This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2011-12-30
Product Windows 7 Last view 2016-03-09
Version * Type Os
Update sp1  
Edition x86  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_7

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2016-03-09 CVE-2016-0087

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 do not properly validate handles, which allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."

9.3 2015-12-09 CVE-2015-6130

Integer underflow in Uniscribe in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows remote attackers to execute arbitrary code via a crafted font, aka "Windows Integer Underflow Vulnerability."

7.2 2015-12-09 CVE-2015-6128

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."

6.9 2015-06-09 CVE-2015-1758

Untrusted search path vulnerability in the LoadLibrary function in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a Trojan horse DLL in an unspecified directory, aka "Windows LoadLibrary EoP Vulnerability."

7.2 2015-04-21 CVE-2015-1701

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

9.3 2015-04-14 CVE-2015-1645

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability."

7.2 2015-04-14 CVE-2015-0098

Task Scheduler in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges by triggering application execution by an invalid task, aka "Task Scheduler Elevation of Privilege Vulnerability."

7.2 2015-03-11 CVE-2015-0075

The kernel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Impersonation Level Check Elevation of Privilege Vulnerability."

7.2 2014-01-15 CVE-2014-0262

win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Server 2008 R2 SP1 does not properly consider thread-owned objects during the processing of window handles, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."

7.2 2013-12-10 CVE-2013-3907

portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability."

7.2 2013-12-10 CVE-2013-3902

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."

9.3 2013-10-09 CVE-2013-3894

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability."

7.2 2013-10-09 CVE-2013-3888

dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."

7.2 2013-10-09 CVE-2013-3881

win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability."

7.2 2013-10-09 CVE-2013-3879

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."

7.2 2013-10-09 CVE-2013-3200

The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."

10 2013-10-09 CVE-2013-3195

The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability."

9.3 2013-10-09 CVE-2013-3128

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."

5 2013-09-11 CVE-2013-3868

Microsoft Active Directory Lightweight Directory Service (AD LDS) on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 8 and Active Directory Services on Windows Server 2008 SP2 and R2 SP1 and Server 2012 allow remote attackers to cause a denial of service (LDAP directory-service outage) via a crafted LDAP query, aka "Remote Anonymous DoS Vulnerability."

7.2 2013-09-11 CVE-2013-3866

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2013-09-11 CVE-2013-3865

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3864.

7.2 2013-09-11 CVE-2013-3864

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3865.

6.9 2013-09-11 CVE-2013-3862

Double free vulnerability in Microsoft Windows 7 and Server 2008 R2 SP1 allows local users to gain privileges via a crafted service description that is not properly handled by services.exe in the Service Control Manager (SCM), aka "Service Control Manager Double Free Vulnerability."

7.2 2013-09-11 CVE-2013-1344

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-3864, and CVE-2013-3865.

7.2 2013-09-11 CVE-2013-1343

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865.

CWE : Common Weakness Enumeration

%idName
34% (35) CWE-362 Race Condition
14% (15) CWE-264 Permissions, Privileges, and Access Controls
14% (15) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
13% (14) CWE-20 Improper Input Validation
8% (9) CWE-399 Resource Management Errors
8% (9) CWE-94 Failure to Control Generation of Code ('Code Injection')
3% (4) CWE-189 Numeric Errors
0% (1) CWE-134 Uncontrolled Format String

Open Source Vulnerability Database (OSVDB)

id Description
77908 Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote M...

ExploitDB Exploits

id Description
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
31576 Windows TrackPopupMenuEx Win32k NULL Page
27050 DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056)
26554 Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
24485 MS13-005 HWND_BROADCAST PoC

OpenVAS Exploits

id Description
2013-07-09 Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671...
File : nvt/secpod_ms12-020_remote.nasl
2012-12-12 Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability...
File : nvt/secpod_ms12-081.nasl
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-11-14 Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
File : nvt/secpod_ms12-072.nasl
2012-10-10 Name : Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
File : nvt/secpod_ms12-069.nasl
2012-10-10 Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
File : nvt/secpod_ms12-068.nasl
2012-08-15 Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731...
File : nvt/secpod_ms12-055.nasl
2012-08-15 Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities...
File : nvt/secpod_ms12-054.nasl
2012-07-11 Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (27...
File : nvt/secpod_ms12-047.nasl
2012-06-13 Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
File : nvt/secpod_ms12-036.nasl
2012-05-09 Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268...
File : nvt/secpod_ms12-034.nasl
2012-05-09 Name : Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
File : nvt/secpod_ms12-032.nasl
2012-04-11 Name : Windows Authenticode Signature Remote Code Execution Vulnerability (2653956)
File : nvt/secpod_ms12-024.nasl
2012-03-14 Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671...
File : nvt/secpod_ms12-020.nasl
2012-03-14 Name : Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
File : nvt/secpod_ms12-019.nasl
2012-03-14 Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2641653)
File : nvt/secpod_ms12-018.nasl
2012-02-15 Name : MS Windows C Run-Time Library Remote Code Execution Vulnerability (2654428)
File : nvt/secpod_ms12-013.nasl
2012-02-15 Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2660465)
File : nvt/secpod_ms12-008.nasl
0000-00-00 Name : Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
File : nvt/gb_ms_win_kernel_win32k_sys_mem_corruption_vuln.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0122 Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
Severity: Category II - VMSKEY: V0060961
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0088 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability (MS15-037)
Severity: Category II - VMSKEY: V0059891
2015-A-0048 Multiple Vulnerabilities in Windows Kernel (MS15-025)
Severity: Category II - VMSKEY: V0058995
2014-A-0005 Microsoft Windows Kernel-Mode Drivers Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0043403
2013-A-0232 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0042582
2013-A-0190 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0040763
2013-A-0189 Microsoft Windows Common Control Library Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0040760
2013-A-0187 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0040753
2013-B-0100 Microsoft Active Directory Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040303
2013-B-0103 Microsoft Windows Service Control Manager Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0040300
2013-A-0161 Microsoft ICMPv6 Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040035
2013-A-0163 Microsoft Windows Remote Procedure Call (RPC) Elevation of Privilege Vulnerab...
Severity: Category I - VMSKEY: V0040034
2013-B-0071 Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity: Category II - VMSKEY: V0039211
2013-A-0134 Microsoft DirectShow Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039200
2013-A-0135 Microsoft GDI+ Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039199
2013-A-0080 Microsoft Windows Kernel Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0037609
2013-A-0041 Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Privilege Escalati...
Severity: Category II - VMSKEY: V0036821
2013-B-0003 Microsoft Windows Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0036450
2012-A-0196 Microsoft Windows File Handling Component Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0035488
2012-A-0185 Multiple Vulnerabilities in Microsoft Windows Shell
Severity: Category I - VMSKEY: V0034956
2012-B-0103 Microsoft Kerberos Denial Of Service Vulnerability
Severity: Category I - VMSKEY: V0034180
2012-A-0137 Multiple Vulnerabilities in Microsoft Windows Networking Components
Severity: Category I - VMSKEY: V0033657
2012-A-0092 Microsoft Remote Desktop Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0032826
2012-A-0060 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031983

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-07-18 Directshow GIF logical height overflow attempt
RuleID : 50454 - Type : FILE-IMAGE - Revision : 1
2019-07-18 Directshow GIF logical width overflow attempt
RuleID : 50453 - Type : FILE-IMAGE - Revision : 1
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41465 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41464 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41463 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41462 - Type : FILE-EXECUTABLE - Revision : 2
2016-04-07 Microsoft Windows ObReferenceObjectByHandle function privilege escalation att...
RuleID : 38093 - Type : OS-WINDOWS - Revision : 2
2016-04-07 Microsoft Windows ObReferenceObjectByHandle function privilege escalation att...
RuleID : 38092 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Office request for nwdblib.dll over SMB attempt
RuleID : 37002 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Office request for elsext.dll over SMB attempt
RuleID : 37001 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Office nwdblib.dll dll-load exploit attempt
RuleID : 37000 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Office elsext.dll dll-load exploit attempt
RuleID : 36999 - Type : FILE-OFFICE - Revision : 3
2016-03-14 Microsoft Windows Font Viewer cmap offset integer underflow attempt
RuleID : 36953 - Type : FILE-OTHER - Revision : 4
2016-03-14 Microsoft Windows Font Viewer cmap offset integer underflow attempt
RuleID : 36952 - Type : FILE-OTHER - Revision : 4
2016-03-14 Microsoft Windows FlattenPath paged memory consumption privilege escalation a...
RuleID : 36384 - Type : OS-WINDOWS - Revision : 3
2016-03-14 Microsoft Windows FlattenPath paged memory consumption privilege escalation a...
RuleID : 36383 - Type : OS-WINDOWS - Revision : 3
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34499 - Type : OS-WINDOWS - Revision : 3
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34498 - Type : OS-WINDOWS - Revision : 3
2015-05-14 Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att...
RuleID : 34092 - Type : OS-WINDOWS - Revision : 2
2015-05-14 Microsoft Windows Defender misconfiguration MpCmdRun.exe system execution att...
RuleID : 34091 - Type : OS-WINDOWS - Revision : 2
2015-05-14 Microsoft emf small header overwrite attempt
RuleID : 34083 - Type : FILE-OTHER - Revision : 3
2015-05-14 Microsoft emf small header overwrite attempt
RuleID : 34082 - Type : FILE-OTHER - Revision : 3
2014-12-02 Microsoft Windows Briefcase integer overflow
RuleID : 32361 - Type : FILE-OTHER - Revision : 2
2014-11-16 Microsoft Windows C Run-Time Library remote code execution attempt
RuleID : 31427 - Type : FILE-OTHER - Revision : 3
2014-06-07 Microsoft Windows NtUserMessageCall implementation exploitation attempt
RuleID : 30940 - Type : FILE-EXECUTABLE - Revision : 5

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2016-03-08 Name: The remote Windows host is affected by an elevation of privilege vulnerability.
File: smb_nt_ms16-031.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-132.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-130.nasl - Type: ACT_GATHER_INFO
2015-06-09 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-063.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO
2015-04-15 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-037.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-035.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by multiple privilege escalation vulnerab...
File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO
2014-01-14 Name: The Windows kernel on the remote host is affected by a privilege escalation v...
File: smb_nt_ms14-003.nasl - Type: ACT_GATHER_INFO
2013-12-11 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-101.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms13-082.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-081.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: A library on the remote Windows host has an integer overflow vulnerability.
File: smb_nt_ms13-083.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The remote host is affected by an Active Directory denial of service vulnerab...
File: smb_nt_ms13-079.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The remote host is affected by a privilege escalation vulnerability.
File: smb_nt_ms13-077.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-076.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms13-065.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The Windows install on the remote host is affected by a privilege escalation ...
File: smb_nt_ms13-062.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The remote Windows host is potentially affected by a remote code execution vu...
File: smb_nt_ms13-056.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The remote Windows host has a remote code execution vulnerability.
File: smb_nt_ms13-054.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-053.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms13-052.nasl - Type: ACT_GATHER_INFO
2013-05-15 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-046.nasl - Type: ACT_GATHER_INFO
2013-04-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-031.nasl - Type: ACT_GATHER_INFO
2013-04-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-036.nasl - Type: ACT_GATHER_INFO