This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2018-05-22
Product Windows 10 Last view 2022-06-15
Version 1809 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_10

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2022-06-15 CVE-2022-30166

Local Security Authority Subsystem Service Elevation of Privilege Vulnerability.

8.8 2022-06-15 CVE-2022-30165

Windows Kerberos Elevation of Privilege Vulnerability.

7.8 2022-06-15 CVE-2022-30164

Kerberos AppContainer Security Feature Bypass Vulnerability.

5.5 2022-06-15 CVE-2022-30162

Windows Kernel Information Disclosure Vulnerability.

8.8 2022-06-15 CVE-2022-30161

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153.

7.8 2022-06-15 CVE-2022-30160

Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability.

7.8 2022-06-15 CVE-2022-30147

Windows Installer Elevation of Privilege Vulnerability.

7.5 2022-06-15 CVE-2022-30142

Windows File History Remote Code Execution Vulnerability.

7.8 2022-06-15 CVE-2022-30132

Windows Container Manager Service Elevation of Privilege Vulnerability.

7.5 2022-06-14 CVE-2022-32230

Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.

7.8 2022-06-01 CVE-2022-30190

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.

7.8 2022-05-18 CVE-2022-30138

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104, CVE-2022-29132.

7 2022-05-10 CVE-2022-29142

Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29133.

8.8 2022-05-10 CVE-2022-29141

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139.

5.5 2022-05-10 CVE-2022-29140

Windows Print Spooler Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29114.

8.8 2022-05-10 CVE-2022-29139

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29141.

8.8 2022-05-10 CVE-2022-29137

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29139, CVE-2022-29141.

7.8 2022-05-10 CVE-2022-29132

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104.

8.8 2022-05-10 CVE-2022-29131

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

9.8 2022-05-10 CVE-2022-29130

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

8.8 2022-05-10 CVE-2022-29129

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

8.8 2022-05-10 CVE-2022-29128

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

4.2 2022-05-10 CVE-2022-29127

BitLocker Security Feature Bypass Vulnerability.

7 2022-05-10 CVE-2022-29126

Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability.

8.1 2022-05-10 CVE-2022-21972

Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23270.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
32% (160) CWE-269 Improper Privilege Management
13% (68) CWE-200 Information Exposure
12% (62) CWE-787 Out-of-bounds Write
7% (36) CWE-59 Improper Link Resolution Before File Access ('Link Following')
3% (18) CWE-20 Improper Input Validation
3% (16) CWE-362 Race Condition
2% (14) CWE-125 Out-of-bounds Read
2% (12) CWE-404 Improper Resource Shutdown or Release
2% (11) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (9) CWE-665 Improper Initialization
1% (8) CWE-416 Use After Free
1% (8) CWE-190 Integer Overflow or Wraparound
1% (5) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (4) CWE-755 Improper Handling of Exceptional Conditions
0% (4) CWE-295 Certificate Issues
0% (4) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
0% (3) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (3) CWE-668 Exposure of Resource to Wrong Sphere
0% (3) CWE-347 Improper Verification of Cryptographic Signature
0% (3) CWE-264 Permissions, Privileges, and Access Controls
0% (3) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
0% (3) CWE-19 Data Handling
0% (2) CWE-522 Insufficiently Protected Credentials
0% (2) CWE-354 Improper Validation of Integrity Check Value
0% (2) CWE-327 Use of a Broken or Risky Cryptographic Algorithm

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56562 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56561 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56302 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56301 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k DirectComposition privilege escalation attempt
RuleID : 56260 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k DirectComposition privilege escalation attempt
RuleID : 56259 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt
RuleID : 56255 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt
RuleID : 56254 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56231 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56230 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows Remote Desktop information disclosure attempt
RuleID : 55994 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote host is missing a macOS security update that fixes multiple vulner...
File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO
2018-10-22 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO
2018-10-18 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_14.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-17 Name: The remote Debian host is missing a security update.
File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO
2018-07-30 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-208-01.nasl - Type: ACT_GATHER_INFO
2018-07-27 Name: The remote Debian host is missing a security update.
File: debian_DLA-1446.nasl - Type: ACT_GATHER_INFO
2018-07-26 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1049.nasl - Type: ACT_GATHER_INFO
2018-07-24 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0049.nasl - Type: ACT_GATHER_INFO
2018-07-24 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-1_0-0151.nasl - Type: ACT_GATHER_INFO
2018-07-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO
2018-07-18 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-048.nasl - Type: ACT_GATHER_INFO
2018-07-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2164.nasl - Type: ACT_GATHER_INFO
2018-07-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2162.nasl - Type: ACT_GATHER_INFO
2018-07-09 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9f02e5ed7b.nasl - Type: ACT_GATHER_INFO
2018-07-05 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-1965.nasl - Type: ACT_GATHER_INFO