This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2015-07-20
Product Windows 10 Last view 2020-07-29
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* 1249
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* 1234
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* 1044
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* 977
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* 915
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* 767
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* 717
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* 490
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* 482
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:* 169
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* 67
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:* 58
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:* 57
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:* 51
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:* 48
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:* 47
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:* 37
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:* 30
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:* 26
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:x64:* 23
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:* 19
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:* 14
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:* 12
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:* 12
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:* 12
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:* 12
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:* 12
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:* 12
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:* 12
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:* 12
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:arm64:* 10
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x86:* 10
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:arm64:* 10
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x86:* 10
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:x64:* 5
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:x86:* 4
cpe:2.3:o:microsoft:windows_10:1807:*:*:*:*:*:*:* 2
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:hololens:* 1
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:hololens:* 1
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:hololens:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.4 2020-07-29 CVE-2020-15707

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15706

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15705

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.

7.8 2020-07-27 CVE-2020-1457

A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1425.

7.8 2020-07-27 CVE-2020-1425

A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1457.

6.5 2020-07-14 CVE-2020-1468

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.

7.8 2020-07-14 CVE-2020-1463

An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory, aka 'Windows SharedStream Library Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1438

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428.

7.8 2020-07-14 CVE-2020-1437

An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows Network Location Awareness Service Elevation of Privilege Vulnerability'.

8.8 2020-07-14 CVE-2020-1436

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'.

8.8 2020-07-14 CVE-2020-1435

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.

5.3 2020-07-14 CVE-2020-1434

An elevation of privilege vulnerability exists in the way that the Windows Sync Host Service handles objects in memory, aka 'Windows Sync Host Service Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1431

An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1430

An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows UPnP Device Host Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1354.

7.8 2020-07-14 CVE-2020-1429

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1428

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1438.

7.8 2020-07-14 CVE-2020-1427

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438.

5.5 2020-07-14 CVE-2020-1426

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1419.

7.8 2020-07-14 CVE-2020-1424

An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1423

An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1422

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415.

8.8 2020-07-14 CVE-2020-1421

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.

5.5 2020-07-14 CVE-2020-1420

An information disclosure vulnerability exists when Windows Error Reporting improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Error Reporting Information Disclosure Vulnerability'.

5.5 2020-07-14 CVE-2020-1419

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1426.

7.8 2020-07-14 CVE-2020-1418

An elevation of privilege vulnerability exists when the Windows Diagnostics Execution Service fails to properly sanitize input, leading to an unsecure library-loading behavior, aka 'Windows Diagnostics Hub Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1393.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
24% (389) CWE-269 Improper Privilege Management
24% (386) CWE-200 Information Exposure
14% (230) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (180) CWE-264 Permissions, Privileges, and Access Controls
11% (174) CWE-20 Improper Input Validation
2% (35) CWE-404 Improper Resource Shutdown or Release
1% (23) CWE-284 Access Control (Authorization) Issues
1% (20) CWE-281 Improper Preservation of Permissions
1% (20) CWE-254 Security Features
0% (14) CWE-611 Information Leak Through XML External Entity File Disclosure
0% (12) CWE-19 Data Handling
0% (7) CWE-362 Race Condition
0% (7) CWE-287 Improper Authentication
0% (7) CWE-190 Integer Overflow or Wraparound
0% (6) CWE-416 Use After Free
0% (5) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (4) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (4) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
0% (4) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (3) CWE-426 Untrusted Search Path
0% (3) CWE-295 Certificate Issues
0% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
0% (2) CWE-665 Improper Initialization
0% (2) CWE-522 Insufficiently Protected Credentials
0% (2) CWE-502 Deserialization of Untrusted Data

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:29493 OpenType font driver vulnerability - CVE-2015-2426 (MS15-078)

SAINT Exploits

Description Link
Windows RRAS Service Remote Code Execution Vulnerability More info here

Information Assurance Vulnerability Management (IAVM)

id Description
2015-B-0111 Microsoft Hyper-V Security Bypass Vulnerability (MS15-105)
Severity: Category II - VMSKEY: V0061371
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54297 - Type : OS-WINDOWS - Revision : 1
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54296 - Type : OS-WINDOWS - Revision : 1
2020-07-14 CallStranger UPnP discovery attempt
RuleID : 54281 - Type : INDICATOR-SCAN - Revision : 1
2020-07-14 UPnP SUBSCRIBE Callback denial-of-service attempt
RuleID : 54280 - Type : INDICATOR-COMPROMISE - Revision : 1
2020-07-14 UPnP SUBSCRIBE Callback denial-of-service attempt
RuleID : 54279 - Type : INDICATOR-COMPROMISE - Revision : 1
2020-07-09 Microsoft Windows SMB chained compression out of bounds read attempt
RuleID : 54271 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows SMB chained compression out of bounds read attempt
RuleID : 54270 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows kernel security feature bypass attempt
RuleID : 54250 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows kernel security feature bypass attempt
RuleID : 54249 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54248 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54247 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Media Foundation getKeyForIndex out-of-bounds read attempt
RuleID : 54244 - Type : FILE-MULTIMEDIA - Revision : 1
2020-07-09 Microsoft Media Foundation getKeyForIndex out-of-bounds read attempt
RuleID : 54243 - Type : FILE-MULTIMEDIA - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54242 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54241 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows SMBv1 remote code execution attempt
RuleID : 54240 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows SMB srv2.sys information disclosure attempt
RuleID : 54217 - Type : OS-WINDOWS - Revision : 2
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54216 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54215 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53984 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53983 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53951 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53950 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Win32 kernel use after free privilege escalation attempt
RuleID : 53941 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Win32 kernel use after free privilege escalation attempt
RuleID : 53940 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-22 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO
2018-09-11 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-30 Name: The Internet Explorer installation on the remote host is affected by multiple...
File: smb_nt_ms17_jul_internet_explorer.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO