This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-09-26
Product Windows Server 2012 Last view 2024-04-09
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* 2674
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* 2545
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* 103
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:* 38
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:* 30
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:* 30
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:* 27
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:-:*:-:* 18
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:x64:*:* 10
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:* 5
cpe:2.3:o:microsoft:windows_server_2012:*:gold:*:*:*:*:*:* 4
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:* 4
cpe:2.3:o:microsoft:windows_server_2012:r2:-:*:*:*:*:x64:* 3
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:datacenter:*:x64:* 3

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.1 2024-04-09 CVE-2024-29062

Secure Boot Security Feature Bypass Vulnerability

7.8 2024-04-09 CVE-2024-29061

Secure Boot Security Feature Bypass Vulnerability

4.3 2024-04-09 CVE-2024-29056

Windows Authentication Elevation of Privilege Vulnerability

8.1 2024-03-12 CVE-2024-21407

Windows Hyper-V Remote Code Execution Vulnerability

7.5 2024-02-14 CVE-2023-50387

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

7.5 2024-02-13 CVE-2024-21406

Windows Printing Service Spoofing Vulnerability

7 2024-02-13 CVE-2024-21405

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

8.8 2024-02-13 CVE-2024-21391

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

5.5 2024-02-13 CVE-2024-21377

Windows DNS Information Disclosure Vulnerability

8.8 2024-02-13 CVE-2024-21375

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21372

Windows OLE Remote Code Execution Vulnerability

7 2024-02-13 CVE-2024-21371

Windows Kernel Elevation of Privilege Vulnerability

8.8 2024-02-13 CVE-2024-21370

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21369

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21368

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21367

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21366

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21365

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21361

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21360

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21359

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

8.8 2024-02-13 CVE-2024-21358

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

6.5 2024-02-13 CVE-2024-21356

Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

7 2024-02-13 CVE-2024-21355

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

7.8 2024-02-13 CVE-2024-21354

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
19% (218) CWE-200 Information Exposure
11% (129) CWE-264 Permissions, Privileges, and Access Controls
10% (124) CWE-20 Improper Input Validation
8% (91) CWE-269 Improper Privilege Management
7% (80) CWE-362 Race Condition
6% (77) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
5% (57) CWE-787 Out-of-bounds Write
2% (27) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (25) CWE-59 Improper Link Resolution Before File Access ('Link Following')
1% (22) CWE-665 Improper Initialization
1% (22) CWE-416 Use After Free
1% (22) CWE-404 Improper Resource Shutdown or Release
1% (17) CWE-284 Access Control (Authorization) Issues
1% (17) CWE-281 Improper Preservation of Permissions
1% (16) CWE-125 Out-of-bounds Read
1% (15) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (15) CWE-19 Data Handling
1% (14) CWE-668 Exposure of Resource to Wrong Sphere
1% (14) CWE-254 Security Features
0% (10) CWE-399 Resource Management Errors
0% (6) CWE-426 Untrusted Search Path
0% (6) CWE-190 Integer Overflow or Wraparound
0% (5) CWE-476 NULL Pointer Dereference
0% (5) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
0% (5) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:15847 TrueType Font Parsing Vulnerability - MS12-075
oval:org.mitre.oval:def:15975 Windows Briefcase Integer Underflow Vulnerability - MS12-072
oval:org.mitre.oval:def:15528 Windows Briefcase Integer Overflow Vulnerability - MS12-072
oval:org.mitre.oval:def:16117 Revoked Certificate Bypass Vulnerability - MS12-083
oval:org.mitre.oval:def:16067 OpenType Font Parsing Vulnerability - MS12-078
oval:org.mitre.oval:def:16429 MSXML Integer Truncation Vulnerability - MS13-002
oval:org.mitre.oval:def:15458 MSXML XSLT Vulnerability - MS13-002
oval:org.mitre.oval:def:16326 Win32k Improper Message Handling Vulnerability - MS13-005
oval:org.mitre.oval:def:16273 Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerabilit...
oval:org.mitre.oval:def:16373 TCP FIN WAIT Vulnerability - MS13-018
oval:org.mitre.oval:def:16388 Microsoft NFS Server Denial Of Service Vulnerability - MS13-014
oval:org.mitre.oval:def:16441 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16591 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16498 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16563 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16455 Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031)
oval:org.mitre.oval:def:16575 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16257 Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031)
oval:org.mitre.oval:def:16088 Vulnerability in HTTP.sys could allow denial of service - MS13-039
oval:org.mitre.oval:def:16332 DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046
oval:org.mitre.oval:def:16091 Win32k Window Handle Vulnerability - MS13-046
oval:org.mitre.oval:def:17360 Win32k Read AV Vulnerability - CVE-2013-3660 (MS13-053)
oval:org.mitre.oval:def:16837 Vulnerability in Windows Print Spooler Components Could Allow Elevation of Pr...
oval:org.mitre.oval:def:17353 Win32k Memory Allocation Vulnerability- CVE-2013-1300 (MS13-053)
oval:org.mitre.oval:def:17273 Win32k Dereference Vulnerability - CVE-2013-1340 (MS13-053)

SAINT Exploits

Description Link
Windows OLE Automation Array command execution More info here
Windows RRAS Service Remote Code Execution Vulnerability More info here
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here
Microsoft Word and WordPad RTF HTA handler command execution More info here

ExploitDB Exploits

id Description
35236 MS14-064 Microsoft Windows OLE Package Manager Code Execution
35235 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
35216 MS Office 2007 and 2010 - OLE Arbitrary Command Execution
35101 Windows TrackPopupMenu Win32k NULL Pointer Dereference
35055 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
35020 MS14-060 Microsoft Windows OLE Package Manager Code Execution
35019 Windows OLE Package Manager SandWorm Exploit
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)
27050 DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056)
26554 Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
24485 MS13-005 HWND_BROADCAST PoC

OpenVAS Exploits

id Description
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-12-12 Name : Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2...
File : nvt/secpod_ms12-083.nasl
2012-11-14 Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
File : nvt/secpod_ms12-072.nasl
2012-11-14 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-075.nasl
2012-09-28 Name : Google Chrome Windows Kernel Memory Corruption Vulnerability
File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-B-0111 Microsoft Hyper-V Security Bypass Vulnerability (MS15-105)
Severity: Category II - VMSKEY: V0061371
2015-B-0110 Microsoft Active Directory Service Denial of Service Vulnerability (MS15-096)
Severity: Category II - VMSKEY: V0061369
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0167 Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity: Category II - VMSKEY: V0061129
2015-B-0091 Multiple Vulnerabilities in Microsoft Hyper-V (MS15-068)
Severity: Category II - VMSKEY: V0061119
2015-A-0173 Microsoft Windows Netlogon Privilege Escalation Vulnerability (MS15-071)
Severity: Category II - VMSKEY: V0061111
2015-A-0170 Microsoft Remote Desktop Protocol Vulnerability (MS15-067)
Severity: Category I - VMSKEY: V0061107
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0122 Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
Severity: Category II - VMSKEY: V0060961
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56562 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56561 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Microsoft Windows NFS v3 Server heap overflow denial of service attempt
RuleID : 56312 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Microsoft Windows NFS v3 Server heap overflow denial of service attempt
RuleID : 56311 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56302 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56301 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56231 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56230 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows Remote Desktop information disclosure attempt
RuleID : 55994 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-11 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO
2018-11-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote host is missing a macOS security update that fixes multiple vulner...
File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO
2018-10-26 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1352.nasl - Type: ACT_GATHER_INFO
2018-10-18 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_14.nasl - Type: ACT_GATHER_INFO
2018-10-10 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2846.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO
2018-09-17 Name: The remote Debian host is missing a security update.
File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO
2018-09-11 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1278.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1279.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The remote Debian host is missing a security update.
File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4272.nasl - Type: ACT_GATHER_INFO