Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2020-06-09 |
Product | Windows 10 | Last view | 2021-12-15 |
Version | 2004 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_10 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.5 | 2021-12-15 | CVE-2021-43227 | Storage Spaces Controller Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43235. |
7.8 | 2021-12-15 | CVE-2021-43226 | Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43207. |
5.5 | 2021-12-15 | CVE-2021-43224 | Windows Common Log File System Driver Information Disclosure Vulnerability |
9.8 | 2021-12-15 | CVE-2021-43217 | Windows Encrypting File System (EFS) Remote Code Execution Vulnerability |
6.1 | 2021-11-10 | CVE-2021-42288 | Windows Hello Security Feature Bypass Vulnerability |
7.8 | 2021-11-10 | CVE-2021-42280 | Windows Feedback Hub Elevation of Privilege Vulnerability |
7.5 | 2021-11-10 | CVE-2021-42279 | Chakra Scripting Engine Memory Corruption Vulnerability |
7.8 | 2021-11-10 | CVE-2021-42277 | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability |
7.8 | 2021-11-10 | CVE-2021-42276 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability |
8.8 | 2021-11-10 | CVE-2021-42275 | Microsoft COM for Windows Remote Code Execution Vulnerability |
7.8 | 2021-11-10 | CVE-2021-41379 | Windows Installer Elevation of Privilege Vulnerability |
8.8 | 2021-11-10 | CVE-2021-41378 | Windows NTFS Remote Code Execution Vulnerability |
7.8 | 2021-11-10 | CVE-2021-41377 | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability |
4.4 | 2021-11-10 | CVE-2021-41371 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38631. |
7.8 | 2021-11-10 | CVE-2021-41370 | NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-42283. |
7.8 | 2021-11-10 | CVE-2021-41367 | NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41370, CVE-2021-42283. |
7.8 | 2021-11-10 | CVE-2021-41366 | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability |
7.5 | 2021-11-10 | CVE-2021-41356 | Windows Denial of Service Vulnerability |
8.8 | 2021-11-10 | CVE-2021-38666 | Remote Desktop Client Remote Code Execution Vulnerability |
6.5 | 2021-11-10 | CVE-2021-38665 | Remote Desktop Protocol Client Information Disclosure Vulnerability |
4.4 | 2021-11-10 | CVE-2021-38631 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41371. |
7.8 | 2021-11-10 | CVE-2021-36957 | Windows Desktop Bridge Elevation of Privilege Vulnerability |
7.8 | 2021-10-13 | CVE-2021-41357 | Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40449, CVE-2021-40450. |
7.8 | 2021-10-13 | CVE-2021-41347 | Windows AppX Deployment Service Elevation of Privilege Vulnerability |
7.8 | 2021-10-13 | CVE-2021-41346 | Console Window Host Security Feature Bypass Vulnerability |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
52% (122) | CWE-269 | Improper Privilege Management |
11% (26) | CWE-200 | Information Exposure |
10% (25) | CWE-787 | Out-of-bounds Write |
4% (10) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
3% (8) | CWE-416 | Use After Free |
3% (7) | CWE-20 | Improper Input Validation |
1% (3) | CWE-347 | Improper Verification of Cryptographic Signature |
1% (3) | CWE-190 | Integer Overflow or Wraparound |
0% (2) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (2) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (2) | CWE-668 | Exposure of Resource to Wrong Sphere |
0% (2) | CWE-665 | Improper Initialization |
0% (2) | CWE-362 | Race Condition |
0% (2) | CWE-191 | Integer Underflow (Wrap or Wraparound) |
0% (2) | CWE-125 | Out-of-bounds Read |
0% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
0% (1) | CWE-754 | Improper Check for Unusual or Exceptional Conditions |
0% (1) | CWE-639 | Access Control Bypass Through User-Controlled Key |
0% (1) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
0% (1) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
0% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
0% (1) | CWE-306 | Missing Authentication for Critical Function |
0% (1) | CWE-294 | Authentication Bypass by Capture-replay |
0% (1) | CWE-281 | Improper Preservation of Permissions |
0% (1) | CWE-276 | Incorrect Default Permissions |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56856 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56855 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56854 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56853 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56852 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56851 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56850 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56849 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56562 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56561 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Windows Network File System denial of service attempt RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56302 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56301 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56296 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56295 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k privilege escalation attempt RuleID : 56264 - Type : FILE-EXECUTABLE - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k privilege escalation attempt RuleID : 56263 - Type : FILE-EXECUTABLE - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56262 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56261 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k DirectComposition privilege escalation attempt RuleID : 56260 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k DirectComposition privilege escalation attempt RuleID : 56259 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt RuleID : 56255 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt RuleID : 56254 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56231 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56230 - Type : OS-WINDOWS - Revision : 1 |