This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2017-09-12
Product Windows 10 Last view 2022-06-15
Version 1607 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware x64  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_10

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.5 2022-06-15 CVE-2022-30163

Windows Hyper-V Remote Code Execution Vulnerability.

5.5 2022-06-15 CVE-2022-30155

Windows Kernel Denial of Service Vulnerability.

8.8 2022-06-15 CVE-2022-30153

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30161.

7.5 2022-06-15 CVE-2022-30152

Windows Network Address Translation (NAT) Denial of Service Vulnerability.

7 2022-06-15 CVE-2022-30151

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.

8.1 2022-06-15 CVE-2022-30150

Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability.

7.5 2022-06-15 CVE-2022-30149

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161.

5.5 2022-06-15 CVE-2022-30148

Windows Desired State Configuration (DSC) Information Disclosure Vulnerability.

7.5 2022-06-15 CVE-2022-30146

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161.

8.1 2022-06-15 CVE-2022-30145

Windows Encrypting File System (EFS) Remote Code Execution Vulnerability.

7.5 2022-06-15 CVE-2022-30143

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161.

8.1 2022-06-15 CVE-2022-30141

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161.

7.5 2022-06-15 CVE-2022-30140

Windows iSCSI Discovery Service Remote Code Execution Vulnerability.

8.1 2022-06-15 CVE-2022-30139

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161.

7 2022-05-10 CVE-2022-29125

Windows Push Notifications Apps Elevation of Privilege Vulnerability.

6.5 2022-05-10 CVE-2022-29121

Windows WLAN AutoConfig Service Denial of Service Vulnerability.

7.8 2022-05-10 CVE-2022-29115

Windows Fax Service Remote Code Execution Vulnerability.

5.5 2022-05-10 CVE-2022-29114

Windows Print Spooler Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29140.

6.5 2022-05-10 CVE-2022-29112

Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22011, CVE-2022-26934.

7.8 2022-05-10 CVE-2022-29105

Microsoft Windows Media Foundation Remote Code Execution Vulnerability.

7.8 2022-05-10 CVE-2022-29104

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29132.

7.8 2022-05-10 CVE-2022-29103

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability.

6.5 2022-05-10 CVE-2022-26936

Windows Server Service Information Disclosure Vulnerability.

6.5 2022-05-10 CVE-2022-26935

Windows WLAN AutoConfig Service Information Disclosure Vulnerability.

6.5 2022-05-10 CVE-2022-26934

Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22011, CVE-2022-29112.

CWE : Common Weakness Enumeration

%idName
38% (53) CWE-269 Improper Privilege Management
22% (30) CWE-20 Improper Input Validation
11% (16) CWE-668 Exposure of Resource to Wrong Sphere
6% (9) CWE-94 Failure to Control Generation of Code ('Code Injection')
5% (8) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (4) CWE-362 Race Condition
2% (3) CWE-787 Out-of-bounds Write
2% (3) CWE-200 Information Exposure
0% (1) CWE-532 Information Leak Through Log Files
0% (1) CWE-434 Unrestricted Upload of File with Dangerous Type
0% (1) CWE-346 Origin Validation Error
0% (1) CWE-331 Insufficient Entropy
0% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
0% (1) CWE-312 Cleartext Storage of Sensitive Information
0% (1) CWE-295 Certificate Issues
0% (1) CWE-290 Authentication Bypass by Spoofing
0% (1) CWE-125 Out-of-bounds Read
0% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Snort® IPS/IDS

Date Description
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2020-10-08 Microsoft Windows kernel driver escalation of privilege attempt
RuleID : 55188 - Type : OS-WINDOWS - Revision : 1
2020-10-08 Microsoft Windows kernel driver escalation of privilege attempt
RuleID : 55187 - Type : OS-WINDOWS - Revision : 1
2020-09-15 Microsoft Windows TCPIP kernel driver use-after-free attempt
RuleID : 54766 - Type : OS-WINDOWS - Revision : 1
2020-09-15 Microsoft Windows TCPIP kernel driver use-after-free attempt
RuleID : 54765 - Type : OS-WINDOWS - Revision : 1
2020-09-15 Microsoft Windows GDI privilege escalation attempt
RuleID : 54738 - Type : OS-WINDOWS - Revision : 1
2020-09-15 Microsoft Windows GDI privilege escalation attempt
RuleID : 54737 - Type : OS-WINDOWS - Revision : 1
2020-08-13 Microsoft Windows Address Book Contact file integer overflow attempt
RuleID : 54533 - Type : FILE-OTHER - Revision : 1
2020-08-13 Microsoft Windows Address Book Contact file integer overflow attempt
RuleID : 54532 - Type : FILE-OTHER - Revision : 1
2020-08-13 Microsoft Windows Address Book Contact file integer overflow attempt
RuleID : 54531 - Type : FILE-OTHER - Revision : 1
2020-08-13 Microsoft Windows Address Book Contact file integer overflow attempt
RuleID : 54530 - Type : FILE-OTHER - Revision : 1
2020-08-13 Microsoft Windows Address Book Contact file integer overflow attempt
RuleID : 54529 - Type : FILE-OTHER - Revision : 1
2020-08-13 Microsoft Windows Address Book Contact file integer overflow attempt
RuleID : 54528 - Type : FILE-OTHER - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53933 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53932 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

id Description
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038782.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038783.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038788.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038792.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038799.nasl - Type: ACT_GATHER_INFO