Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2011-12-30 |
Product | Windows 7 | Last view | 2016-03-09 |
Version | * | Type | Os |
Update | sp1 | ||
Edition | x86 | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_7 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2016-03-09 | CVE-2016-0087 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 do not properly validate handles, which allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6130 | Integer underflow in Uniscribe in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows remote attackers to execute arbitrary code via a crafted font, aka "Windows Integer Underflow Vulnerability." |
7.2 | 2015-12-09 | CVE-2015-6128 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability." |
6.9 | 2015-06-09 | CVE-2015-1758 | Untrusted search path vulnerability in the LoadLibrary function in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a Trojan horse DLL in an unspecified directory, aka "Windows LoadLibrary EoP Vulnerability." |
7.2 | 2015-04-21 | CVE-2015-1701 | Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability." |
9.3 | 2015-04-14 | CVE-2015-1645 | Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability." |
7.2 | 2015-04-14 | CVE-2015-0098 | Task Scheduler in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges by triggering application execution by an invalid task, aka "Task Scheduler Elevation of Privilege Vulnerability." |
7.2 | 2015-03-11 | CVE-2015-0075 | The kernel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Impersonation Level Check Elevation of Privilege Vulnerability." |
7.2 | 2014-01-15 | CVE-2014-0262 | win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Server 2008 R2 SP1 does not properly consider thread-owned objects during the processing of window handles, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability." |
7.2 | 2013-12-10 | CVE-2013-3907 | portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability." |
7.2 | 2013-12-10 | CVE-2013-3902 | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." |
9.3 | 2013-10-09 | CVE-2013-3894 | The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3888 | dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3881 | win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3879 | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." |
7.2 | 2013-10-09 | CVE-2013-3200 | The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability." |
10 | 2013-10-09 | CVE-2013-3195 | The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability." |
5 | 2013-09-11 | CVE-2013-3868 | Microsoft Active Directory Lightweight Directory Service (AD LDS) on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 8 and Active Directory Services on Windows Server 2008 SP2 and R2 SP1 and Server 2012 allow remote attackers to cause a denial of service (LDAP directory-service outage) via a crafted LDAP query, aka "Remote Anonymous DoS Vulnerability." |
7.2 | 2013-09-11 | CVE-2013-3866 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." |
7.2 | 2013-09-11 | CVE-2013-3865 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3864. |
7.2 | 2013-09-11 | CVE-2013-3864 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3865. |
6.9 | 2013-09-11 | CVE-2013-3862 | Double free vulnerability in Microsoft Windows 7 and Server 2008 R2 SP1 allows local users to gain privileges via a crafted service description that is not properly handled by services.exe in the Service Control Manager (SCM), aka "Service Control Manager Double Free Vulnerability." |
7.2 | 2013-09-11 | CVE-2013-1344 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-3864, and CVE-2013-3865. |
7.2 | 2013-09-11 | CVE-2013-1343 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865. |
7.2 | 2013-09-11 | CVE-2013-1342 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1343, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
34% (35) | CWE-362 | Race Condition |
14% (15) | CWE-264 | Permissions, Privileges, and Access Controls |
14% (15) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12% (13) | CWE-20 | Improper Input Validation |
8% (9) | CWE-399 | Resource Management Errors |
8% (9) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
3% (4) | CWE-189 | Numeric Errors |
0% (1) | CWE-134 | Uncontrolled Format String |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
77908 | Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote M... |
ExploitDB Exploits
id | Description |
---|---|
33213 | Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei) |
31576 | Windows TrackPopupMenuEx Win32k NULL Page |
27050 | DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056) |
26554 | Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation |
24485 | MS13-005 HWND_BROADCAST PoC |
OpenVAS Exploits
id | Description |
---|---|
2013-07-09 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671... File : nvt/secpod_ms12-020_remote.nasl |
2012-12-12 | Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability... File : nvt/secpod_ms12-081.nasl |
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
2012-11-14 | Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528) File : nvt/secpod_ms12-072.nasl |
2012-10-10 | Name : Microsoft Windows Kerberos Denial of Service Vulnerability (2743555) File : nvt/secpod_ms12-069.nasl |
2012-10-10 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197) File : nvt/secpod_ms12-068.nasl |
2012-08-15 | Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731... File : nvt/secpod_ms12-055.nasl |
2012-08-15 | Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities... File : nvt/secpod_ms12-054.nasl |
2012-07-11 | Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (27... File : nvt/secpod_ms12-047.nasl |
2012-06-13 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939) File : nvt/secpod_ms12-036.nasl |
2012-05-09 | Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268... File : nvt/secpod_ms12-034.nasl |
2012-05-09 | Name : Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338) File : nvt/secpod_ms12-032.nasl |
2012-04-11 | Name : Windows Authenticode Signature Remote Code Execution Vulnerability (2653956) File : nvt/secpod_ms12-024.nasl |
2012-03-14 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671... File : nvt/secpod_ms12-020.nasl |
2012-03-14 | Name : Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364) File : nvt/secpod_ms12-019.nasl |
2012-03-14 | Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2641653) File : nvt/secpod_ms12-018.nasl |
2012-02-15 | Name : MS Windows C Run-Time Library Remote Code Execution Vulnerability (2654428) File : nvt/secpod_ms12-013.nasl |
2012-02-15 | Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2660465) File : nvt/secpod_ms12-008.nasl |
0000-00-00 | Name : Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability File : nvt/gb_ms_win_kernel_win32k_sys_mem_corruption_vuln.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0122 | Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063) Severity: Category II - VMSKEY: V0060961 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0088 | Microsoft Windows Task Scheduler Privilege Escalation Vulnerability (MS15-037) Severity: Category II - VMSKEY: V0059891 |
2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
2014-A-0005 | Microsoft Windows Kernel-Mode Drivers Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0043403 |
2013-A-0232 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity: Category I - VMSKEY: V0042582 |
2013-A-0190 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers Severity: Category I - VMSKEY: V0040763 |
2013-A-0189 | Microsoft Windows Common Control Library Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0040760 |
2013-B-0100 | Microsoft Active Directory Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040303 |
2013-B-0103 | Microsoft Windows Service Control Manager Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0040300 |
2013-A-0161 | Microsoft ICMPv6 Denial of Service Vulnerability Severity: Category I - VMSKEY: V0040035 |
2013-A-0163 | Microsoft Windows Remote Procedure Call (RPC) Elevation of Privilege Vulnerab... Severity: Category I - VMSKEY: V0040034 |
2013-B-0071 | Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight Severity: Category II - VMSKEY: V0039211 |
2013-A-0134 | Microsoft DirectShow Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0039200 |
2013-A-0135 | Microsoft GDI+ Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0039199 |
2013-A-0080 | Microsoft Windows Kernel Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0037609 |
2013-A-0041 | Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Privilege Escalati... Severity: Category II - VMSKEY: V0036821 |
2013-B-0003 | Microsoft Windows Security Bypass Vulnerability Severity: Category I - VMSKEY: V0036450 |
2012-A-0196 | Microsoft Windows File Handling Component Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0035488 |
2012-A-0185 | Multiple Vulnerabilities in Microsoft Windows Shell Severity: Category I - VMSKEY: V0034956 |
2012-B-0103 | Microsoft Kerberos Denial Of Service Vulnerability Severity: Category I - VMSKEY: V0034180 |
2012-A-0137 | Multiple Vulnerabilities in Microsoft Windows Networking Components Severity: Category I - VMSKEY: V0033657 |
2012-A-0092 | Microsoft Remote Desktop Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0032826 |
2012-A-0060 | Microsoft Windows Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0031983 |
2012-A-0039 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol Severity: Category I - VMSKEY: V0031885 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-07-18 | Directshow GIF logical height overflow attempt RuleID : 50454 - Type : FILE-IMAGE - Revision : 1 |
2019-07-18 | Directshow GIF logical width overflow attempt RuleID : 50453 - Type : FILE-IMAGE - Revision : 1 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41465 - Type : FILE-EXECUTABLE - Revision : 2 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41464 - Type : FILE-EXECUTABLE - Revision : 2 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41463 - Type : FILE-EXECUTABLE - Revision : 2 |
2017-03-01 | Microsoft Windows Win32 Divide Error Exception Denial of Service attempt RuleID : 41462 - Type : FILE-EXECUTABLE - Revision : 2 |
2016-04-07 | Microsoft Windows ObReferenceObjectByHandle function privilege escalation att... RuleID : 38093 - Type : OS-WINDOWS - Revision : 2 |
2016-04-07 | Microsoft Windows ObReferenceObjectByHandle function privilege escalation att... RuleID : 38092 - Type : OS-WINDOWS - Revision : 2 |
2016-03-14 | Microsoft Office request for nwdblib.dll over SMB attempt RuleID : 37002 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Office request for elsext.dll over SMB attempt RuleID : 37001 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Office nwdblib.dll dll-load exploit attempt RuleID : 37000 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Office elsext.dll dll-load exploit attempt RuleID : 36999 - Type : FILE-OFFICE - Revision : 3 |
2016-03-14 | Microsoft Windows Font Viewer cmap offset integer underflow attempt RuleID : 36953 - Type : FILE-OTHER - Revision : 4 |
2016-03-14 | Microsoft Windows Font Viewer cmap offset integer underflow attempt RuleID : 36952 - Type : FILE-OTHER - Revision : 4 |
2016-03-14 | Microsoft Windows FlattenPath paged memory consumption privilege escalation a... RuleID : 36384 - Type : OS-WINDOWS - Revision : 3 |
2016-03-14 | Microsoft Windows FlattenPath paged memory consumption privilege escalation a... RuleID : 36383 - Type : OS-WINDOWS - Revision : 3 |
2015-06-23 | Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt RuleID : 34499 - Type : OS-WINDOWS - Revision : 3 |
2015-06-23 | Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt RuleID : 34498 - Type : OS-WINDOWS - Revision : 3 |
2015-05-14 | Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att... RuleID : 34092 - Type : OS-WINDOWS - Revision : 2 |
2015-05-14 | Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att... RuleID : 34091 - Type : OS-WINDOWS - Revision : 2 |
2015-05-14 | Microsoft emf small header overwrite attempt RuleID : 34083 - Type : FILE-OTHER - Revision : 3 |
2015-05-14 | Microsoft emf small header overwrite attempt RuleID : 34082 - Type : FILE-OTHER - Revision : 3 |
2014-12-02 | Microsoft Windows Briefcase integer overflow RuleID : 32361 - Type : FILE-OTHER - Revision : 2 |
2014-11-16 | Microsoft Windows C Run-Time Library remote code execution attempt RuleID : 31427 - Type : FILE-OTHER - Revision : 3 |
2014-06-07 | Microsoft Windows NtUserMessageCall implementation exploitation attempt RuleID : 30940 - Type : FILE-EXECUTABLE - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-03-08 | Name: The remote Windows host is affected by an elevation of privilege vulnerability. File: smb_nt_ms16-031.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-132.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-130.nasl - Type: ACT_GATHER_INFO |
2015-06-09 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-063.nasl - Type: ACT_GATHER_INFO |
2015-05-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO |
2015-04-15 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-037.nasl - Type: ACT_GATHER_INFO |
2015-04-14 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-035.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by multiple privilege escalation vulnerab... File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO |
2014-01-14 | Name: The Windows kernel on the remote host is affected by a privilege escalation v... File: smb_nt_ms14-003.nasl - Type: ACT_GATHER_INFO |
2013-12-11 | Name: The Windows kernel drivers on the remote host are affected by multiple vulner... File: smb_nt_ms13-101.nasl - Type: ACT_GATHER_INFO |
2013-10-09 | Name: The Windows kernel drivers on the remote host are affected by multiple vulner... File: smb_nt_ms13-081.nasl - Type: ACT_GATHER_INFO |
2013-10-09 | Name: A library on the remote Windows host has an integer overflow vulnerability. File: smb_nt_ms13-083.nasl - Type: ACT_GATHER_INFO |
2013-09-11 | Name: The remote host is affected by an Active Directory denial of service vulnerab... File: smb_nt_ms13-079.nasl - Type: ACT_GATHER_INFO |
2013-09-11 | Name: The remote host is affected by a privilege escalation vulnerability. File: smb_nt_ms13-077.nasl - Type: ACT_GATHER_INFO |
2013-09-11 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-076.nasl - Type: ACT_GATHER_INFO |
2013-08-14 | Name: The remote Windows host is affected by a denial of service vulnerability. File: smb_nt_ms13-065.nasl - Type: ACT_GATHER_INFO |
2013-08-14 | Name: The Windows install on the remote host is affected by a privilege escalation ... File: smb_nt_ms13-062.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The remote Windows host is potentially affected by a remote code execution vu... File: smb_nt_ms13-056.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The remote Windows host has a remote code execution vulnerability. File: smb_nt_ms13-054.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-053.nasl - Type: ACT_GATHER_INFO |
2013-07-10 | Name: The .NET Framework install on the remote Windows host could allow arbitrary c... File: smb_nt_ms13-052.nasl - Type: ACT_GATHER_INFO |
2013-05-15 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-046.nasl - Type: ACT_GATHER_INFO |
2013-04-10 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-031.nasl - Type: ACT_GATHER_INFO |
2013-04-10 | Name: The Windows kernel on the remote host is affected by multiple vulnerabilities. File: smb_nt_ms13-036.nasl - Type: ACT_GATHER_INFO |
2013-02-12 | Name: The remote Windows host has a privilege escalation vulnerability. File: smb_nt_ms13-019.nasl - Type: ACT_GATHER_INFO |