This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2015-07-20
Product Windows 10 Last view 2022-05-10
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* 1836
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* 1805
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* 1672
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* 1427
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* 1262
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* 1230
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* 1038
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:* 858
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* 720
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:* 594
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* 483
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:* 308
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* 248
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* 226
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* 223
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:* 197
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* 196
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* 184
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:* 182
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:* 170
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:* 164
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:* 163
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* 161
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* 160
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:* 157
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:* 156
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:* 151
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:* 151
cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:* 133
cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:* 125
cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:* 123
cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:* 114
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:* 80
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* 71
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:* 65
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:* 60
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:* 59
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:* 50
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:* 47
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:x64:* 24
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:* 17
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:* 17
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x86:* 14
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:arm64:* 14
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x86:* 12
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:arm64:* 11
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:x64:* 6
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:x86:* 5
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:-:* 4
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:-:* 4

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7 2022-05-10 CVE-2022-29142

Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29133.

5.5 2022-05-10 CVE-2022-29140

Windows Print Spooler Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29114.

7.8 2022-05-10 CVE-2022-29132

Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104.

8.8 2022-05-10 CVE-2022-29131

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

9.8 2022-05-10 CVE-2022-29130

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

8.8 2022-05-10 CVE-2022-29129

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

8.8 2022-05-10 CVE-2022-29128

Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141.

7 2022-05-10 CVE-2022-29126

Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability.

7.8 2022-05-10 CVE-2022-29115

Windows Fax Service Remote Code Execution Vulnerability.

5.5 2022-05-10 CVE-2022-29114

Windows Print Spooler Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29140.

7.8 2022-05-10 CVE-2022-29113

Windows Digital Media Receiver Elevation of Privilege Vulnerability.

7 2022-05-10 CVE-2022-29106

Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability.

6.5 2022-05-10 CVE-2022-26936

Windows Server Service Information Disclosure Vulnerability.

6.5 2022-05-10 CVE-2022-26935

Windows WLAN AutoConfig Service Information Disclosure Vulnerability.

5.5 2022-05-10 CVE-2022-26933

Windows NTFS Information Disclosure Vulnerability.

7.5 2022-05-10 CVE-2022-26931

Windows Kerberos Elevation of Privilege Vulnerability.

5.5 2022-05-10 CVE-2022-26930

Windows Remote Access Connection Manager Information Disclosure Vulnerability.

8.8 2022-05-10 CVE-2022-26927

Windows Graphics Component Remote Code Execution Vulnerability.

7.8 2022-05-10 CVE-2022-26926

Windows Address Book Remote Code Execution Vulnerability.

5.9 2022-05-10 CVE-2022-26925

Windows LSA Spoofing Vulnerability.

8.8 2022-05-10 CVE-2022-26923

Active Directory Domain Services Elevation of Privilege Vulnerability.

7.4 2022-05-10 CVE-2022-26913

Windows Authentication Security Feature Bypass Vulnerability.

4.7 2022-05-10 CVE-2022-24466

Windows Hyper-V Security Feature Bypass Vulnerability.

7 2022-05-10 CVE-2022-23279

Windows ALPC Elevation of Privilege Vulnerability.

8.1 2022-05-10 CVE-2022-23270

Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21972.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
20% (245) CWE-269 Improper Privilege Management
19% (240) CWE-200 Information Exposure
11% (137) CWE-20 Improper Input Validation
7% (90) CWE-264 Permissions, Privileges, and Access Controls
5% (68) CWE-787 Out-of-bounds Write
4% (50) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (37) CWE-59 Improper Link Resolution Before File Access ('Link Following')
2% (35) CWE-404 Improper Resource Shutdown or Release
2% (26) CWE-665 Improper Initialization
2% (25) CWE-362 Race Condition
1% (21) CWE-281 Improper Preservation of Permissions
1% (19) CWE-668 Exposure of Resource to Wrong Sphere
1% (19) CWE-284 Access Control (Authorization) Issues
1% (17) CWE-125 Out-of-bounds Read
1% (15) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (15) CWE-416 Use After Free
1% (13) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
0% (12) CWE-254 Security Features
0% (12) CWE-19 Data Handling
0% (11) CWE-94 Failure to Control Generation of Code ('Code Injection')
0% (10) CWE-190 Integer Overflow or Wraparound
0% (8) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (7) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (6) CWE-755 Improper Handling of Exceptional Conditions
0% (4) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:29493 OpenType font driver vulnerability - CVE-2015-2426 (MS15-078)

SAINT Exploits

Description Link
Windows RRAS Service Remote Code Execution Vulnerability More info here

Information Assurance Vulnerability Management (IAVM)

id Description
2015-B-0111 Microsoft Hyper-V Security Bypass Vulnerability (MS15-105)
Severity: Category II - VMSKEY: V0061371
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56562 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56561 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56302 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56301 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Win32k privilege escalation attempt
RuleID : 56264 - Type : FILE-EXECUTABLE - Revision : 1
2020-12-10 Microsoft Windows Win32k privilege escalation attempt
RuleID : 56263 - Type : FILE-EXECUTABLE - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k DirectComposition privilege escalation attempt
RuleID : 56260 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k DirectComposition privilege escalation attempt
RuleID : 56259 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt
RuleID : 56255 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt
RuleID : 56254 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote host is missing a macOS security update that fixes multiple vulner...
File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO
2018-10-22 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO
2018-10-18 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_14.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO
2018-09-17 Name: The remote Debian host is missing a security update.
File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO
2018-09-11 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO
2018-07-30 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-208-01.nasl - Type: ACT_GATHER_INFO
2018-07-27 Name: The remote Debian host is missing a security update.
File: debian_DLA-1446.nasl - Type: ACT_GATHER_INFO
2018-07-26 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1049.nasl - Type: ACT_GATHER_INFO
2018-07-24 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-1_0-0151.nasl - Type: ACT_GATHER_INFO
2018-07-24 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0049.nasl - Type: ACT_GATHER_INFO
2018-07-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO
2018-07-18 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-048.nasl - Type: ACT_GATHER_INFO
2018-07-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2162.nasl - Type: ACT_GATHER_INFO
2018-07-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2164.nasl - Type: ACT_GATHER_INFO
2018-07-09 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9f02e5ed7b.nasl - Type: ACT_GATHER_INFO