval:def:15458 | MSXML XSLT Vulnerability - MS13-002 |
oval:org.mitre.oval:def:16326 | Win32k Improper Message Handling Vulnerability - MS13-005 |
oval:org.mitre.oval:def:16273 | Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerabilit... |
oval:org.mitre.oval:def:16373 | TCP FIN WAIT Vulnerability - MS13-018 |
oval:org.mitre.oval:def:16563 | Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2... |
oval:org.mitre.oval:def:16455 | Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031) |
oval:org.mitre.oval:def:16575 | Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2... |
oval:org.mitre.oval:def:16257 | Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031) |
oval:org.mitre.oval:def:16088 | Vulnerability in HTTP.sys could allow denial of service - MS13-039 |
oval:org.mitre.oval:def:16332 | DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046 |
oval:org.mitre.oval:def:16091 | Win32k Window Handle Vulnerability - MS13-046 |
oval:org.mitre.oval:def:16837 | Vulnerability in Windows Print Spooler Components Could Allow Elevation of Pr... |
oval:org.mitre.oval:def:16943 | Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - MS13-049 |
oval:org.mitre.oval:def:17353 | Win32k Memory Allocation Vulnerability- CVE-2013-1300 (MS13-053) |
oval:org.mitre.oval:def:17273 | Win32k Dereference Vulnerability - CVE-2013-1340 (MS13-053) |
oval:org.mitre.oval:def:17379 | Win32k Vulnerability - CVE-2013-1345 (MS13-053) |
oval:org.mitre.oval:def:17341 | TrueType Font Parsing Vulnerability - CVE-2013-3129 (MS13-052, MS13-053, MS13... |
oval:org.mitre.oval:def:17323 | TrueType font parsing vulnerability in Microsoft Silverlight - CVE-2013-3129,... |
oval:org.mitre.oval:def:17148 | Win32k Buffer Overwrite Vulnerability - CVE-2013-3173 (MS13-053) |
oval:org.mitre.oval:def:18293 | Remote Procedure Call Vulnerability - MS13-062 |
oval:org.mitre.oval:def:17918 | Vulnerability in ICMPv6 could allow Denial of Service - MS13-065 |
oval:org.mitre.oval:def:18714 | Win32k Elevation of Privilege Vulnerability (CVE-2013-1342) - MS13-076 |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Automation Array command execution | More info here |
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
35236 | MS14-064 Microsoft Windows OLE Package Manager Code Execution |
35235 | MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python |
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
35216 | MS Office 2007 and 2010 - OLE Arbitrary Command Execution |
35101 | Windows TrackPopupMenu Win32k NULL Pointer Dereference |
35055 | Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060) |
35020 | MS14-060 Microsoft Windows OLE Package Manager Code Execution |
35019 | Windows OLE Package Manager SandWorm Exploit |
33213 | Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei) |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
24485 | MS13-005 HWND_BROADCAST PoC |
OpenVAS Exploits
id | Description |
---|---|
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
2012-11-14 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-075.nasl |
2012-09-28 | Name : Google Chrome Windows Kernel Memory Corruption Vulnerability File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0216 | Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098) Severity: Category II - VMSKEY: V0061393 |
2015-A-0215 | Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102) Severity: Category II - VMSKEY: V0061391 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-A-0190 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082) Severity: Category II - VMSKEY: V0061299 |
2015-B-0096 | Microsoft WebDAV Information Disclosure Vulnerability (MS15-089) Severity: Category II - VMSKEY: V0061285 |
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-A-0192 | Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085) Severity: Category I - VMSKEY: V0061303 |
2015-A-0193 | Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090) Severity: Category II - VMSKEY: V0061305 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2015-A-0168 | Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072) Severity: Category II - VMSKEY: V0061105 |
2015-A-0169 | Multiple Vulnerabilities in Microsoft OLE (MS15-075) Severity: Category II - VMSKEY: V0061103 |
2015-A-0162 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073) Severity: Category II - VMSKEY: V0061097 |
2015-A-0164 | Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074) Severity: Category II - VMSKEY: V0061095 |
2015-A-0165 | Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1... Severity: Category II - VMSKEY: V0061093 |
2015-A-0122 | Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063) Severity: Category II - VMSKEY: V0060961 |
2015-A-0125 | Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS... Severity: Category II - VMSKEY: V0060943 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
2015-A-0053 | Multiple Vulnerabilities in Microsoft Windows (MS15-020) Severity: Category II - VMSKEY: V0059001 |
2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
2015-B-0034 | Microsoft Windows Photo Decoder Component Information Disclosure Vulnerabilit... Severity: Category II - VMSKEY: V0059017 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50707 - Type : OS-WINDOWS - Revision : 1 |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50706 - Type : OS-WINDOWS - Revision : 1 |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50705 - Type : OS-WINDOWS - Revision : 1 |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50704 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49977 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49976 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49975 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49974 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49973 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49972 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49971 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49970 - Type : OS-WINDOWS - Revision : 1 |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49969 - Type : OS-WINDOWS - Revision : 1 |
2019-04-18 | Microsoft Windows TTF parsing counter overflow attempt RuleID : 49483 - Type : FILE-OTHER - Revision : 1 |
2019-04-18 | Microsoft Windows TTF parsing counter overflow attempt RuleID : 49482 - Type : FILE-OTHER - Revision : 1 |
2019-04-13 | Microsoft Wordpad embedded BMP overflow attempt RuleID : 49428 - Type : FILE-OTHER - Revision : 1 |
2019-04-13 | Microsoft Wordpad embedded BMP overflow attempt RuleID : 49427 - Type : FILE-OTHER - Revision : 1 |
2018-09-11 | CTSWebProxy ActiveX privilege escalation attempt RuleID : 47462 - Type : BROWSER-PLUGINS - Revision : 2 |
2018-09-11 | CTSWebProxy ActiveX privilege escalation attempt RuleID : 47461 - Type : BROWSER-PLUGINS - Revision : 2 |
2017-08-31 | Microsoft Office mqrt.dll dll-load exploit attempt RuleID : 43805 - Type : FILE-OFFICE - Revision : 2 |
2017-08-31 | Microsoft Office mqrt.dll dll-load exploit attempt RuleID : 43804 - Type : FILE-OFFICE - Revision : 2 |
2017-08-31 | Microsoft Office mqrt.dll dll-load exploit attempt RuleID : 43803 - Type : FILE-OFFICE - Revision : 2 |
2017-08-31 | Microsoft Office mqrt.dll dll-load exploit attempt RuleID : 43802 - Type : FILE-OFFICE - Revision : 2 |
2017-06-16 | Microsoft Office mqrt.dll dll-load exploit attempt RuleID : 42864 - Type : FILE-OFFICE - Revision : 3 |
2017-06-16 | Microsoft Office mqrt.dll dll-load exploit attempt RuleID : 42863 - Type : FILE-OFFICE - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-08-09 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-101.nasl - Type: ACT_GATHER_INFO |
2016-01-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-005.nasl - Type: ACT_GATHER_INFO |
2016-01-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-007.nasl - Type: ACT_GATHER_INFO |
2016-01-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-008.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: A multimedia application framework installed on the remote Mac OS X host is a... File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-132.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by an elevation of privilege vulnerability. File: smb_nt_ms15-133.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by multiple elevation of privilege vulner... File: smb_nt_ms15-135.nasl - Type: ACT_GATHER_INFO |
2015-11-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-115.nasl - Type: ACT_GATHER_INFO |
2015-11-10 | Name: The remote Windows host is affected by an elevation of privilege vulnerability. File: smb_nt_ms15-119.nasl - Type: ACT_GATHER_INFO |
2015-11-10 | Name: The remote host is affected by a denial of service vulnerability. File: smb_nt_ms15-120.nasl - Type: ACT_GATHER_INFO |
2015-11-10 | Name: The remote Windows host is affected by a spoofing vulnerability. File: smb_nt_ms15-121.nasl - Type: ACT_GATHER_INFO |
2015-10-19 | Name: The remote printer is affected by a security bypass vulnerability known as FR... File: lexmark_printer_TE701.nasl - Type: ACT_GATHER_INFO |
2015-10-13 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-109.nasl - Type: ACT_GATHER_INFO |
2015-10-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-111.nasl - Type: ACT_GATHER_INFO |
2015-09-09 | Name: The remote host is affected by multiple vulnerabilities. File: smb_nt_ms15-097.nasl - Type: ACT_GATHER_INFO |
2015-09-09 | Name: The remote host is affected by multiple vulnerabilities. File: smb_nt_ms15-098.nasl - Type: ACT_GATHER_INFO |
2015-09-08 | Name: The remote Windows host is affected by multiple elevation of privilege vulner... File: smb_nt_ms15-102.nasl - Type: ACT_GATHER_INFO |
2015-08-12 | Name: The remote host is affected by multiple vulnerabilities. File: smb_nt_ms15-080.nasl - Type: ACT_GATHER_INFO |
2015-08-12 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO |
2015-08-11 | Name: The remote host has a web browser installed that is affected by multiple vuln... File: smb_nt_ms15-079.nasl - Type: ACT_GATHER_INFO |
2015-08-11 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-082.nasl - Type: ACT_GATHER_INFO |
2015-08-11 | Name: The remote Windows host is affected by an elevation of privilege vulnerability. File: smb_nt_ms15-085.nasl - Type: ACT_GATHER_INFO |
2015-08-11 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-088.nasl - Type: ACT_GATHER_INFO |