Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2018-09-12 |
Product | Windows 8.1 | Last view | 2022-01-11 |
Version | - | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | rt | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_8.1 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.4 | 2022-01-11 | CVE-2022-21928 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963. |
5.3 | 2022-01-11 | CVE-2022-21924 | Workstation Service Remote Protocol Security Feature Bypass Vulnerability. |
8.8 | 2022-01-11 | CVE-2022-21922 | Remote Procedure Call Runtime Remote Code Execution Vulnerability. |
7 | 2022-01-11 | CVE-2022-21919 | Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895. |
7.8 | 2022-01-11 | CVE-2022-21916 | Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21897. |
6.5 | 2022-01-11 | CVE-2022-21915 | Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21880. |
7.8 | 2022-01-11 | CVE-2022-21895 | Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919. |
4.4 | 2022-01-11 | CVE-2022-21894 | Secure Boot Security Feature Bypass Vulnerability. |
8 | 2022-01-11 | CVE-2022-21893 | Remote Desktop Protocol Remote Code Execution Vulnerability. |
6.8 | 2022-01-11 | CVE-2022-21892 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963. |
7.8 | 2022-01-11 | CVE-2022-21881 | Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21879. |
7.5 | 2022-01-11 | CVE-2022-21880 | Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21915. |
7.8 | 2022-01-11 | CVE-2022-21875 | Windows Storage Elevation of Privilege Vulnerability. |
7 | 2022-01-11 | CVE-2022-21868 | Windows Devices Human Interface Elevation of Privilege Vulnerability. |
7 | 2022-01-11 | CVE-2022-21867 | Windows Push Notifications Apps Elevation Of Privilege Vulnerability. |
7 | 2022-01-11 | CVE-2022-21864 | Windows UI Immersive Server API Elevation of Privilege Vulnerability. |
7 | 2022-01-11 | CVE-2022-21862 | Windows Application Model Core API Elevation of Privilege Vulnerability. |
7 | 2022-01-11 | CVE-2022-21859 | Windows Accounts Control Elevation of Privilege Vulnerability. |
8.8 | 2022-01-11 | CVE-2022-21857 | Active Directory Domain Services Elevation of Privilege Vulnerability. |
8.8 | 2022-01-11 | CVE-2022-21851 | Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21850. |
8.8 | 2022-01-11 | CVE-2022-21850 | Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21851. |
7.5 | 2022-01-11 | CVE-2022-21848 | Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890. |
7.5 | 2022-01-11 | CVE-2022-21843 | Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21848, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890. |
7.8 | 2022-01-11 | CVE-2022-21838 | Windows Cleanup Manager Elevation of Privilege Vulnerability. |
7.8 | 2022-01-11 | CVE-2022-21836 | Windows Certificate Spoofing Vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
48% (14) | CWE-269 | Improper Privilege Management |
13% (4) | CWE-200 | Information Exposure |
6% (2) | CWE-668 | Exposure of Resource to Wrong Sphere |
6% (2) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
6% (2) | CWE-20 | Improper Input Validation |
3% (1) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
3% (1) | CWE-404 | Improper Resource Shutdown or Release |
3% (1) | CWE-295 | Certificate Issues |
3% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
3% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
Snort® IPS/IDS
Date | Description |
---|---|
2019-12-05 | Microsoft JET Database ExcelExtractString stack buffer overflow attempt RuleID : 52073 - Type : SERVER-OTHER - Revision : 1 |
2019-12-05 | Microsoft JET Database ExcelExtractString stack buffer overflow attempt RuleID : 52072 - Type : SERVER-OTHER - Revision : 1 |
2018-11-20 | Microsoft Windows Filter Manager Elevation Of Privilege attempt RuleID : 48205 - Type : OS-WINDOWS - Revision : 3 |
2018-11-08 | Microsoft Windows Filter Manager Elevation Of Privilege attempt RuleID : 48056 - Type : OS-WINDOWS - Revision : 1 |
2018-11-08 | Microsoft Windows Filter Manager Elevation Of Privilege attempt RuleID : 48055 - Type : OS-WINDOWS - Revision : 4 |
2018-10-11 | Microsoft Internet Explorer MSXML use after free attempt RuleID : 47748 - Type : BROWSER-IE - Revision : 1 |
2018-10-11 | Microsoft Internet Explorer MSXML use after free attempt RuleID : 47747 - Type : BROWSER-IE - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-09-11 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO |