This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2011-04-13
Product Windows 7 Last view 2023-05-31
Version - Type Os
Update sp1  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_7

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.5 2023-05-31 CVE-2022-35759

Windows Local Security Authority (LSA) Denial of Service Vulnerability

5.5 2023-05-31 CVE-2022-35758

Windows Kernel Memory Information Disclosure Vulnerability

7.8 2023-05-31 CVE-2022-35756

Windows Kerberos Elevation of Privilege Vulnerability

6.7 2023-05-31 CVE-2022-35754

Unified Write Filter Elevation of Privilege Vulnerability

8.1 2023-05-31 CVE-2022-35753

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

8.1 2023-05-31 CVE-2022-35752

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

7.8 2023-05-31 CVE-2022-35750

Win32k Elevation of Privilege Vulnerability

5.9 2023-05-31 CVE-2022-35747

Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability

8.1 2023-05-31 CVE-2022-35745

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

9.8 2023-05-31 CVE-2022-35744

Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability

7.8 2023-05-31 CVE-2022-35743

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability

5.5 2023-01-10 CVE-2023-21776

Windows Kernel Information Disclosure Vulnerability

7.8 2023-01-10 CVE-2023-21765

Windows Print Spooler Elevation of Privilege Vulnerability

7.1 2023-01-10 CVE-2023-21760

Windows Print Spooler Elevation of Privilege Vulnerability

7.5 2023-01-10 CVE-2023-21757

Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability

7.1 2023-01-10 CVE-2023-21752

Windows Backup Service Elevation of Privilege Vulnerability

7.8 2023-01-10 CVE-2023-21746

Windows NTLM Elevation of Privilege Vulnerability

7.8 2022-12-13 CVE-2022-44697

Windows Graphics Component Elevation of Privilege Vulnerability

7.8 2022-12-13 CVE-2022-44681

Windows Print Spooler Elevation of Privilege Vulnerability

7.8 2022-12-13 CVE-2022-44678

Windows Print Spooler Elevation of Privilege Vulnerability

8.1 2022-12-13 CVE-2022-44676

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

7.8 2022-12-13 CVE-2022-44675

Windows Bluetooth Driver Elevation of Privilege Vulnerability

8.1 2022-12-13 CVE-2022-44670

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

7.8 2022-12-13 CVE-2022-44668

Windows Media Remote Code Execution Vulnerability

7.8 2022-12-13 CVE-2022-44667

Windows Media Remote Code Execution Vulnerability

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
24% (156) CWE-200 Information Exposure
9% (59) CWE-264 Permissions, Privileges, and Access Controls
7% (48) CWE-20 Improper Input Validation
7% (46) CWE-787 Out-of-bounds Write
6% (43) CWE-269 Improper Privilege Management
5% (34) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (22) CWE-94 Failure to Control Generation of Code ('Code Injection')
3% (21) CWE-59 Improper Link Resolution Before File Access ('Link Following')
3% (20) CWE-362 Race Condition
3% (19) CWE-665 Improper Initialization
3% (19) CWE-416 Use After Free
2% (18) CWE-404 Improper Resource Shutdown or Release
2% (14) CWE-611 Information Leak Through XML External Entity File Disclosure
2% (14) CWE-125 Out-of-bounds Read
1% (9) CWE-19 Data Handling
0% (6) CWE-426 Untrusted Search Path
0% (5) CWE-310 Cryptographic Issues
0% (4) CWE-476 NULL Pointer Dereference
0% (4) CWE-287 Improper Authentication
0% (4) CWE-254 Security Features
0% (4) CWE-190 Integer Overflow or Wraparound
0% (4) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (3) CWE-755 Improper Handling of Exceptional Conditions
0% (3) CWE-732 Incorrect Permission Assignment for Critical Resource

SAINT Exploits

Description Link
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here
Windows OLE Automation Array command execution More info here
Windows Media Center command execution More info here
Microsoft Word and WordPad RTF HTA handler command execution More info here
Windows RRAS Service Remote Code Execution Vulnerability More info here

Open Source Vulnerability Database (OSVDB)

id Description
71735 Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Loc...

ExploitDB Exploits

id Description
35236 MS14-064 Microsoft Windows OLE Package Manager Code Execution
35235 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
35216 MS Office 2007 and 2010 - OLE Arbitrary Command Execution
35101 Windows TrackPopupMenu Win32k NULL Pointer Dereference
35055 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
35020 MS14-060 Microsoft Windows OLE Package Manager Code Execution
35019 Windows OLE Package Manager SandWorm Exploit
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)
26554 Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation

OpenVAS Exploits

id Description
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-12-12 Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability...
File : nvt/secpod_ms12-081.nasl
2012-04-11 Name : Windows Authenticode Signature Remote Code Execution Vulnerability (2653956)
File : nvt/secpod_ms12-024.nasl
2011-04-13 Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223)
File : nvt/secpod_ms11-034.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-B-0112 Microsoft Media Center Remote Code Execution Vulnerability (MS15-100)
Severity: Category II - VMSKEY: V0061373
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0167 Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity: Category II - VMSKEY: V0061129
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0107 Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050)
Severity: Category II - VMSKEY: V0060651
2015-A-0092 Microsoft Windows HTTP stack Remote Code Execution Vulnerability (MS15-034)
Severity: Category I - VMSKEY: V0059899
2015-A-0091 Multiple Vulnerabilities in Microsoft Windows (MS15-038)
Severity: Category II - VMSKEY: V0059897
2015-B-0037 Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-...
Severity: Category II - VMSKEY: V0059023

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56231 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56230 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows digital signature spoofing attempt
RuleID : 55983 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows digital signature spoofing attempt
RuleID : 55982 - Type : OS-WINDOWS - Revision : 1
2020-10-13 Microsoft Windows NDIS.SYS driver buffer overflow attempt
RuleID : 55198 - Type : OS-WINDOWS - Revision : 1
2020-10-13 Microsoft Windows NDIS.SYS driver buffer overflow attempt
RuleID : 55197 - Type : OS-WINDOWS - Revision : 1
2020-10-06 Microsoft Windows win32k kernel driver use after free attempt
RuleID : 55144 - Type : OS-WINDOWS - Revision : 1
2020-10-06 Microsoft Windows win32k kernel driver use after free attempt
RuleID : 55143 - Type : OS-WINDOWS - Revision : 1
2020-10-06 Microsoft Windows CLFS Driver elevation of privilege attempt
RuleID : 55142 - Type : FILE-OTHER - Revision : 1
2020-10-06 Microsoft Windows CLFS Driver elevation of privilege attempt
RuleID : 55141 - Type : FILE-OTHER - Revision : 1

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-11 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO
2018-11-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote host is missing a macOS security update that fixes multiple vulner...
File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO
2018-10-26 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1352.nasl - Type: ACT_GATHER_INFO
2018-10-22 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO
2018-10-18 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_14.nasl - Type: ACT_GATHER_INFO
2018-10-10 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2846.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO
2018-09-17 Name: The remote Debian host is missing a security update.
File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO
2018-09-11 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1278.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1279.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The remote Debian host is missing a security update.
File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO