Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2015-09-08 |
Product | Windows 10 | Last view | 2022-06-15 |
Version | - | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | x64 | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_10 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.5 | 2022-06-15 | CVE-2022-30163 | Windows Hyper-V Remote Code Execution Vulnerability. |
5.5 | 2022-06-15 | CVE-2022-30155 | Windows Kernel Denial of Service Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30153 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30152 | Windows Network Address Translation (NAT) Denial of Service Vulnerability. |
7 | 2022-06-15 | CVE-2022-30151 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30149 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30146 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30143 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
8.1 | 2022-06-15 | CVE-2022-30141 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30140 | Windows iSCSI Discovery Service Remote Code Execution Vulnerability. |
7 | 2022-05-10 | CVE-2022-29125 | Windows Push Notifications Apps Elevation of Privilege Vulnerability. |
6.5 | 2022-05-10 | CVE-2022-29121 | Windows WLAN AutoConfig Service Denial of Service Vulnerability. |
7.8 | 2022-05-10 | CVE-2022-29115 | Windows Fax Service Remote Code Execution Vulnerability. |
5.5 | 2022-05-10 | CVE-2022-29114 | Windows Print Spooler Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29140. |
6.5 | 2022-05-10 | CVE-2022-29112 | Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22011, CVE-2022-26934. |
7.8 | 2022-05-10 | CVE-2022-29105 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability. |
7.8 | 2022-05-10 | CVE-2022-29104 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29132. |
7.8 | 2022-05-10 | CVE-2022-29103 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. |
6.5 | 2022-05-10 | CVE-2022-26936 | Windows Server Service Information Disclosure Vulnerability. |
6.5 | 2022-05-10 | CVE-2022-26935 | Windows WLAN AutoConfig Service Information Disclosure Vulnerability. |
6.5 | 2022-05-10 | CVE-2022-26934 | Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22011, CVE-2022-29112. |
5.5 | 2022-05-10 | CVE-2022-26933 | Windows NTFS Information Disclosure Vulnerability. |
7.5 | 2022-05-10 | CVE-2022-26931 | Windows Kerberos Elevation of Privilege Vulnerability. |
5.5 | 2022-05-10 | CVE-2022-26930 | Windows Remote Access Connection Manager Information Disclosure Vulnerability. |
7.8 | 2022-05-10 | CVE-2022-26926 | Windows Address Book Remote Code Execution Vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
38% (49) | CWE-269 | Improper Privilege Management |
20% (26) | CWE-20 | Improper Input Validation |
11% (15) | CWE-668 | Exposure of Resource to Wrong Sphere |
6% (8) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
5% (7) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
3% (5) | CWE-200 | Information Exposure |
2% (3) | CWE-362 | Race Condition |
2% (3) | CWE-264 | Permissions, Privileges, and Access Controls |
1% (2) | CWE-787 | Out-of-bounds Write |
0% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
0% (1) | CWE-346 | Origin Validation Error |
0% (1) | CWE-331 | Insufficient Entropy |
0% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
0% (1) | CWE-312 | Cleartext Storage of Sensitive Information |
0% (1) | CWE-295 | Certificate Issues |
0% (1) | CWE-290 | Authentication Bypass by Spoofing |
0% (1) | CWE-284 | Access Control (Authorization) Issues |
0% (1) | CWE-254 | Security Features |
0% (1) | CWE-125 | Out-of-bounds Read |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-B-0111 | Microsoft Hyper-V Security Bypass Vulnerability (MS15-105) Severity: Category II - VMSKEY: V0061371 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-10-08 | Microsoft Windows kernel driver escalation of privilege attempt RuleID : 55188 - Type : OS-WINDOWS - Revision : 1 |
2020-10-08 | Microsoft Windows kernel driver escalation of privilege attempt RuleID : 55187 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows TCPIP kernel driver use-after-free attempt RuleID : 54766 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows TCPIP kernel driver use-after-free attempt RuleID : 54765 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows GDI privilege escalation attempt RuleID : 54738 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows GDI privilege escalation attempt RuleID : 54737 - Type : OS-WINDOWS - Revision : 1 |
2020-08-13 | Microsoft Windows Address Book Contact file integer overflow attempt RuleID : 54533 - Type : FILE-OTHER - Revision : 1 |
2020-08-13 | Microsoft Windows Address Book Contact file integer overflow attempt RuleID : 54532 - Type : FILE-OTHER - Revision : 1 |
2020-08-13 | Microsoft Windows Address Book Contact file integer overflow attempt RuleID : 54531 - Type : FILE-OTHER - Revision : 1 |
2020-08-13 | Microsoft Windows Address Book Contact file integer overflow attempt RuleID : 54530 - Type : FILE-OTHER - Revision : 1 |
2020-08-13 | Microsoft Windows Address Book Contact file integer overflow attempt RuleID : 54529 - Type : FILE-OTHER - Revision : 1 |
2020-08-13 | Microsoft Windows Address Book Contact file integer overflow attempt RuleID : 54528 - Type : FILE-OTHER - Revision : 1 |
2020-06-11 | Microsoft Windows Win32k privilege escalation attempt RuleID : 53933 - Type : OS-WINDOWS - Revision : 1 |
2020-06-11 | Microsoft Windows Win32k privilege escalation attempt RuleID : 53932 - Type : OS-WINDOWS - Revision : 1 |
2016-03-14 | Microsoft Windows gpuenergydrv.sys driver privilege escalation attempt RuleID : 36990 - Type : OS-WINDOWS - Revision : 2 |
2016-03-14 | Microsoft Windows gpuenergydrv.sys driver privilege escalation attempt RuleID : 36989 - Type : OS-WINDOWS - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-09-13 | Name: The remote host is affected by an information disclosure vulnerability. File: smb_nt_ms16-113.nasl - Type: ACT_GATHER_INFO |
2016-08-09 | Name: The remote host is affected by an information disclosure vulnerability. File: smb_nt_ms16-103.nasl - Type: ACT_GATHER_INFO |
2016-01-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-005.nasl - Type: ACT_GATHER_INFO |
2016-01-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-007.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by multiple elevation of privilege vulner... File: smb_nt_ms15-135.nasl - Type: ACT_GATHER_INFO |
2015-09-09 | Name: The remote host is affected by multiple vulnerabilities. File: smb_nt_ms15-097.nasl - Type: ACT_GATHER_INFO |
2015-09-08 | Name: The remote Windows host is affected by a security bypass vulnerability. File: smb_nt_ms15-105.nasl - Type: ACT_GATHER_INFO |