This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2014-11-11
Product Windows 7 Last view 2015-04-21
Version * Type Os
Update sp1  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware x64  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_7

Activity : Overall

Related : CVE

  Date Alert Description
7.2 2015-04-21 CVE-2015-1701

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

9.3 2014-11-11 CVE-2014-4077

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014.

CWE : Common Weakness Enumeration

%idName
100% (2) CWE-264 Permissions, Privileges, and Access Controls

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2014-A-0179 Microsoft Input Method Editor (IME) Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0057395

Snort® IPS/IDS

Date Description
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34499 - Type : OS-WINDOWS - Revision : 3
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34498 - Type : OS-WINDOWS - Revision : 3

Nessus® Vulnerability Scanner

id Description
2015-05-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms14-078.nasl - Type: ACT_GATHER_INFO