This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2011-03-09
Product Windows 7 Last view 2017-04-12
Version - Type Os
Update sp1  
Edition *  
Language *  
Sofware Edition ultimate_n  
Target Software *  
Target Hardware x64  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_7

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.1 2017-04-12 CVE-2017-0166

An elevation of privilege vulnerability exists in Windows when LDAP request buffer lengths are improperly calculated. In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a Domain Controller, aka "LDAP Elevation of Privilege Vulnerability."

3.3 2016-05-10 CVE-2016-0175

The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to obtain sensitive information about kernel-object addresses, and consequently bypass the KASLR protection mechanism, via a crafted application, aka "Win32k Information Disclosure Vulnerability."

7.8 2016-02-10 CVE-2016-0040

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."

7.8 2016-01-13 CVE-2016-0020

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "MAPI DLL Loading Elevation of Privilege Vulnerability."

8.8 2016-01-13 CVE-2016-0009

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 10 Gold and 1511 allow remote attackers to execute arbitrary code via unspecified vectors, aka "Win32k Remote Code Execution Vulnerability."

7.2 2015-04-21 CVE-2015-1701

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

7.1 2013-06-11 CVE-2013-3138

Integer overflow in the TCP/IP kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (system hang) via crafted TCP packets, aka "TCP/IP Integer Overflow Vulnerability."

9 2013-06-11 CVE-2013-1339

The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability."

4.9 2013-05-24 CVE-2013-3661

The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.

7.2 2013-05-14 CVE-2013-1333

Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overflow Vulnerability."

7.2 2013-05-14 CVE-2013-1332

dxgkrnl.sys (aka the DirectX graphics kernel subsystem) in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."

7.2 2013-03-12 CVE-2013-1287

The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1286.

7.2 2013-03-12 CVE-2013-1286

The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1287.

7.2 2013-03-12 CVE-2013-1285

The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287.

7.5 2013-03-11 CVE-2013-2556

Unspecified vulnerability in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 through SP1 allows attackers to bypass the ASLR protection mechanism via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "ASLR Security Feature Bypass Vulnerability."

7.5 2013-03-11 CVE-2013-2554

Unspecified vulnerability in Microsoft Windows 7 allows attackers to bypass the ASLR and DEP protection mechanisms via unknown vectors, as demonstrated against Firefox by VUPEN during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0787.

7.2 2013-03-11 CVE-2013-2553

Unspecified vulnerability in the kernel in Microsoft Windows 7 allows local users to gain privileges via unknown vectors, as demonstrated by Nils and Jon of MWR Labs during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0912.

7.8 2013-02-13 CVE-2013-0075

The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."

7.2 2013-01-09 CVE-2013-0008

win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."

9.3 2013-01-09 CVE-2013-0007

Microsoft XML Core Services (aka MSXML) 4.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML XSLT Vulnerability."

9.3 2013-01-09 CVE-2013-0006

Microsoft XML Core Services (aka MSXML) 3.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML Integer Truncation Vulnerability."

9.3 2012-12-11 CVE-2012-2556

The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability."

7.2 2012-11-13 CVE-2012-2530

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."

10 2012-09-26 CVE-2012-2897

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka "Windows Font Parsing Vulnerability" or "TrueType Font Parsing Vulnerability."

4.3 2012-07-10 CVE-2012-1870

The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."

CWE : Common Weakness Enumeration

%idName
43% (38) CWE-399 Resource Management Errors
17% (15) CWE-264 Permissions, Privileges, and Access Controls
13% (12) CWE-20 Improper Input Validation
10% (9) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
5% (5) CWE-189 Numeric Errors
4% (4) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (2) CWE-200 Information Exposure
1% (1) CWE-287 Improper Authentication
1% (1) CWE-131 Incorrect Calculation of Buffer Size
1% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

SAINT Exploits

Description Link
Microsoft Windows Media Player DVR-MS File Code Execution More info here
Windows Media MIDI Invalid Channel More info here
Microsoft Office ClickOnce Unsafe Execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78211 Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Ex...
78210 Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Co...
78209 Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading Safe...
78207 Microsoft Windows Embedded ClickOnce Application Office File Handling Remote ...
78057 Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
78056 Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content P...
78055 Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
78054 Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary S...
77667 Microsoft Windows Active Directory Query Parsing Remote Overflow
77662 Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
77660 Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Co...
77213 Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
76902 Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication...
76901 Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL ...
76900 Microsoft Windows Malformed TrueType Font Parsing DoS
76899 Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote O...
76843 Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
76231 Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injectio...
76221 Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arb...
76220 Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
76219 Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handl...
76218 Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Co...
76205 Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code E...
75382 Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Co...
74483 Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS

ExploitDB Exploits

id Description
24485 MS13-005 HWND_BROADCAST PoC
19037 MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability
18426 MS12-004 midiOutPlayNextPolyEvent Heap Overflow
18372 Microsoft Windows Assembly Execution Vulnerability MS12-005
18024 MS11-077 Win32k Null Pointer De-reference Vulnerability POC
17981 MS11-064 TCP/IP Stack Denial of Service
17978 MS11-077 .fon Kernel-Mode Buffer Overrun PoC

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-11-14 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-075.nasl
2012-09-28 Name : Google Chrome Windows Kernel Memory Corruption Vulnerability
File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl
2012-07-11 Name : Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
File : nvt/secpod_ms12-049.nasl
2012-07-11 Name : Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
File : nvt/secpod_ms12-048.nasl
2012-06-13 Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2709162)
File : nvt/secpod_ms12-041.nasl
2012-06-13 Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
File : nvt/secpod_ms12-039.nasl
2012-05-14 Name : Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
File : nvt/secpod_ms12-034_macosx.nasl
2012-05-09 Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268...
File : nvt/secpod_ms12-034.nasl
2012-05-09 Name : Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
File : nvt/secpod_ms12-033.nasl
2012-05-09 Name : Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
File : nvt/secpod_ms12-032.nasl
2012-03-06 Name : Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
File : nvt/secpod_ms11-020_remote.nasl
2012-02-15 Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2660465)
File : nvt/secpod_ms12-008.nasl
2012-01-11 Name : Windows ClickOnce Application Installer Remote Code Execution Vulnerability (...
File : nvt/secpod_ms12-005.nasl
2012-01-11 Name : Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (26...
File : nvt/secpod_ms12-004.nasl
2012-01-11 Name : Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
File : nvt/secpod_ms12-001.nasl
2011-12-30 Name : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)
File : nvt/secpod_ms11-100.nasl
2011-12-14 Name : Windows Client/Server Run-time Subsystem Privilege Elevation Vulnerability (2...
File : nvt/secpod_ms11-097.nasl
2011-12-14 Name : Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
File : nvt/secpod_ms11-092.nasl
2011-12-14 Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2567053)
File : nvt/secpod_ms11-087.nasl
2011-12-13 Name : MS Windows Active Directory Remote Code Execution Vulnerability (2640045)
File : nvt/secpod_ms11-095.nasl
2011-11-09 Name : Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability ...
File : nvt/secpod_ms11-086.nasl
2011-11-09 Name : Windows Mail and Windows Meeting Space Remote Code Execution Vulnerability (2...
File : nvt/secpod_ms11-085.nasl
2011-11-09 Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
File : nvt/secpod_ms11-083.nasl
2011-11-09 Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (2617657)
File : nvt/secpod_ms11-084.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2013-B-0088 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows Kernel
Severity: Category I - VMSKEY: V0040045
2013-A-0120 Microsoft Windows Print Spooler Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0039072
2013-A-0063 Microsoft Windows Kernel-Mode Drivers Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0037404
2013-A-0004 Multiple Vulnerabilities in Microsoft XML Core Services
Severity: Category I - VMSKEY: V0036444
2012-A-0108 Microsoft TLS Protocol Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0033310
2012-A-0110 Microsoft Windows Shell Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0033309
2012-B-0052 Microsoft Windows Partition Manager Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0032311
2012-A-0079 Combined Security Update for Microsoft Office Windows .NET Framework and Silv...
Severity: Category I - VMSKEY: V0032304
2012-A-0007 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031010
2012-A-0005 Multiple Remote Code Execution Vulnerabilities in Microsoft Windows Media
Severity: Category II - VMSKEY: V0031000
2012-A-0003 Microsoft Windows Kernel Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0030998
2012-A-0002 Microsoft Windows Components Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0030932
2012-A-0001 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0030927
2011-A-0162 Microsoft Windows Client/Server Run-time Subsystem Elevation of Privilege Vul...
Severity: Category II - VMSKEY: V0030835
2011-A-0171 Microsoft Windows Media Memory Corruption Vulnerability
Severity: Category II - VMSKEY: V0030826
2011-B-0135 Microsoft Windows Mail and Windows Meeting Space Remote Code Execution Vulner...
Severity: Category II - VMSKEY: V0030608
2011-B-0124 Microsoft Windows Media Center Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0030403
2011-A-0138 Microsoft Active Accessibility Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0030402
2011-B-0101 Microsoft Windows Data Access Components Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0029783
2011-A-0115 Microsoft Windows Client/Server Run-time Subsystem Elevation of Privilege Vul...
Severity: Category I - VMSKEY: V0029760
2011-B-0104 Microsoft Windows Kernel Remote Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0029745
2011-B-0067 Microsoft Windows Ancillary Function Driver Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0028611
2011-A-0078 Microsoft Server Message Block (SMB) Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0028598
2011-A-0081 Microsoft Windows OLE Automation Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0028597

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-09-17 Microsoft Windows Object Packager ClickOnce object remote code execution attempt
RuleID : 51029 - Type : OS-WINDOWS - Revision : 1
2019-09-17 Microsoft Windows Object Packager ClickOnce object remote code execution attempt
RuleID : 51028 - Type : OS-WINDOWS - Revision : 1
2019-09-05 Microsoft Fax Cover Page Editor heap corruption attempt
RuleID : 50873 - Type : OS-WINDOWS - Revision : 1
2019-09-05 Microsoft Fax Cover Page Editor heap corruption attempt
RuleID : 50872 - Type : OS-WINDOWS - Revision : 1
2019-08-31 Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ...
RuleID : 50849 - Type : FILE-OTHER - Revision : 1
2019-08-31 Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ...
RuleID : 50848 - Type : FILE-OTHER - Revision : 1
2019-04-18 Microsoft Windows TTF parsing counter overflow attempt
RuleID : 49483 - Type : FILE-OTHER - Revision : 1
2019-04-18 Microsoft Windows TTF parsing counter overflow attempt
RuleID : 49482 - Type : FILE-OTHER - Revision : 1
2019-04-13 Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o...
RuleID : 49423 - Type : FILE-OTHER - Revision : 2
2019-04-13 Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o...
RuleID : 49422 - Type : FILE-OTHER - Revision : 2
2019-04-13 Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o...
RuleID : 49421 - Type : FILE-OTHER - Revision : 2
2017-05-09 Microsoft LDAP MaxBuffSize buffer overflow attempt
RuleID : 42160 - Type : SERVER-OTHER - Revision : 2
2016-09-13 Microsoft Windows win32k.sys escalation of privilege attempt
RuleID : 39863 - Type : OS-WINDOWS - Revision : 2
2016-06-07 Microsoft Windows NtGdiGetEmbUFI kernel information disclosure attempt
RuleID : 38802 - Type : OS-WINDOWS - Revision : 2
2016-06-07 Microsoft Windows NtGdiGetEmbUFI kernel information disclosure attempt
RuleID : 38801 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Windows WmipReceiveNotifications out of bounds write attempt
RuleID : 37570 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Windows WmipReceiveNotifications out of bounds write attempt
RuleID : 37569 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Windows WmipReceiveNotifications out of bounds write attempt
RuleID : 37568 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Windows WmipReceiveNotifications out of bounds write attempt
RuleID : 37567 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Internet Explorer request for mapi32x.dll over SMB attempt
RuleID : 37258 - Type : BROWSER-IE - Revision : 3
2016-03-14 Microsoft Internet Explorer mapi32x.dll dll-load exploit attempt
RuleID : 37257 - Type : BROWSER-IE - Revision : 3
2015-09-24 Microsoft Windows WebDAV invalid character argument injection attempt
RuleID : 35731 - Type : OS-WINDOWS - Revision : 3
2015-06-23 Microsoft Windows Font Library file buffer overflow attempt
RuleID : 34566 - Type : FILE-OTHER - Revision : 3
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34499 - Type : OS-WINDOWS - Revision : 3
2015-06-23 Microsoft Windows Win32k.sys kernel-mode driver privilege escalation attempt
RuleID : 34498 - Type : OS-WINDOWS - Revision : 3

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-04-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_apr_4015550.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_apr_4015549.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote Windows host is affected by an elevation of privilege vulnerability.
File: smb_nt_ms17_apr_4015068.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_apr_4015583.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_apr_4015221.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_apr_4015219.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_apr_4015217.nasl - Type: ACT_GATHER_INFO
2017-04-11 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17-apr_4015551.nasl - Type: ACT_GATHER_INFO
2016-05-10 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms16-062.nasl - Type: ACT_GATHER_INFO
2016-02-09 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms16-014.nasl - Type: ACT_GATHER_INFO
2016-01-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms16-007.nasl - Type: ACT_GATHER_INFO
2016-01-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms16-005.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO
2013-10-11 Name: The remote host is missing an update that prevents a rules bypass vulnerability.
File: smb_kb2532445.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-063.nasl - Type: ACT_GATHER_INFO
2013-06-11 Name: The remote Windows host is potentially affected by a privilege escalation vul...
File: smb_nt_ms13-050.nasl - Type: ACT_GATHER_INFO
2013-06-11 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms13-049.nasl - Type: ACT_GATHER_INFO
2013-05-15 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-046.nasl - Type: ACT_GATHER_INFO
2013-03-12 Name: The Windows kernel on the remote host is affected by a privilege escalation v...
File: smb_nt_ms13-027.nasl - Type: ACT_GATHER_INFO
2013-02-12 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms13-018.nasl - Type: ACT_GATHER_INFO
2013-01-09 Name: The Windows kernel on the remote host is affected by a privilege escalation v...
File: smb_nt_ms13-005.nasl - Type: ACT_GATHER_INFO
2013-01-09 Name: Arbitrary code can be executed on the remote host through Microsoft XML Core ...
File: smb_nt_ms13-002.nasl - Type: ACT_GATHER_INFO
2012-12-11 Name: The remote Windows host is affected by remote code execution vulnerabilities.
File: smb_nt_ms12-078.nasl - Type: ACT_GATHER_INFO
2012-11-14 Name: The remote Windows host is affected by remote code execution vulnerabilities.
File: smb_nt_ms12-075.nasl - Type: ACT_GATHER_INFO
2012-09-26 Name: The remote host contains a web browser that is affected by multiple vulnerabi...
File: google_chrome_22_0_1229_79.nasl - Type: ACT_GATHER_INFO