Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2012-02-14 |
Product | Windows 7 | Last view | 2016-03-09 |
Version | * | Type | Os |
Update | sp1 | ||
Edition | x64 | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_7 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2016-03-09 | CVE-2016-0087 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 do not properly validate handles, which allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6130 | Integer underflow in Uniscribe in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows remote attackers to execute arbitrary code via a crafted font, aka "Windows Integer Underflow Vulnerability." |
7.2 | 2015-12-09 | CVE-2015-6128 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability." |
6.9 | 2015-06-09 | CVE-2015-1758 | Untrusted search path vulnerability in the LoadLibrary function in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a Trojan horse DLL in an unspecified directory, aka "Windows LoadLibrary EoP Vulnerability." |
7.2 | 2015-04-21 | CVE-2015-1701 | Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability." |
9.3 | 2015-04-14 | CVE-2015-1645 | Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability." |
7.2 | 2015-04-14 | CVE-2015-0098 | Task Scheduler in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges by triggering application execution by an invalid task, aka "Task Scheduler Elevation of Privilege Vulnerability." |
7.2 | 2015-03-11 | CVE-2015-0075 | The kernel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Impersonation Level Check Elevation of Privilege Vulnerability." |
7.2 | 2014-01-15 | CVE-2014-0262 | win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Server 2008 R2 SP1 does not properly consider thread-owned objects during the processing of window handles, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability." |
7.2 | 2013-12-10 | CVE-2013-3907 | portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability." |
7.2 | 2013-12-10 | CVE-2013-3902 | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." |
4.9 | 2013-11-12 | CVE-2013-3887 | The Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows local users to obtain sensitive information from kernel memory by leveraging improper copy operations, aka "Ancillary Function Driver Information Disclosure Vulnerability." |
9.3 | 2013-10-09 | CVE-2013-3894 | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3888 | dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3881 | win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3879 | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3200 | The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability." |
10 | 2013-10-09 | CVE-2013-3195 | The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability." |
5 | 2013-09-11 | CVE-2013-3868 | Microsoft Active Directory Lightweight Directory Service (AD LDS) on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 8 and Active Directory Services on Windows Server 2008 SP2 and R2 SP1 and Server 2012 allow remote attackers to cause a denial of service (LDAP directory-service outage) via a crafted LDAP query, aka "Remote Anonymous DoS Vulnerability." |
7.2 | 2013-09-11 | CVE-2013-3866 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." |
7.2 | 2013-09-11 | CVE-2013-3865 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3864. |
7.2 | 2013-09-11 | CVE-2013-3864 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3865. |
6.9 | 2013-09-11 | CVE-2013-3862 | Double free vulnerability in Microsoft Windows 7 and Server 2008 R2 SP1 allows local users to gain privileges via a crafted service description that is not properly handled by services.exe in the Service Control Manager (SCM), aka "Service Control Manager Double Free Vulnerability." |
7.2 | 2013-09-11 | CVE-2013-1344 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-3864, and CVE-2013-3865. |
7.2 | 2013-09-11 | CVE-2013-1343 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
35% (35) | CWE-362 | Race Condition |
15% (15) | CWE-264 | Permissions, Privileges, and Access Controls |
14% (14) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12% (12) | CWE-20 | Improper Input Validation |
9% (9) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
8% (8) | CWE-399 | Resource Management Errors |
4% (4) | CWE-189 | Numeric Errors |
1% (1) | CWE-200 | Information Exposure |
1% (1) | CWE-134 | Uncontrolled Format String |
ExploitDB Exploits
id | Description |
---|---|
33213 | Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei) |
31576 | Windows TrackPopupMenuEx Win32k NULL Page |
27050 | DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056) |
OpenVAS Exploits
id | Description |
---|---|
2013-07-09 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671... File : nvt/secpod_ms12-020_remote.nasl |
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
2012-12-12 | Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability... File : nvt/secpod_ms12-081.nasl |
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
2012-11-14 | Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528) File : nvt/secpod_ms12-072.nasl |
2012-10-10 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197) File : nvt/secpod_ms12-068.nasl |
2012-10-10 | Name : Microsoft Windows Kerberos Denial of Service Vulnerability (2743555) File : nvt/secpod_ms12-069.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
2012-08-15 | Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731... File : nvt/secpod_ms12-055.nasl |
2012-08-15 | Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities... File : nvt/secpod_ms12-054.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8) File : nvt/deb_2508_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2501-1 (xen) File : nvt/deb_2501_1.nasl |
2012-08-10 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD16.nasl |
2012-08-06 | Name : Fedora Update for xen FEDORA-2012-11190 File : nvt/gb_fedora_2012_11190_xen_fc16.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0122 | Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063) Severity: Category II - VMSKEY: V0060961 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0088 | Microsoft Windows Task Scheduler Privilege Escalation Vulnerability (MS15-037) Severity: Category II - VMSKEY: V0059891 |
2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
2014-A-0005 | Microsoft Windows Kernel-Mode Drivers Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0043403 |
2013-A-0232 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity: Category I - VMSKEY: V0042582 |
2013-B-0127 | Microsoft Windows Ancillary Function Driver Information Disclosure Vulnerability Severity: Category II - VMSKEY: V0042302 |
2013-A-0190 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity: Category I - VMSKEY: V0040763 |
2013-A-0189 | Microsoft Windows Common Control Library Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0040760 |
2013-B-0100 | Microsoft Active Directory Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040303 |
2013-B-0103 | Microsoft Windows Service Control Manager Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0040300 |
2013-A-0161 | Microsoft ICMPv6 Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040035 |
2013-A-0163 | Microsoft Windows Remote Procedure Call (RPC) Elevation of Privilege Vulnerab... Severity: Category I - VMSKEY: V0040034 |
2013-B-0071 | Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight Severity: Category II - VMSKEY: V0039211 |
2013-A-0134 | Microsoft DirectShow Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0039200 |
2013-A-0135 | Microsoft GDI+ Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0039199 |
2013-A-0080 | Microsoft Windows Kernel Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0037609 |
2013-A-0041 | Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Privilege Escalati... Severity: Category II - VMSKEY: V0036821 |
2013-B-0003 | Microsoft Windows Security Bypass Vulnerability Severity: Category I - VMSKEY: V0036450 |
2012-A-0196 | Microsoft Windows File Handling Component Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0035488 |
2012-A-0185 | Multiple Vulnerabilities in Microsoft Windows Shell Severity: Category I - VMSKEY: V0034956 |
2012-B-0103 | Microsoft Kerberos Denial Of Service Vulnerability Severity: Category I - VMSKEY: V0034180 |
2012-A-0137 | Multiple Vulnerabilities in Microsoft Windows Networking Components Severity: Category I - VMSKEY: V0033657 |
2012-A-0092 | Microsoft Remote Desktop Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0032826 |
2012-B-0052 | Microsoft Windows Partition Manager Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0032311 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-07-18 | Directshow GIF logical height overflow attempt RuleID : 50454 - Type : FILE-IMAGE - Revision : 1 |
2019-07-18 | Directshow GIF logical width overflow attempt RuleID : 50453 - Type : FILE-IMAGE - Revision : 1 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41465 - Type : FILE-EXECUTABLE - Revision : 2 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41464 - Type : FILE-EXECUTABLE - Revision : 2 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41463 - Type : FILE-EXECUTABLE - Revision : 2 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41462 - Type : FILE-EXECUTABLE - Revision : 2 |
2016-04-07 | Microsoft Windows ObReferenceObjectByHandle function privilege escalation att... RuleID : 38093 - Type : OS-WINDOWS - Revision : 2 |
2016-04-07 | Microsoft Windows ObReferenceObjectByHandle function privilege escalation att... RuleID : 38092 - Type : OS-WINDOWS - Revision : 2 |
2016-03-14 | Microsoft Office request for nwdblib.dll over SMB attempt RuleID : 37002 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Office request for elsext.dll over SMB attempt RuleID : 37001 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Office nwdblib.dll dll-load exploit attempt RuleID : 37000 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Office elsext.dll dll-load exploit attempt RuleID : 36999 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Windows Font Viewer cmap offset integer underflow attempt RuleID : 36953 - Type : FILE-OTHER - Revision : 4 |
2016-03-14 | Microsoft Windows Font Viewer cmap offset integer underflow attempt RuleID : 36952 - Type : FILE-OTHER - Revision : 4 |
2015-06-23 | Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt RuleID : 34499 - Type : OS-WINDOWS - Revision : 3 |
2015-06-23 | Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt RuleID : 34498 - Type : OS-WINDOWS - Revision : 3 |
2015-05-14 | Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att... RuleID : 34092 - Type : OS-WINDOWS - Revision : 2 |
2015-05-14 | Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att... RuleID : 34091 - Type : OS-WINDOWS - Revision : 2 |
2015-05-14 | Microsoft emf small header overwrite attempt RuleID : 34083 - Type : FILE-OTHER - Revision : 3 |
2015-05-14 | Microsoft emf small header overwrite attempt RuleID : 34082 - Type : FILE-OTHER - Revision : 3 |
2014-12-02 | Microsoft Windows Briefcase integer overflow RuleID : 32361 - Type : FILE-OTHER - Revision : 2 |
2014-06-07 | Microsoft Windows NtUserMessageCall implementation exploitation attempt RuleID : 30940 - Type : FILE-EXECUTABLE - Revision : 5 |
2014-06-07 | Microsoft Windows NtUserMessageCall implementation exploitation attempt RuleID : 30939 - Type : FILE-EXECUTABLE - Revision : 5 |
2014-06-05 | Microsoft Windows Briefcase integer underflow RuleID : 30898 - Type : FILE-OTHER - Revision : 3 |
2014-01-10 | Microsoft Windows Active Directory LDAP denial of service attempt RuleID : 27860 - Type : OS-WINDOWS - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-03-08 | Name: The remote Windows host is affected by an elevation of privilege vulnerability. File: smb_nt_ms16-031.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-132.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-130.nasl - Type: ACT_GATHER_INFO |
2015-06-09 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-063.nasl - Type: ACT_GATHER_INFO |
2015-05-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO |
2015-04-15 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-037.nasl - Type: ACT_GATHER_INFO |
2015-04-14 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-035.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by multiple privilege escalation vulnerab... File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO |
2014-11-26 | Name: The remote OracleVM host is missing one or more security updates. File: oraclevm_OVMSA-2012-0020.nasl - Type: ACT_GATHER_INFO |
2014-11-26 | Name: The remote OracleVM host is missing one or more security updates. File: oraclevm_OVMSA-2012-0022.nasl - Type: ACT_GATHER_INFO |
2014-11-26 | Name: The remote OracleVM host is missing one or more security updates. File: oraclevm_OVMSA-2012-0021.nasl - Type: ACT_GATHER_INFO |
2014-07-26 | Name: The remote Solaris system is missing a security patch from CPU oct2012. File: solaris_oct2012_SRU10_5.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2012-403.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2012-404.nasl - Type: ACT_GATHER_INFO |
2014-01-14 | Name: The Windows kernel on the remote host is affected by a privilege escalation v... File: smb_nt_ms14-003.nasl - Type: ACT_GATHER_INFO |
2013-12-11 | Name: The Windows kernel drivers on the remote host are affected by multiple vulner... File: smb_nt_ms13-101.nasl - Type: ACT_GATHER_INFO |
2013-11-13 | Name: The remote Windows host contains a driver that allows information disclosure. File: smb_nt_ms13-093.nasl - Type: ACT_GATHER_INFO |
2013-10-09 | Name: A library on the remote Windows host has an integer overflow vulnerability. File: smb_nt_ms13-083.nasl - Type: ACT_GATHER_INFO |
2013-10-09 | Name: The Windows kernel drivers on the remote host are affected by multiple vulner... File: smb_nt_ms13-081.nasl - Type: ACT_GATHER_INFO |
2013-09-28 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201309-24.nasl - Type: ACT_GATHER_INFO |
2013-09-11 | Name: The remote host is affected by an Active Directory denial of service vulnerab... File: smb_nt_ms13-079.nasl - Type: ACT_GATHER_INFO |
2013-09-11 | Name: The remote host is affected by a privilege escalation vulnerability. File: smb_nt_ms13-077.nasl - Type: ACT_GATHER_INFO |
2013-09-11 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-076.nasl - Type: ACT_GATHER_INFO |
2013-08-14 | Name: The Windows install on the remote host is affected by a privilege escalation ... File: smb_nt_ms13-062.nasl - Type: ACT_GATHER_INFO |
2013-08-14 | Name: The remote Windows host is affected by a denial of service vulnerability. File: smb_nt_ms13-065.nasl - Type: ACT_GATHER_INFO |