This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2017-11-14
Product Windows 10 Last view 2020-07-29
Version 1709 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_10

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.4 2020-07-29 CVE-2020-15707

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15706

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15705

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.

7.8 2020-07-27 CVE-2020-1457

A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1425.

7.8 2020-07-27 CVE-2020-1425

A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1457.

6.5 2020-07-14 CVE-2020-1468

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.

7.8 2020-07-14 CVE-2020-1463

An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory, aka 'Windows SharedStream Library Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1438

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428.

7.8 2020-07-14 CVE-2020-1437

An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows Network Location Awareness Service Elevation of Privilege Vulnerability'.

8.8 2020-07-14 CVE-2020-1436

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'.

8.8 2020-07-14 CVE-2020-1435

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.

5.3 2020-07-14 CVE-2020-1434

An elevation of privilege vulnerability exists in the way that the Windows Sync Host Service handles objects in memory, aka 'Windows Sync Host Service Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1430

An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows UPnP Device Host Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1354.

7.8 2020-07-14 CVE-2020-1429

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1428

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1438.

7.8 2020-07-14 CVE-2020-1427

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438.

7.8 2020-07-14 CVE-2020-1413

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.

7.8 2020-07-14 CVE-2020-1407

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1401.

7.8 2020-07-14 CVE-2020-1404

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.

7.8 2020-07-14 CVE-2020-1402

An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows ActiveX Installer Service Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1401

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1407.

7.8 2020-07-14 CVE-2020-1400

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1401, CVE-2020-1407.

7.8 2020-07-14 CVE-2020-1399

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.

6.8 2020-07-14 CVE-2020-1398

An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly handle Ease of Access dialog.An attacker who successfully exploited the vulnerability could execute commands with elevated permissions.The security update addresses the vulnerability by ensuring that the Ease of Access dialog is handled properly., aka 'Windows Lockscreen Elevation of Privilege Vulnerability'.

6.5 2020-07-14 CVE-2020-1397

An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory, aka 'Windows Imaging Component Information Disclosure Vulnerability'.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
34% (335) CWE-269 Improper Privilege Management
22% (222) CWE-200 Information Exposure
17% (169) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (78) CWE-264 Permissions, Privileges, and Access Controls
6% (67) CWE-20 Improper Input Validation
3% (32) CWE-404 Improper Resource Shutdown or Release
1% (12) CWE-611 Information Leak Through XML External Entity File Disclosure
0% (7) CWE-254 Security Features
0% (5) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (5) CWE-190 Integer Overflow or Wraparound
0% (4) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (3) CWE-362 Race Condition
0% (3) CWE-295 Certificate Issues
0% (3) CWE-287 Improper Authentication
0% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
0% (3) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (3) CWE-19 Data Handling
0% (2) CWE-502 Deserialization of Untrusted Data
0% (2) CWE-434 Unrestricted Upload of File with Dangerous Type
0% (2) CWE-416 Use After Free
0% (2) CWE-284 Access Control (Authorization) Issues
0% (1) CWE-613 Insufficient Session Expiration
0% (1) CWE-522 Insufficiently Protected Credentials
0% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
0% (1) CWE-347 Improper Verification of Cryptographic Signature

SAINT Exploits

Description Link
Windows RRAS Service Remote Code Execution Vulnerability More info here

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54297 - Type : OS-WINDOWS - Revision : 1
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54296 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows kernel security feature bypass attempt
RuleID : 54250 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows kernel security feature bypass attempt
RuleID : 54249 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54248 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54247 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54242 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54241 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows SMBv1 remote code execution attempt
RuleID : 54240 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54216 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54215 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53984 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53983 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53951 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53950 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Win32 kernel use after free privilege escalation attempt
RuleID : 53941 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Win32 kernel use after free privilege escalation attempt
RuleID : 53940 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53933 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53932 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 53917 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 53916 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows CF_PALETTE privilege escalation attempt
RuleID : 53653 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows CF_PALETTE privilege escalation attempt
RuleID : 53652 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Kernel CSRSS privilege escalation attempt
RuleID : 53630 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Kernel CSRSS privilege escalation attempt
RuleID : 53629 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

id Description
2018-09-11 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO