Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2000-04-14 |
Product | Windows 2000 | Last view | 2010-06-08 |
Version | * | Type | Os |
Update | sp4 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_2000 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.8 | 2010-06-08 | CVE-2010-1255 | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 allows local users to execute arbitrary code via vectors related to "glyph outline information" and TrueType fonts, aka "Win32k TrueType Font Parsing Vulnerability." |
7.2 | 2010-06-08 | CVE-2010-0819 | Unspecified vulnerability in the Windows OpenType Compact Font Format (CFF) driver in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users to execute arbitrary code via unknown vectors related to improper validation when copying data from user mode to kernel mode, aka "OpenType CFF Font Driver Memory Corruption Vulnerability." |
6.8 | 2010-06-08 | CVE-2010-0485 | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 "do not properly validate all callback parameters when creating a new window," which allows local users to execute arbitrary code, aka "Win32k Window Creation Vulnerability." |
6.8 | 2010-06-08 | CVE-2010-0484 | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 "do not properly validate changes in certain kernel objects," which allows local users to execute arbitrary code via vectors related to Device Contexts (DC) and the GetDCEx function, aka "Win32k Improper Data Validation Vulnerability." |
4.9 | 2010-05-06 | CVE-2010-1735 | The SfnLOGONNOTIFY function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x4c value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window. |
4.9 | 2010-05-06 | CVE-2010-1734 | The SfnINSTRING function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x18d value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window. |
9.3 | 2010-04-14 | CVE-2010-0487 | The Authenticode Signature verification functionality in cabview.dll in Cabinet File Viewer Shell Extension 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows remote attackers to execute arbitrary code via a modified cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "Cabview Corruption Validation Vulnerability." |
9.3 | 2010-04-14 | CVE-2010-0486 | The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows user-assisted remote attackers to execute arbitrary code via a modified (1) Portable Executable (PE) or (2) cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "WinVerifyTrust Signature Validation Vulnerability." |
9.3 | 2010-04-14 | CVE-2010-0480 | Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability." |
9.3 | 2010-04-14 | CVE-2010-0478 | Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability." |
10 | 2010-04-14 | CVE-2010-0269 | The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Memory Allocation Vulnerability." |
9.3 | 2010-04-14 | CVE-2010-0268 | Unspecified vulnerability in the Windows Media Player ActiveX control in Windows Media Player (WMP) 9 on Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted media content, aka "Media Player Remote Code Execution Vulnerability." |
4.9 | 2010-04-14 | CVE-2010-0238 | Unspecified vulnerability in registry-key validation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Registry Key Vulnerability." |
6.9 | 2010-04-14 | CVE-2010-0237 | The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability." |
7.2 | 2010-04-14 | CVE-2010-0236 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Allocation Vulnerability." |
4.7 | 2010-04-14 | CVE-2010-0235 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not perform the expected validation before creating a symbolic link, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Symbolic Link Value Vulnerability." |
4.7 | 2010-04-14 | CVE-2010-0234 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Null Pointer Vulnerability." |
9.3 | 2010-03-31 | CVE-2010-0805 | The Tabular Data Control (TDC) ActiveX control in Microsoft Internet Explorer 5.01 SP4, 6 on Windows XP SP2 and SP3, and 6 SP1 allows remote attackers to execute arbitrary code via a long URL (DataURL parameter) that triggers memory corruption in the CTDCCtl::SecurityCHeckDataURL function, aka "Memory Corruption Vulnerability." |
4.3 | 2010-03-31 | CVE-2010-0494 | Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted HTML document in a situation where the client user drags one browser window across another browser window, aka "HTML Element Cross-Domain Vulnerability." |
9.3 | 2010-03-31 | CVE-2010-0491 | Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability." |
9.3 | 2010-03-31 | CVE-2010-0489 | Race condition in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Race Condition Memory Corruption Vulnerability." |
4.3 | 2010-03-31 | CVE-2010-0488 | Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 does not properly handle unspecified "encoding strings," which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site, aka "Post Encoding Information Disclosure Vulnerability." |
9.3 | 2010-03-31 | CVE-2010-0267 | Microsoft Internet Explorer 6, 6 SP1, and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability." |
9.3 | 2010-03-10 | CVE-2010-0806 | Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability." |
7.6 | 2010-03-03 | CVE-2010-0917 | Stack-based buffer overflow in VBScript in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, might allow user-assisted remote attackers to execute arbitrary code via a long string in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution when the F1 key is pressed, a different vulnerability than CVE-2010-0483. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
23% (33) | CWE-20 | Improper Input Validation |
19% (27) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
18% (25) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
12% (17) | CWE-399 | Resource Management Errors |
7% (11) | CWE-264 | Permissions, Privileges, and Access Controls |
7% (10) | CWE-189 | Numeric Errors |
2% (3) | CWE-362 | Race Condition |
2% (3) | CWE-287 | Improper Authentication |
2% (3) | CWE-16 | Configuration |
1% (2) | CWE-310 | Cryptographic Issues |
1% (2) | CWE-200 | Information Exposure |
0% (1) | CWE-255 | Credentials Management |
0% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-2 | Inducing Account Lockout |
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-12 | Choosing a Message/Channel Identifier on a Public/Multicast Channel |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-21 | Exploitation of Session Variables, Resource IDs and other Trusted Credentials |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-27 | Leveraging Race Conditions via Symbolic Links |
CAPEC-28 | Fuzzing |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-36 | Using Unpublished Web Service APIs |
CAPEC-40 | Manipulating Writeable Terminal Devices |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
SAINT Exploits
Description | Link |
---|---|
Internet Explorer iepeers.dll use-after-free vulnerability | More info here |
Microsoft Message Queuing buffer overflow | More info here |
Windows Server Service buffer overflow MS08-067 | More info here |
Windows RRAS memory corruption vulnerability | More info here |
Microsoft Agent crafted URL vulnerability | More info here |
Windows Task Scheduler buffer overflow | More info here |
Internet Explorer WinINet credential reflection vulnerability | More info here |
Microsoft WordPad Word97 text converter buffer overflow | More info here |
Windows Print Spooler EnumeratePrintShares buffer overflow | More info here |
Internet Explorer Tabular Data Control DataURL memory corruption | More info here |
Windows GDI EMF filename buffer overflow | More info here |
Microsoft DirectX DirectShow QuickTime movie parsing vulnerability | More info here |
Windows Animated Cursor Header buffer overflow | More info here |
Windows Media Unicast Service transport information packet buffer overflow | More info here |
Windows RPC DCOM interface buffer overflow | More info here |
Windows GDI Privilege Elevation | More info here |
Microsoft WINS replication service pointer corruption | More info here |
Windows DNS server RPC management interface buffer overflow | More info here |
Windows Media Player plugin EMBED buffer overflow | More info here |
Windows RASMAN registry corruption vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
65225 | Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation |
65224 | Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Con... |
65223 | Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Es... |
65217 | Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation |
64925 | Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption ... |
64058 | Microsoft Windows win32k.sys SfnINSTRING() Local DoS |
64057 | Microsoft Windows win32k.sys SfnLOGONNOTIFY() Local DoS |
63765 | Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieva... |
63749 | Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow |
63746 | Microsoft Windows Authenticode Signature Verification Cabview Manipulation Pr... |
63745 | Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validati... |
63736 | Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS |
63733 | Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privile... |
63731 | Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege... |
63730 | Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS |
63728 | Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS |
63726 | Microsoft Windows Media Unicast Service Transport Packet Handling Remote Over... |
63335 | Microsoft IE Unspecified Uninitialized Memory Corruption |
63334 | Microsoft IE Post Encoding Information Disclosure |
63333 | Microsoft IE Unspecified Race Condition Memory Corruption |
63331 | Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption |
63329 | Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::Securit... |
63328 | Microsoft IE HTML Element Handling Cross-Domain Information Disclosure |
62810 | Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution |
62756 | Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Comm... |
ExploitDB Exploits
id | Description |
---|---|
17659 | MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow |
16590 | Internet Explorer DHTML Behaviors Use After Free |
16333 | Windows Media Services ConnectFunnel Stack Buffer Overflow |
15266 | Windows NTLM Weak Nonce Vulnerability |
14895 | MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit |
14608 | Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048) |
12273 | Windows 7/2008R2 SMB Client Trans2 Stack Overflow 10-020 PoC |
12032 | Microsoft Internet Explorer Tabular Data Control ActiveX Remote Code Execution |
11683 | Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta) |
9893 | Microsoft Internet Explorer 5,6,7 memory corruption PoC |
3740 | MS Windows DNS DnssrvQuery Remote Stack Overflow Exploit |
1065 | MS Windows (SMB) Transaction Response Handling Exploit (MS05-011) |
1019 | MS Windows COM Structured Storage Local Exploit (MS05-012) |
OpenVAS Exploits
id | Description |
---|---|
2011-11-21 | Name : Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerab... File : nvt/secpod_ms_windows_ip_validation_code_exec_vuln.nasl |
2011-01-14 | Name : Vulnerabilities in GDI Could Allow Remote Code Execution (925902) File : nvt/gb_ms07-017.nasl |
2011-01-14 | Name : Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnera... File : nvt/gb_ms07-021.nasl |
2011-01-14 | Name : Vulnerability in RPC Could Allow Denial of Service (933729) File : nvt/gb_ms07-058.nasl |
2011-01-13 | Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644) File : nvt/gb_ms08-001.nasl |
2011-01-10 | Name : Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553) File : nvt/gb_ms08-020.nasl |
2011-01-10 | Name : Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerab... File : nvt/gb_ms08-025.nasl |
2010-10-22 | Name : Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468) File : nvt/secpod_ms10-012-remote.nasl |
2010-07-08 | Name : Microsoft Windows GDI Multiple Vulnerabilities (925902) File : nvt/ms07-017.nasl |
2010-06-09 | Name : Message Queuing Remote Code Execution Vulnerability (951071) - Remote File : nvt/secpod_ms08-065_remote.nasl |
2010-06-09 | Name : Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (9... File : nvt/secpod_ms10-032.nasl |
2010-06-09 | Name : Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability ... File : nvt/secpod_ms10-034.nasl |
2010-06-09 | Name : Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vu... File : nvt/secpod_ms10-037.nasl |
2010-05-13 | Name : Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities File : nvt/gb_ms_win_kernel_win32k_sys_mult_dos_vuln.nasl |
2010-04-14 | Name : Microsoft Windows Kernel Could Allow Elevation of Privilege (979683) File : nvt/secpod_ms10-021.nasl |
2010-04-14 | Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (980232) File : nvt/secpod_ms10-020.nasl |
2010-04-14 | Name : Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232) File : nvt/secpod_ms10-022.nasl |
2010-04-14 | Name : Microsoft Windows Authentication Verification Remote Code Execution Vulnerabi... File : nvt/secpod_ms10-019.nasl |
2010-04-14 | Name : Microsoft Windows Media Player Could Allow Remote Code Execution (979402) File : nvt/secpod_ms10-027.nasl |
2010-04-14 | Name : Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816) File : nvt/secpod_ms10-026.nasl |
2010-04-14 | Name : Microsoft Windows Media Services Remote Code Execution Vulnerability (980858) File : nvt/secpod_ms10-025.nasl |
2010-04-01 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (980182) File : nvt/secpod_ms10-018.nasl |
2010-03-18 | Name : Vulnerabilities in SMB Could Allow Remote Code Execution (958687) - Remote File : nvt/secpod_ms09-001_remote.nasl |
2010-03-16 | Name : FreeBSD Ports: openoffice.org File : nvt/freebsd_openoffice.org.nasl |
2010-03-10 | Name : MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability File : nvt/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2010-A-0068 | Microsoft Windows Media Services Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0024076 |
2010-A-0052 | Microsoft Windows Media Player Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0024002 |
2010-A-0053 | Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0023999 |
2010-B-0013 | Microsoft Windows Kerberos Denial of Service Vulnerability Severity: Category II - VMSKEY: V0022675 |
2010-B-0014 | Microsoft Paint Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0022674 |
2009-B-0069 | Multiple Vulnerabilities in Indeo Codec affecting Microsoft Windows Severity: Category II - VMSKEY: V0022163 |
2009-A-0126 | Microsoft Internet Authentication Service Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0022101 |
2009-A-0128 | Microsoft WordPad and Office Text Converters Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0021551 |
2009-A-0116 | Microsoft Windows License Logging Server Remote Heap Buffer Overflow Vulnerab... Severity: Category I - VMSKEY: V0021937 |
2009-A-0095 | Multiple Vulnerabilities in Microsoft Windows CryptoAPI Severity: Category I - VMSKEY: V0021760 |
2009-A-0097 | Multiple Vulnerabilities in Microsoft Active Template Library Severity: Category II - VMSKEY: V0021756 |
2009-B-0053 | Microsoft Indexing Services Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0021750 |
2009-A-0091 | Multiple Vulnerabilities in Microsoft Windows Media Runtime Severity: Category II - VMSKEY: V0021744 |
2009-A-0067 | Multiple Vulnerabilities in Microsoft Active Template Library Severity: Category II - VMSKEY: V0019882 |
2009-B-0033 | Multiple Vulnerabilities in Visual Studio Active Template Library Severity: Category II - VMSKEY: V0019798 |
2009-A-0034 | Microsoft Windows HTTP Services Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0018756 |
2009-A-0032 | Multiple Vulnerabilities in WordPad and Office Text Converters Severity: Category I - VMSKEY: V0018752 |
2009-A-0018 | Multiple Vulnerabilities in Windows DNS and WINS Servers Severity: Category I - VMSKEY: V0018553 |
2009-A-0019 | Microsoft Windows Secure Channel Vulnerability Severity: Category II - VMSKEY: V0018549 |
2008-A-0086 | Microsoft GDI Remote Code Execution Vulnerabilities Severity: Category II - VMSKEY: V0017910 |
2008-A-0081 | Microsoft Server Service Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0017870 |
2008-T-0056 | Microsoft Message Queuing Service Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0017781 |
2008-T-0039 | Multiple Microsoft Event System Remote Code Execution Vulnerabilities Severity: Category I - VMSKEY: V0016744 |
2008-A-0060 | Microsoft Windows Image Color Management System Vulnerability Severity: Category I - VMSKEY: V0016737 |
2008-B-0034 | Microsoft VBScript and JScript Scripting Engines Remote Code Execution Severity: Category II - VMSKEY: V0015940 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC DIRECT-UDP msqueue function 4 little endian object call overflow attempt RuleID : 9771 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-IP-TCP msqueue function 4 object call overflow attempt RuleID : 9770 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-IP-TCP msqueue function 4 overflow attempt RuleID : 9769 - Type : OS-WINDOWS - Revision : 13 |
2014-01-10 | DCERPC NCACN-IP-TCP v4 msqueue function 4 little endian overflow attempt RuleID : 9768 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT-UDP msqueue function 4 object call overflow attempt RuleID : 9767 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT-UDP msqueue function 4 overflow attempt RuleID : 9766 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT-UDP msqueue function 4 little endian overflow attempt RuleID : 9765 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT-UDP v4 msqueue function 4 little endian overflow attempt RuleID : 9764 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT ISystemActivator CoGetInstanceFromFile object call attempt RuleID : 9759 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian obje... RuleID : 9758 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian obje... RuleID : 9757 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile object call attempt RuleID : 9756 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian object... RuleID : 9755 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile object call attempt RuleID : 9754 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile object call attempt RuleID : 9753 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT ISystemActivator CoGetInstanceFromFile little endian object cal... RuleID : 9752 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT ISystemActivator CoGetInstanceFromFile attempt RuleID : 9751 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile little endian attempt RuleID : 9750 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile little endian attempt RuleID : 9749 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-IP-TCP ISystemActivator CoGetInstanceFromFile attempt RuleID : 9748 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-HTTP ISystemActivator CoGetInstanceFromFile little endian attempt RuleID : 9747 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC DIRECT v4 ISystemActivator CoGetInstanceFromFile attempt RuleID : 9746 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCADG-IP-UDP ISystemActivator CoGetInstanceFromFile attempt RuleID : 9745 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCADG-IP-UDP v4 ISystemActivator CoGetInstanceFromFile little endian a... RuleID : 9744 - Type : NETBIOS - Revision : 7 |
2014-01-10 | DCERPC NCACN-HTTP v4 ISystemActivator CoGetInstanceFromFile little endian att... RuleID : 9743 - Type : NETBIOS - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2014-10-10 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL10509.nasl - Type: ACT_GATHER_INFO |
2014-03-05 | Name: The DNS server running on the remote host is potentially affected by a remote... File: ms_dns_kb935966.nasl - Type: ACT_GATHER_INFO |
2014-03-05 | Name: The DNS server running on the remote host is vulnerable to DNS spoofing attacks. File: ms_dns_kb941672.nasl - Type: ACT_GATHER_INFO |
2014-03-05 | Name: The DNS server running on the remote host is vulnerable to DNS spoofing attacks. File: ms_dns_kb951746.nasl - Type: ACT_GATHER_INFO |
2014-03-05 | Name: The DNS server running on the remote host is vulnerable to DNS spoofing attacks. File: ms_dns_kb961063.nasl - Type: ACT_GATHER_INFO |
2011-01-27 | Name: The remote SuSE 10 host is missing a security-related patch. File: suse_flash-player-6386.nasl - Type: ACT_GATHER_INFO |
2010-10-11 | Name: The remote SuSE 10 host is missing a security-related patch. File: suse_java-1_5_0-ibm-6741.nasl - Type: ACT_GATHER_INFO |
2010-09-13 | Name: It is possible to execute arbitrary code on the remote Windows host due to fl... File: smb_kb971468.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20090908-tcp24http.nasl - Type: ACT_GATHER_INFO |
2010-06-09 | Name: The Windows kernel is affected by several vulnerabilities that could allow es... File: smb_nt_ms10-032.nasl - Type: ACT_GATHER_INFO |
2010-06-09 | Name: The remote Windows host is missing an update that disables selected ActiveX c... File: smb_nt_ms10-034.nasl - Type: ACT_GATHER_INFO |
2010-06-09 | Name: The remote Windows host contains a font driver that is affected by a privileg... File: smb_nt_ms10-037.nasl - Type: ACT_GATHER_INFO |
2010-04-27 | Name: The remote media service is affected by a remote code execution vulnerability. File: smb_kb_980858.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: The remote Windows host has multiple code execution vulnerabilities. File: smb_nt_ms10-019.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: Arbitrary code can be executed on the remote host through the installed SMB c... File: smb_nt_ms10-020.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: The Windows kernel is affected by eight vulnerabilities, including some that ... File: smb_nt_ms10-021.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: Arbitrary code can be executed on the remote host through the installed VBScr... File: smb_nt_ms10-022.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: The remote media service has a buffer overflow vulnerability. File: smb_nt_ms10-025.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: An audio codec on the remote Windows host has a buffer overflow vulnerability. File: smb_nt_ms10-026.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: The remote Windows host has an ActiveX control that is affected by a code exe... File: smb_nt_ms10-027.nasl - Type: ACT_GATHER_INFO |
2010-03-30 | Name: Arbitrary code can be executed on the remote host through a web browser. File: smb_nt_ms10-018.nasl - Type: ACT_GATHER_INFO |
2010-03-01 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_c97d7a37223311df96dd001b2134ef46.nasl - Type: ACT_GATHER_INFO |
2010-02-12 | Name: The remote Windows host has a program affected by multiple buffer overflows. File: openoffice_32.nasl - Type: ACT_GATHER_INFO |
2010-02-09 | Name: Arbitrary code can be executed on the remote host through Microsoft Paint. File: smb_nt_ms10-005.nasl - Type: ACT_GATHER_INFO |
2010-02-09 | Name: The remote Windows host is missing an update that disables selected ActiveX c... File: smb_nt_ms10-008.nasl - Type: ACT_GATHER_INFO |