Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2013-11-12 |
Product | Windows Rt 8.1 | Last view | 2023-05-31 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2023-05-31 | CVE-2022-35759 | Windows Local Security Authority (LSA) Denial of Service Vulnerability |
5.5 | 2023-05-31 | CVE-2022-35758 | Windows Kernel Memory Information Disclosure Vulnerability |
7.8 | 2023-05-31 | CVE-2022-35756 | Windows Kerberos Elevation of Privilege Vulnerability |
7.3 | 2023-05-31 | CVE-2022-35755 | Windows Print Spooler Elevation of Privilege Vulnerability |
6.7 | 2023-05-31 | CVE-2022-35754 | Unified Write Filter Elevation of Privilege Vulnerability |
8.1 | 2023-05-31 | CVE-2022-35753 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability |
8.1 | 2023-05-31 | CVE-2022-35752 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability |
7.8 | 2023-05-31 | CVE-2022-35751 | Windows Hyper-V Elevation of Privilege Vulnerability |
7.8 | 2023-05-31 | CVE-2022-35750 | Win32k Elevation of Privilege Vulnerability |
7.8 | 2023-05-31 | CVE-2022-35749 | Windows Digital Media Receiver Elevation of Privilege Vulnerability |
5.9 | 2023-05-31 | CVE-2022-35747 | Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability |
7.8 | 2023-05-31 | CVE-2022-35746 | Windows Digital Media Receiver Elevation of Privilege Vulnerability |
8.1 | 2023-05-31 | CVE-2022-35745 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability |
9.8 | 2023-05-31 | CVE-2022-35744 | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability |
7.8 | 2023-05-31 | CVE-2022-35743 | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability |
8.1 | 2023-04-27 | CVE-2023-21712 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability |
5.5 | 2023-01-10 | CVE-2023-21776 | Windows Kernel Information Disclosure Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21774 | Windows Kernel Elevation of Privilege Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21773 | Windows Kernel Elevation of Privilege Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21772 | Windows Kernel Elevation of Privilege Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21767 | Windows Overlay Filter Elevation of Privilege Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21765 | Windows Print Spooler Elevation of Privilege Vulnerability |
7.1 | 2023-01-10 | CVE-2023-21760 | Windows Print Spooler Elevation of Privilege Vulnerability |
7.5 | 2023-01-10 | CVE-2023-21757 | Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21755 | Windows Kernel Elevation of Privilege Vulnerability |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (190) | CWE-200 | Information Exposure |
12% (112) | CWE-264 | Permissions, Privileges, and Access Controls |
9% (83) | CWE-269 | Improper Privilege Management |
7% (66) | CWE-20 | Improper Input Validation |
6% (56) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
5% (47) | CWE-787 | Out-of-bounds Write |
3% (30) | CWE-362 | Race Condition |
2% (22) | CWE-416 | Use After Free |
2% (21) | CWE-665 | Improper Initialization |
2% (21) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
2% (20) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (19) | CWE-404 | Improper Resource Shutdown or Release |
1% (16) | CWE-284 | Access Control (Authorization) Issues |
1% (15) | CWE-281 | Improper Preservation of Permissions |
1% (15) | CWE-125 | Out-of-bounds Read |
1% (13) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (13) | CWE-19 | Data Handling |
1% (12) | CWE-254 | Security Features |
0% (5) | CWE-476 | NULL Pointer Dereference |
0% (5) | CWE-426 | Untrusted Search Path |
0% (5) | CWE-287 | Improper Authentication |
0% (5) | CWE-190 | Integer Overflow or Wraparound |
0% (4) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
0% (4) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
0% (4) | CWE-310 | Cryptographic Issues |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:19089 | InformationCardSigninHelper Vulnerability (CVE-2013-3918) - MS13-090 |
oval:org.mitre.oval:def:19112 | Digital Signatures Vulnerability (CVE-2013-3869) - MS13-095 |
oval:org.mitre.oval:def:18722 | Graphics Device Interface Integer Overflow Vulnerability (CVE-2013-3940) - MS... |
oval:org.mitre.oval:def:26746 | Alows man-in-the-middle attackers to spoof servers and read encrypted domain ... |
oval:org.mitre.oval:def:20872 | WinVerifyTrust Signature Validation Vulnerability (CVE-2013-3900) - MS13-098 |
oval:org.mitre.oval:def:20829 | TrueType Font Parsing Vulnerability (CVE-2013-3903) - MS13-101 |
oval:org.mitre.oval:def:20760 | Use-After-Free Vulnerability in Microsoft Scripting Runtime Object Library (C... |
oval:org.mitre.oval:def:20974 | Win32k Integer Overflow Vulnerability (CVE-2013-5058) - MS13-101 |
oval:org.mitre.oval:def:22456 | Microsoft graphics component memory corruption vulnerability (CVE-2014-0263) ... |
oval:org.mitre.oval:def:22326 | Vulnerability in Microsoft XML Core Services could allow information disclosu... |
oval:org.mitre.oval:def:21700 | Win32k Elevation of Privilege Vulnerability - CVE-2014-0300 (MS14-015) |
oval:org.mitre.oval:def:22633 | Win32k Information Disclosure Vulnerability - CVE-2014-0323 (MS14-015) |
oval:org.mitre.oval:def:24442 | Windows file handling vulnerability - CVE-2014-0315 (MS14-019) |
oval:org.mitre.oval:def:24572 | Windows Shell File Association Vulnerability - CVE-2014-1807 (MS14-027) |
oval:org.mitre.oval:def:24903 | Vulnerability in TCP Protocol could allow denial of service - CVE-2014-1811 (... |
oval:org.mitre.oval:def:24885 | Remote code execution in Microsoft Office products (CVE-2014-1817) - MS14-036 |
oval:org.mitre.oval:def:24455 | Remote code execution in Microsoft Office products (CVE-2014-1818) - MS14-036 |
oval:org.mitre.oval:def:24592 | Ancillary Function Driver Elevation of Privilege Vulnerability - CVE-2014-176... |
oval:org.mitre.oval:def:24871 | Windows journal remote code execution vulnerability - CVE-2014-1824 (MS14-038) |
oval:org.mitre.oval:def:25213 | Win32k Elevation of Privilege Vulnerability - CVE-2014-2781 (MS14-039) |
oval:org.mitre.oval:def:26242 | LRPC ASLR Bypass Vulnerability - CVE-2014-0316 (MS14-047) |
oval:org.mitre.oval:def:26442 | Win32k Elevation of Privilege vulnerability - CVE-2014-0318 (MS14-045) |
oval:org.mitre.oval:def:26341 | Windows installer repair vulnerability - CVE-2014-1814 (MS14-049) |
oval:org.mitre.oval:def:26322 | Font Double-Fetch vulnerability - CVE-2014-1819 (MS14-045) |
oval:org.mitre.oval:def:26136 | Windows kernel pool allocation vulnerability - CVE-2014-4064 (MS14-045) |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability | More info here |
Windows OLE Automation Array command execution | More info here |
Windows RRAS Service Remote Code Execution Vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
35236 | MS14-064 Microsoft Windows OLE Package Manager Code Execution |
35235 | MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python |
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
35216 | MS Office 2007 and 2010 - OLE Arbitrary Command Execution |
35101 | Windows TrackPopupMenu Win32k NULL Pointer Dereference |
35055 | Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060) |
35020 | MS14-060 Microsoft Windows OLE Package Manager Code Execution |
35019 | Windows OLE Package Manager SandWorm Exploit |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0216 | Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098) Severity: Category II - VMSKEY: V0061393 |
2015-A-0215 | Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102) Severity: Category II - VMSKEY: V0061391 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0193 | Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090) Severity: Category II - VMSKEY: V0061305 |
2015-A-0192 | Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085) Severity: Category I - VMSKEY: V0061303 |
2015-A-0190 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082) Severity: Category II - VMSKEY: V0061299 |
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-B-0096 | Microsoft WebDAV Information Disclosure Vulnerability (MS15-089) Severity: Category II - VMSKEY: V0061285 |
2015-A-0169 | Multiple Vulnerabilities in Microsoft OLE (MS15-075) Severity: Category II - VMSKEY: V0061103 |
2015-A-0165 | Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1... Severity: Category II - VMSKEY: V0061093 |
2015-A-0164 | Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074) Severity: Category II - VMSKEY: V0061095 |
2015-A-0162 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073) Severity: Category II - VMSKEY: V0061097 |
2015-A-0168 | Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072) Severity: Category II - VMSKEY: V0061105 |
2015-A-0167 | Multiple Vulnerabilities in Microsoft Windows (MS15-069) Severity: Category II - VMSKEY: V0061129 |
2015-A-0125 | Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS... Severity: Category II - VMSKEY: V0060943 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
2015-B-0037 | Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-... Severity: Category II - VMSKEY: V0059023 |
2015-B-0036 | Microsoft Windows Information Disclosure Vulnerability (MS15-024) Severity: Category II - VMSKEY: V0059021 |
2015-B-0034 | Microsoft Windows Photo Decoder Component Information Disclosure Vulnerabilit... Severity: Category II - VMSKEY: V0059017 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56856 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56855 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56854 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56853 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56852 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56851 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56850 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56849 - Type : OS-WINDOWS - Revision : 1 |
2021-01-28 | Cisco RV Series Routers stack buffer overflow attempt RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2 |
2021-01-12 | Microsoft Windows SMB2 SET_INFO information disclosure attempt RuleID : 56571 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56562 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56561 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Windows Network File System denial of service attempt RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56302 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56301 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56296 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56295 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56262 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56261 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56231 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56230 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows Remote Desktop information disclosure attempt RuleID : 55994 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows digital signature spoofing attempt RuleID : 55983 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows digital signature spoofing attempt RuleID : 55982 - Type : OS-WINDOWS - Revision : 1 |
2020-10-08 | Microsoft Windows kernel driver escalation of privilege attempt RuleID : 55188 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-11 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO |
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO |
2018-11-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO |
2018-10-26 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1352.nasl - Type: ACT_GATHER_INFO |
2018-10-10 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2846.nasl - Type: ACT_GATHER_INFO |
2018-09-04 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1278.nasl - Type: ACT_GATHER_INFO |
2018-09-04 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1279.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO |
2018-08-15 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO |
2018-08-15 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO |
2018-08-15 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4272.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO |
2017-11-30 | Name: The Internet Explorer installation on the remote host is affected by multiple... File: smb_nt_ms17_jul_internet_explorer.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO |