This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2008-04-23
Product Windows Server 2003 Last view 2015-06-09
Version - Type Os
Update sp2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2003

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.2 2015-06-09 CVE-2015-2360

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2015-06-09 CVE-2015-1727

Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Pool Buffer Overflow Vulnerability."

7.2 2015-06-09 CVE-2015-1726

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1725

Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Buffer Overflow Vulnerability."

7.2 2015-06-09 CVE-2015-1724

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Object Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1723

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Station Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1722

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability."

7.2 2015-06-09 CVE-2015-1721

The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer Dereference Vulnerability."

7.2 2015-06-09 CVE-2015-1720

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability."

2.1 2015-06-09 CVE-2015-1719

The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to obtain sensitive information from kernel memory via a crafted application, aka "Microsoft Windows Kernel Information Disclosure Vulnerability."

5 2015-05-13 CVE-2015-1716

Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict Diffie-Hellman Ephemeral (DHE) key lengths, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, aka "Schannel Information Disclosure Vulnerability."

6.9 2015-05-13 CVE-2015-1702

The Service Control Manager (SCM) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Service Control Manager Elevation of Privilege Vulnerability."

2.1 2015-05-13 CVE-2015-1680

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1679.

2.1 2015-05-13 CVE-2015-1679

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1680.

2.1 2015-05-13 CVE-2015-1678

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1679, and CVE-2015-1680.

2.1 2015-05-13 CVE-2015-1677

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680.

2.1 2015-05-13 CVE-2015-1676

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680.

7.2 2015-04-14 CVE-2015-1644

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Windows MS-DOS Device Name Vulnerability."

7.2 2015-04-14 CVE-2015-1643

Microsoft Windows Server 2003 R2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "NtCreateTransactionManager Type Confusion Vulnerability."

9.3 2015-03-11 CVE-2015-0096

Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability."

5.6 2015-03-11 CVE-2015-0095

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to cause a denial of service (NULL pointer dereference and blue screen), or obtain sensitive information from kernel memory and possibly bypass the ASLR protection mechanism, via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability."

2.1 2015-03-11 CVE-2015-0094

The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly restrict the availability of address information during a function call, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability."

9.3 2015-03-11 CVE-2015-0093

Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0091, and CVE-2015-0092.

9.3 2015-03-11 CVE-2015-0092

Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0091, and CVE-2015-0093.

9.3 2015-03-11 CVE-2015-0091

Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0092, and CVE-2015-0093.

CWE : Common Weakness Enumeration

%idName
21% (16) CWE-200 Information Exposure
14% (11) CWE-264 Permissions, Privileges, and Access Controls
13% (10) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (8) CWE-94 Failure to Control Generation of Code ('Code Injection')
9% (7) CWE-20 Improper Input Validation
8% (6) CWE-416 Use After Free
4% (3) CWE-476 NULL Pointer Dereference
4% (3) CWE-310 Cryptographic Issues
2% (2) CWE-426 Untrusted Search Path
2% (2) CWE-190 Integer Overflow or Wraparound
2% (2) CWE-19 Data Handling
1% (1) CWE-415 Double Free
1% (1) CWE-284 Access Control (Authorization) Issues
1% (1) CWE-254 Security Features
1% (1) CWE-129 Improper Validation of Array Index

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-66 SQL Injection
CAPEC-67 String Format Overflow in syslog()
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic

SAINT Exploits

Description Link
Windows OLE Automation Array command execution More info here

Open Source Vulnerability Database (OSVDB)

id Description
71735 Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Loc...
68585 Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
64794 Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transa...
64793 Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Ver...
63739 Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote In...
63738 Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Rec...
58844 Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitra...
49056 Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
46068 Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
44652 Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument O...

ExploitDB Exploits

id Description
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)

OpenVAS Exploits

id Description
2011-04-13 Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223)
File : nvt/secpod_ms11-034.nasl
2011-01-10 Name : Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability ...
File : nvt/gb_ms08-036.nasl
2010-10-13 Name : Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability ...
File : nvt/secpod_ms10-074.nasl
2010-05-05 Name : Microsoft Windows SMTP Server DNS spoofing vulnerability
File : nvt/gb_ms_smtp_dns_spoofing_vulnerability.nasl
2010-04-23 Name : Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (...
File : nvt/secpod_ms10-024.nasl
2010-04-22 Name : Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
File : nvt/gb_ms10_024.nasl
2009-10-14 Name : Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution (9...
File : nvt/secpod_ms09-051.nasl
2008-10-15 Name : Windows Kernel Elevation of Privilege Vulnerability (954211)
File : nvt/secpod_ms08-061_900051.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0107 Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050)
Severity: Category II - VMSKEY: V0060651
2015-A-0091 Multiple Vulnerabilities in Microsoft Windows (MS15-038)
Severity: Category II - VMSKEY: V0059897
2015-B-0036 Microsoft Windows Information Disclosure Vulnerability (MS15-024)
Severity: Category II - VMSKEY: V0059021
2015-A-0053 Multiple Vulnerabilities in Microsoft Windows (MS15-020)
Severity: Category II - VMSKEY: V0059001
2015-A-0048 Multiple Vulnerabilities in Windows Kernel (MS15-025)
Severity: Category II - VMSKEY: V0058995
2015-B-0017 Microsoft Group Policy Security Feature Bypass Vulnerability (MS15-014)
Severity: Category I - VMSKEY: V0058755
2015-A-0033 Microsoft Group Policy Remote Code Execution (MS15-011)
Severity: Category I - VMSKEY: V0058743
2014-A-0176 Microsoft Secure Channel Remote Code Execution Vulnerability (MS14-066)
Severity: Category I - VMSKEY: V0057389
2014-A-0171 Multiple Vulnerabilities in Windows OLE
Severity: Category I - VMSKEY: V0057379
2014-B-0147 Microsoft XML Core Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0057361
2014-A-0124 Multiple Vulnerabilities in Microsoft Kernel-Mode Drivers
Severity: Category II - VMSKEY: V0053797
2014-A-0080 Multiple Vulnerabilities in Microsoft Graphics Component
Severity: Category II - VMSKEY: V0052491
2014-A-0075 Microsoft Windows Shell Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0050445
2014-B-0040 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0048685
2014-A-0041 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver
Severity: Category I - VMSKEY: V0046299
2014-A-0038 Microsoft DirectShow Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0046179
2014-B-0015 Microsoft XML Core Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0044037
2013-A-0232 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0042582
2013-A-0227 Microsoft Windows (WinVerifyTrust) Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0042581
2013-A-0228 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0042580
2013-B-0128 MIcrosoft Windows Digital Signature Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0042304
2013-A-0214 Microsoft GDI Memory Corruption Vulnerability
Severity: Category II - VMSKEY: V0042294
2013-A-0213 Cumulative Security Update of Microsoft ActiveX Kill Bits
Severity: Category II - VMSKEY: V0042293

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50707 - Type : OS-WINDOWS - Revision : 1
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50706 - Type : OS-WINDOWS - Revision : 1
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50705 - Type : OS-WINDOWS - Revision : 1
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50704 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49977 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49976 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49975 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49974 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49973 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49972 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49971 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49970 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49969 - Type : OS-WINDOWS - Revision : 1
2019-04-13 Microsoft Wordpad embedded BMP overflow attempt
RuleID : 49428 - Type : FILE-OTHER - Revision : 1
2019-04-13 Microsoft Wordpad embedded BMP overflow attempt
RuleID : 49427 - Type : FILE-OTHER - Revision : 1
2017-11-02 ZIP file name overflow attempt
RuleID : 44473 - Type : FILE-OTHER - Revision : 2
2016-03-24 InformationCardSigninHelper ActiveX function call access
RuleID : 37823 - Type : BROWSER-PLUGINS - Revision : 1
2016-03-24 InformationCardSigninHelper ActiveX clsid access
RuleID : 37822 - Type : BROWSER-PLUGINS - Revision : 2
2016-03-14 Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt
RuleID : 36896 - Type : BROWSER-IE - Revision : 2
2016-03-14 Known exploit kit obfuscation routine detected
RuleID : 36824 - Type : EXPLOIT-KIT - Revision : 2
2015-08-14 Microsoft Windows clipboard null pointer dereference attempt
RuleID : 35113 - Type : OS-WINDOWS - Revision : 2
2015-08-14 Microsoft Windows clipboard null pointer dereference attempt
RuleID : 35112 - Type : OS-WINDOWS - Revision : 2
2015-07-13 Microsoft Windows WM_SYSTIMER null pWnd attempt
RuleID : 34793 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows WM_SYSTIMER null pWnd attempt
RuleID : 34792 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Microsoft Windows 8 CreateWindowEx privilege escalation attempt
RuleID : 34789 - Type : OS-WINDOWS - Revision : 3

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-04-03 Name: The remote mail server may be affected by multiple vulnerabilities.
File: exchange_ms10-024.nasl - Type: ACT_GATHER_INFO
2015-10-19 Name: The remote printer is affected by a security bypass vulnerability known as FR...
File: lexmark_printer_TE701.nasl - Type: ACT_GATHER_INFO
2015-06-09 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-061.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms15-055.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms15-050.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote Windows host is affected by multiple privilege escalation vulnerab...
File: smb_nt_ms15-038.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-023.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-020.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The Adobe Font driver on the remote host is affected by multiple vulnerabilit...
File: smb_nt_ms15-021.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms15-024.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by multiple privilege escalation vulnerab...
File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote Windows host is affected by a security feature bypass vulnerability.
File: smb_nt_ms15-031.nasl - Type: ACT_GATHER_INFO
2015-03-05 Name: The remote Windows host is affected by a security feature bypass vulnerability.
File: smb_kb3046015.nasl - Type: ACT_GATHER_INFO
2015-02-10 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms15-016.nasl - Type: ACT_GATHER_INFO
2015-02-10 Name: The remote Windows host is affected by a security downgrade vulnerability.
File: smb_nt_ms15-014.nasl - Type: ACT_GATHER_INFO
2015-02-10 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-011.nasl - Type: ACT_GATHER_INFO
2015-02-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-010.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote Windows host is affected by denial of service vulnerability.
File: smb_nt_ms14-079.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote host is affected by a remote code execution vulnerability.
File: smb_nt_ms14-067.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms14-066.nasl - Type: ACT_GATHER_INFO
2014-11-11 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms14-064.nasl - Type: ACT_GATHER_INFO
2014-08-12 Name: The remote Windows host is affected by a privilege escalation vulnerability.
File: smb_nt_ms14-049.nasl - Type: ACT_GATHER_INFO
2014-08-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms14-045.nasl - Type: ACT_GATHER_INFO
2014-06-11 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms14-036.nasl - Type: ACT_GATHER_INFO