Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2011-04-13 |
Product | Windows 7 | Last view | 2021-01-12 |
Version | - | Type | Os |
Update | sp1 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_7 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2021-01-12 | CVE-2021-1657 | Windows Fax Compose Form Remote Code Execution Vulnerability |
7.8 | 2021-01-12 | CVE-2021-1655 | Windows CSC Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1659, CVE-2021-1688, CVE-2021-1693. |
7.8 | 2021-01-12 | CVE-2021-1654 | Windows CSC Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1652, CVE-2021-1653, CVE-2021-1655, CVE-2021-1659, CVE-2021-1688, CVE-2021-1693. |
7.8 | 2021-01-12 | CVE-2021-1653 | Windows CSC Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1652, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1688, CVE-2021-1693. |
7.8 | 2021-01-12 | CVE-2021-1652 | Windows CSC Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1688, CVE-2021-1693. |
7.8 | 2021-01-12 | CVE-2021-1649 | Active Template Library Elevation of Privilege Vulnerability |
6.5 | 2020-12-10 | CVE-2020-17140 | , aka 'Windows SMB Information Disclosure Vulnerability'. |
7.8 | 2020-12-10 | CVE-2020-16964 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963. |
7.8 | 2020-12-10 | CVE-2020-16963 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16964. |
7.8 | 2020-12-10 | CVE-2020-16962 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16963, CVE-2020-16964. |
7.8 | 2020-12-10 | CVE-2020-16961 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964. |
7.8 | 2020-12-10 | CVE-2020-16960 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964. |
7.8 | 2020-12-10 | CVE-2020-16959 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964. |
7.8 | 2020-12-10 | CVE-2020-16958 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964. |
7.8 | 2020-11-11 | CVE-2020-17088 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
7.8 | 2020-11-11 | CVE-2020-17087 | Windows Kernel Local Elevation of Privilege Vulnerability |
5.5 | 2020-11-11 | CVE-2020-17069 | Windows NDIS Information Disclosure Vulnerability |
7.8 | 2020-11-11 | CVE-2020-17068 | Windows GDI+ Remote Code Execution Vulnerability |
7.5 | 2020-11-11 | CVE-2020-17047 | Windows Network File System Denial of Service Vulnerability |
5.5 | 2020-11-11 | CVE-2020-17045 | Windows KernelStream Information Disclosure Vulnerability |
7.8 | 2020-11-11 | CVE-2020-17044 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. |
7.8 | 2020-11-11 | CVE-2020-17043 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. |
8.8 | 2020-11-11 | CVE-2020-17042 | Windows Print Spooler Remote Code Execution Vulnerability |
7.8 | 2020-11-11 | CVE-2020-17038 | Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. |
5.5 | 2020-11-11 | CVE-2020-17036 | Windows Function Discovery SSDP Provider Information Disclosure Vulnerability |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
25% (206) | CWE-200 | Information Exposure |
24% (202) | CWE-269 | Improper Privilege Management |
11% (93) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7% (63) | CWE-264 | Permissions, Privileges, and Access Controls |
6% (54) | CWE-20 | Improper Input Validation |
2% (23) | CWE-787 | Out-of-bounds Write |
2% (23) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (19) | CWE-404 | Improper Resource Shutdown or Release |
2% (17) | CWE-665 | Improper Initialization |
1% (14) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (11) | CWE-416 | Use After Free |
1% (11) | CWE-125 | Out-of-bounds Read |
1% (9) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
1% (9) | CWE-19 | Data Handling |
0% (5) | CWE-426 | Untrusted Search Path |
0% (5) | CWE-310 | Cryptographic Issues |
0% (4) | CWE-287 | Improper Authentication |
0% (4) | CWE-254 | Security Features |
0% (3) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (3) | CWE-476 | NULL Pointer Dereference |
0% (3) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
0% (3) | CWE-399 | Resource Management Errors |
0% (3) | CWE-190 | Integer Overflow or Wraparound |
0% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (2) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Automation Array command execution | More info here |
Windows RRAS Service Remote Code Execution Vulnerability | More info here |
Windows Media Center command execution | More info here |
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
71735 | Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Loc... |
ExploitDB Exploits
id | Description |
---|---|
35236 | MS14-064 Microsoft Windows OLE Package Manager Code Execution |
35235 | MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python |
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
35216 | MS Office 2007 and 2010 - OLE Arbitrary Command Execution |
35101 | Windows TrackPopupMenu Win32k NULL Pointer Dereference |
35055 | Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060) |
35020 | MS14-060 Microsoft Windows OLE Package Manager Code Execution |
35019 | Windows OLE Package Manager SandWorm Exploit |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
OpenVAS Exploits
id | Description |
---|---|
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
2012-12-12 | Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability... File : nvt/secpod_ms12-081.nasl |
2011-04-13 | Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223) File : nvt/secpod_ms11-034.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0216 | Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098) Severity: Category II - VMSKEY: V0061393 |
2015-A-0215 | Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102) Severity: Category II - VMSKEY: V0061391 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-B-0112 | Microsoft Media Center Remote Code Execution Vulnerability (MS15-100) Severity: Category II - VMSKEY: V0061373 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0193 | Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090) Severity: Category II - VMSKEY: V0061305 |
2015-A-0192 | Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085) Severity: Category I - VMSKEY: V0061303 |
2015-A-0190 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082) Severity: Category II - VMSKEY: V0061299 |
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-B-0096 | Microsoft WebDAV Information Disclosure Vulnerability (MS15-089) Severity: Category II - VMSKEY: V0061285 |
2015-A-0169 | Multiple Vulnerabilities in Microsoft OLE (MS15-075) Severity: Category II - VMSKEY: V0061103 |
2015-A-0165 | Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1... Severity: Category II - VMSKEY: V0061093 |
2015-A-0164 | Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074) Severity: Category II - VMSKEY: V0061095 |
2015-A-0162 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073) Severity: Category II - VMSKEY: V0061097 |
2015-A-0168 | Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072) Severity: Category II - VMSKEY: V0061105 |
2015-A-0167 | Multiple Vulnerabilities in Microsoft Windows (MS15-069) Severity: Category II - VMSKEY: V0061129 |
2015-A-0125 | Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS... Severity: Category II - VMSKEY: V0060943 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
2015-A-0092 | Microsoft Windows HTTP stack Remote Code Execution Vulnerability (MS15-034) Severity: Category I - VMSKEY: V0059899 |
2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
2015-B-0037 | Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-... Severity: Category II - VMSKEY: V0059023 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-01-12 | Microsoft Windows SMB2 SET_INFO information disclosure attempt RuleID : 56571 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Windows Network File System denial of service attempt RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56296 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56295 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56262 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56261 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56231 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56230 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows digital signature spoofing attempt RuleID : 55983 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows digital signature spoofing attempt RuleID : 55982 - Type : OS-WINDOWS - Revision : 1 |
2020-10-13 | Microsoft Windows NDIS.SYS driver buffer overflow attempt RuleID : 55198 - Type : OS-WINDOWS - Revision : 1 |
2020-10-13 | Microsoft Windows NDIS.SYS driver buffer overflow attempt RuleID : 55197 - Type : OS-WINDOWS - Revision : 1 |
2020-10-06 | Microsoft Windows win32k kernel driver use after free attempt RuleID : 55144 - Type : OS-WINDOWS - Revision : 1 |
2020-10-06 | Microsoft Windows win32k kernel driver use after free attempt RuleID : 55143 - Type : OS-WINDOWS - Revision : 1 |
2020-10-06 | Microsoft Windows CLFS Driver elevation of privilege attempt RuleID : 55142 - Type : FILE-OTHER - Revision : 1 |
2020-10-06 | Microsoft Windows CLFS Driver elevation of privilege attempt RuleID : 55141 - Type : FILE-OTHER - Revision : 1 |
2020-10-01 | Microsoft Windows Win32k local privilege escalation attempt RuleID : 54919 - Type : OS-WINDOWS - Revision : 1 |
2020-10-01 | Microsoft Windows Win32k local privilege escalation attempt RuleID : 54918 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows GDI privilege escalation attempt RuleID : 54738 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows GDI privilege escalation attempt RuleID : 54737 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows DNS Resolver local privilege escalation attempt RuleID : 54736 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows DNS Resolver local privilege escalation attempt RuleID : 54735 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows AFD kernel driver privilege escalation attempt RuleID : 54734 - Type : OS-WINDOWS - Revision : 1 |
2020-09-15 | Microsoft Windows AFD kernel driver privilege escalation attempt RuleID : 54733 - Type : OS-WINDOWS - Revision : 1 |
2020-08-13 | Microsoft Windows CAB file szName directory traversal attempt RuleID : 54527 - Type : FILE-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-10-22 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO |
2018-09-11 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO |
2017-10-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_oct_win2008.nasl - Type: ACT_GATHER_INFO |