This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-02-14
Product Windows 7 Last view 2016-03-09
Version * Type Os
Update sp1  
Edition x64  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_7

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2016-03-09 CVE-2016-0087

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 do not properly validate handles, which allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."

9.3 2015-12-09 CVE-2015-6130

Integer underflow in Uniscribe in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows remote attackers to execute arbitrary code via a crafted font, aka "Windows Integer Underflow Vulnerability."

7.2 2015-12-09 CVE-2015-6128

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."

6.9 2015-06-09 CVE-2015-1758

Untrusted search path vulnerability in the LoadLibrary function in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a Trojan horse DLL in an unspecified directory, aka "Windows LoadLibrary EoP Vulnerability."

7.2 2015-04-21 CVE-2015-1701

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

9.3 2015-04-14 CVE-2015-1645

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability."

7.2 2015-04-14 CVE-2015-0098

Task Scheduler in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges by triggering application execution by an invalid task, aka "Task Scheduler Elevation of Privilege Vulnerability."

7.2 2015-03-11 CVE-2015-0075

The kernel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Impersonation Level Check Elevation of Privilege Vulnerability."

7.2 2014-01-15 CVE-2014-0262

win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Server 2008 R2 SP1 does not properly consider thread-owned objects during the processing of window handles, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."

7.2 2013-12-10 CVE-2013-3907

portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability."

7.2 2013-12-10 CVE-2013-3902

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."

4.9 2013-11-12 CVE-2013-3887

The Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows local users to obtain sensitive information from kernel memory by leveraging improper copy operations, aka "Ancillary Function Driver Information Disclosure Vulnerability."

9.3 2013-10-09 CVE-2013-3894

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability."

7.2 2013-10-09 CVE-2013-3888

dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."

7.2 2013-10-09 CVE-2013-3881

win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability."

7.2 2013-10-09 CVE-2013-3879

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."

7.2 2013-10-09 CVE-2013-3200

The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."

10 2013-10-09 CVE-2013-3195

The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability."

9.3 2013-10-09 CVE-2013-3128

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."

5 2013-09-11 CVE-2013-3868

Microsoft Active Directory Lightweight Directory Service (AD LDS) on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 8 and Active Directory Services on Windows Server 2008 SP2 and R2 SP1 and Server 2012 allow remote attackers to cause a denial of service (LDAP directory-service outage) via a crafted LDAP query, aka "Remote Anonymous DoS Vulnerability."

7.2 2013-09-11 CVE-2013-3866

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2013-09-11 CVE-2013-3865

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3864.

7.2 2013-09-11 CVE-2013-3864

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3865.

6.9 2013-09-11 CVE-2013-3862

Double free vulnerability in Microsoft Windows 7 and Server 2008 R2 SP1 allows local users to gain privileges via a crafted service description that is not properly handled by services.exe in the Service Control Manager (SCM), aka "Service Control Manager Double Free Vulnerability."

7.2 2013-09-11 CVE-2013-1344

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-3864, and CVE-2013-3865.

CWE : Common Weakness Enumeration

%idName
35% (35) CWE-362 Race Condition
15% (15) CWE-264 Permissions, Privileges, and Access Controls
14% (14) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
13% (13) CWE-20 Improper Input Validation
9% (9) CWE-94 Failure to Control Generation of Code ('Code Injection')
8% (8) CWE-399 Resource Management Errors
4% (4) CWE-189 Numeric Errors
1% (1) CWE-200 Information Exposure
1% (1) CWE-134 Uncontrolled Format String

ExploitDB Exploits

id Description
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
31576 Windows TrackPopupMenuEx Win32k NULL Page
27050 DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056)

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-07-09 Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671...
File : nvt/secpod_ms12-020_remote.nasl
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-12-12 Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability...
File : nvt/secpod_ms12-081.nasl
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-11-14 Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
File : nvt/secpod_ms12-072.nasl
2012-10-10 Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
File : nvt/secpod_ms12-068.nasl
2012-10-10 Name : Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
File : nvt/secpod_ms12-069.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-24 Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-15 Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731...
File : nvt/secpod_ms12-055.nasl
2012-08-15 Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities...
File : nvt/secpod_ms12-054.nasl
2012-08-10 Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8)
File : nvt/deb_2508_1.nasl
2012-08-10 Name : Debian Security Advisory DSA 2501-1 (xen)
File : nvt/deb_2501_1.nasl
2012-08-10 Name : FreeBSD Ports: FreeBSD
File : nvt/freebsd_FreeBSD16.nasl
2012-08-06 Name : Fedora Update for xen FEDORA-2012-11190
File : nvt/gb_fedora_2012_11190_xen_fc16.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0122 Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
Severity: Category II - VMSKEY: V0060961
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0088 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability (MS15-037)
Severity: Category II - VMSKEY: V0059891
2015-A-0048 Multiple Vulnerabilities in Windows Kernel (MS15-025)
Severity: Category II - VMSKEY: V0058995
2014-A-0005 Microsoft Windows Kernel-Mode Drivers Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0043403
2013-A-0232 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0042582
2013-B-0127 Microsoft Windows Ancillary Function Driver Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0042302
2013-A-0190 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0040763
2013-A-0189 Microsoft Windows Common Control Library Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0040760
2013-A-0187 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0040753
2013-B-0100 Microsoft Active Directory Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040303
2013-B-0103 Microsoft Windows Service Control Manager Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0040300
2013-A-0161 Microsoft ICMPv6 Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040035
2013-A-0163 Microsoft Windows Remote Procedure Call (RPC) Elevation of Privilege Vulnerab...
Severity: Category I - VMSKEY: V0040034
2013-B-0071 Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity: Category II - VMSKEY: V0039211
2013-A-0134 Microsoft DirectShow Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039200
2013-A-0135 Microsoft GDI+ Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039199
2013-A-0080 Microsoft Windows Kernel Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0037609
2013-A-0041 Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Privilege Escalati...
Severity: Category II - VMSKEY: V0036821
2013-B-0003 Microsoft Windows Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0036450
2012-A-0196 Microsoft Windows File Handling Component Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0035488
2012-A-0185 Multiple Vulnerabilities in Microsoft Windows Shell
Severity: Category I - VMSKEY: V0034956
2012-B-0103 Microsoft Kerberos Denial Of Service Vulnerability
Severity: Category I - VMSKEY: V0034180
2012-A-0137 Multiple Vulnerabilities in Microsoft Windows Networking Components
Severity: Category I - VMSKEY: V0033657
2012-A-0092 Microsoft Remote Desktop Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0032826

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-07-18 Directshow GIF logical height overflow attempt
RuleID : 50454 - Type : FILE-IMAGE - Revision : 1
2019-07-18 Directshow GIF logical width overflow attempt
RuleID : 50453 - Type : FILE-IMAGE - Revision : 1
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41465 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41464 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41463 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41462 - Type : FILE-EXECUTABLE - Revision : 2
2016-04-07 Microsoft Windows ObReferenceObjectByHandle function privilege escalation att...
RuleID : 38093 - Type : OS-WINDOWS - Revision : 2
2016-04-07 Microsoft Windows ObReferenceObjectByHandle function privilege escalation att...
RuleID : 38092 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Office request for nwdblib.dll over SMB attempt
RuleID : 37002 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Office request for elsext.dll over SMB attempt
RuleID : 37001 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Office nwdblib.dll dll-load exploit attempt
RuleID : 37000 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Office elsext.dll dll-load exploit attempt
RuleID : 36999 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Windows Font Viewer cmap offset integer underflow attempt
RuleID : 36953 - Type : FILE-OTHER - Revision : 4
2016-03-14 Microsoft Windows Font Viewer cmap offset integer underflow attempt
RuleID : 36952 - Type : FILE-OTHER - Revision : 4
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34499 - Type : OS-WINDOWS - Revision : 3
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34498 - Type : OS-WINDOWS - Revision : 3
2015-05-14 Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att...
RuleID : 34092 - Type : OS-WINDOWS - Revision : 2
2015-05-14 Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att...
RuleID : 34091 - Type : OS-WINDOWS - Revision : 2
2015-05-14 Microsoft emf small header overwrite attempt
RuleID : 34083 - Type : FILE-OTHER - Revision : 3
2015-05-14 Microsoft emf small header overwrite attempt
RuleID : 34082 - Type : FILE-OTHER - Revision : 3
2014-12-02 Microsoft Windows Briefcase integer overflow
RuleID : 32361 - Type : FILE-OTHER - Revision : 2
2014-06-07 Microsoft Windows NtUserMessageCall implementation exploitation attempt
RuleID : 30940 - Type : FILE-EXECUTABLE - Revision : 5
2014-06-07 Microsoft Windows NtUserMessageCall implementation exploitation attempt
RuleID : 30939 - Type : FILE-EXECUTABLE - Revision : 5
2014-06-05 Microsoft Windows Briefcase integer underflow
RuleID : 30898 - Type : FILE-OTHER - Revision : 3
2014-04-24 ATMFD Adobe font driver reserved command denial of service attempt
RuleID : 30241 - Type : FILE-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2016-03-08 Name: The remote Windows host is affected by an elevation of privilege vulnerability.
File: smb_nt_ms16-031.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-132.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-130.nasl - Type: ACT_GATHER_INFO
2015-06-09 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-063.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO
2015-04-15 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-037.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-035.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by multiple privilege escalation vulnerab...
File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO
2014-11-26 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2012-0022.nasl - Type: ACT_GATHER_INFO
2014-11-26 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2012-0021.nasl - Type: ACT_GATHER_INFO
2014-11-26 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2012-0020.nasl - Type: ACT_GATHER_INFO
2014-07-26 Name: The remote Solaris system is missing a security patch from CPU oct2012.
File: solaris_oct2012_SRU10_5.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2012-403.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2012-404.nasl - Type: ACT_GATHER_INFO
2014-01-14 Name: The Windows kernel on the remote host is affected by a privilege escalation v...
File: smb_nt_ms14-003.nasl - Type: ACT_GATHER_INFO
2013-12-11 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-101.nasl - Type: ACT_GATHER_INFO
2013-11-13 Name: The remote Windows host contains a driver that allows information disclosure.
File: smb_nt_ms13-093.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: A library on the remote Windows host has an integer overflow vulnerability.
File: smb_nt_ms13-083.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms13-082.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-081.nasl - Type: ACT_GATHER_INFO
2013-09-28 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201309-24.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The remote host is affected by an Active Directory denial of service vulnerab...
File: smb_nt_ms13-079.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The remote host is affected by a privilege escalation vulnerability.
File: smb_nt_ms13-077.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-076.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The Windows install on the remote host is affected by a privilege escalation ...
File: smb_nt_ms13-062.nasl - Type: ACT_GATHER_INFO