This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2009-06-10
Product Windows Server 2008 Last view 2013-12-10
Version * Type Os
Update sp2  
Edition itanium  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2008

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.2 2013-12-10 CVE-2013-3907

portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability."

4.9 2013-11-12 CVE-2013-3887

The Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows local users to obtain sensitive information from kernel memory by leveraging improper copy operations, aka "Ancillary Function Driver Information Disclosure Vulnerability."

9.3 2013-11-06 CVE-2013-3906

GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.

9.3 2013-10-09 CVE-2013-3894

The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability."

7.2 2013-10-09 CVE-2013-3888

dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."

7.2 2013-10-09 CVE-2013-3879

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."

7.2 2013-10-09 CVE-2013-3200

The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."

10 2013-10-09 CVE-2013-3195

The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability."

7.2 2013-09-11 CVE-2013-3866

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

7.2 2013-09-11 CVE-2013-3865

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3864.

7.2 2013-09-11 CVE-2013-3864

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3865.

7.2 2013-09-11 CVE-2013-1344

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-3864, and CVE-2013-3865.

7.2 2013-09-11 CVE-2013-1343

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865.

7.2 2013-09-11 CVE-2013-1342

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1343, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865.

7.2 2013-09-11 CVE-2013-1341

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 8 allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability."

9.3 2013-09-11 CVE-2013-0810

Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, and Windows Server 2008 SP2 allow remote attackers to execute arbitrary code via a crafted screensaver in a theme file, aka "Windows Theme File Remote Code Execution Vulnerability."

7.8 2013-08-14 CVE-2013-3183

The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly perform memory allocation for inbound ICMPv6 packets, which allows remote attackers to cause a denial of service (system hang) via crafted packets, aka "ICMPv6 Vulnerability."

10 2013-08-14 CVE-2013-3175

Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a malformed asynchronous RPC request, aka "Remote Procedure Call Vulnerability."

7.2 2013-07-09 CVE-2013-3173

Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overwrite Vulnerability."

4.9 2013-07-09 CVE-2013-3172

Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to cause a denial of service (system hang) via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overflow Vulnerability."

7.2 2013-07-09 CVE-2013-3167

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Information Disclosure Vulnerability."

9.3 2013-07-09 CVE-2013-3129

Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."

7.2 2013-07-09 CVE-2013-1345

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."

7.2 2013-07-09 CVE-2013-1340

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Dereference Vulnerability."

7.2 2013-07-09 CVE-2013-1300

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."

CWE : Common Weakness Enumeration

%idName
32% (35) CWE-362 Race Condition
15% (17) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
12% (14) CWE-20 Improper Input Validation
11% (13) CWE-94 Failure to Control Generation of Code ('Code Injection')
11% (12) CWE-264 Permissions, Privileges, and Access Controls
10% (11) CWE-399 Resource Management Errors
2% (3) CWE-189 Numeric Errors
1% (2) CWE-200 Information Exposure
0% (1) CWE-287 Improper Authentication
0% (1) CWE-134 Uncontrolled Format String

SAINT Exploits

Description Link
Windows Crafted Theme File Handling Vulnerability More info here
Windows SMB2 buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

id Description
78057 Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
78056 Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content P...
78055 Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
78054 Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary S...
68549 Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Conte...
67988 Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Pro...
67984 Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Fo...
67083 Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privil...
60839 Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
60838 Microsoft IE CSS Element Access Race Condition Memory Corruption
60837 Microsoft IE XHTML DOM Manipulation Memory Corruption
60832 Microsoft Windows Internet Authentication Service Protected Extensible Authen...
59865 Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handlin...
58856 Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Over...
58851 Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulatio...
58850 Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
58849 Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary...
57799 Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL RE...
56911 Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
56695 Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
54943 Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escal...
54942 Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
54941 Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
54940 Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation

ExploitDB Exploits

id Description
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
30011 Microsoft Tagged Image File Format (TIFF) Integer Overflow
15158 MOAUB #30 - Microsoft Unicode Scripts Processor Remote Code Execution

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-12 Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability...
File : nvt/secpod_ms12-081.nasl
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-11-14 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-075.nasl
2012-10-10 Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
File : nvt/secpod_ms12-068.nasl
2012-08-15 Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731...
File : nvt/secpod_ms12-055.nasl
2012-08-15 Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities...
File : nvt/secpod_ms12-054.nasl
2012-07-11 Name : Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
File : nvt/secpod_ms12-049.nasl
2012-07-11 Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (27...
File : nvt/secpod_ms12-047.nasl
2012-05-09 Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268...
File : nvt/secpod_ms12-034.nasl
2012-05-09 Name : Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
File : nvt/secpod_ms12-033.nasl
2012-04-11 Name : Windows Authenticode Signature Remote Code Execution Vulnerability (2653956)
File : nvt/secpod_ms12-024.nasl
2012-02-15 Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2660465)
File : nvt/secpod_ms12-008.nasl
2012-02-15 Name : MS Windows C Run-Time Library Remote Code Execution Vulnerability (2654428)
File : nvt/secpod_ms12-013.nasl
2012-02-15 Name : MS Windows Ancillary Function Driver Privilege Elevation Vulnerabilities (264...
File : nvt/secpod_ms12-009.nasl
2011-12-30 Name : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)
File : nvt/secpod_ms11-100.nasl
2010-11-25 Name : Microsoft Web Services on Devices API Remote Code Execution Vulnerability (97...
File : nvt/gb_ms09-063.nasl
2010-10-13 Name : Windows Common Control Library Remote Code Execution Vulnerability (2296011)
File : nvt/secpod_ms10-081.nasl
2010-09-15 Name : MS Unicode Scripts Processor and MS Office Could Code Execution Vulnerability...
File : nvt/secpod_ms10-063.nasl
2010-09-15 Name : Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2...
File : nvt/secpod_ms10-061.nasl
2009-12-09 Name : Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
File : nvt/secpod_ms09-071.nasl
2009-12-04 Name : MS Internet Explorer 'Style' Object Remote Code Execution Vulnerability
File : nvt/gb_ms_ie_style_object_remote_code_exec_vuln.nasl
2009-10-15 Name : Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
File : nvt/secpod_ms09-061.nasl
2009-10-15 Name : Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
File : nvt/secpod_ms09-050-remote.nasl
2009-10-14 Name : Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
File : nvt/secpod_ms09-056.nasl
2009-10-01 Name : Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Executio...
File : nvt/ms_smb2_highid.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-A-0225 Microsoft GDI Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0042593
2013-A-0232 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0042582
2013-B-0127 Microsoft Windows Ancillary Function Driver Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0042302
2013-A-0190 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Drivers
Severity: Category I - VMSKEY: V0040763
2013-A-0189 Microsoft Windows Common Control Library Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0040760
2013-B-0104 Microsoft Windows Theme File Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0040299
2013-B-0088 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows Kernel
Severity: Category I - VMSKEY: V0040045
2013-A-0161 Microsoft ICMPv6 Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040035
2013-A-0163 Microsoft Windows Remote Procedure Call (RPC) Elevation of Privilege Vulnerab...
Severity: Category I - VMSKEY: V0040034
2013-B-0071 Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity: Category II - VMSKEY: V0039211
2013-A-0135 Microsoft GDI+ Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039199
2013-A-0120 Microsoft Windows Print Spooler Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0039072
2013-B-0034 Microsoft Windows Client/Server Run-time Subsystem Elevation of Privilege Vul...
Severity: Category II - VMSKEY: V0037616
2013-A-0080 Microsoft Windows Kernel Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0037609
2013-A-0042 Microsoft Windows Media Decompression Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0036827
2013-B-0003 Microsoft Windows Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0036450
2012-A-0196 Microsoft Windows File Handling Component Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0035488
2012-A-0137 Multiple Vulnerabilities in Microsoft Windows Networking Components
Severity: Category I - VMSKEY: V0033657
2012-A-0108 Microsoft TLS Protocol Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0033310
2012-B-0052 Microsoft Windows Partition Manager Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0032311
2012-A-0060 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031983
2012-B-0021 Microsoft Windows Ancillary Function Driver Privilege Escalation Vulnerabilities
Severity: Category II - VMSKEY: V0031355
2012-A-0026 Microsoft Windows C Run-Time Library Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031348
2012-A-0001 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0030927
2010-B-0090 Microsoft Windows Common Control Library Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0025534

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41465 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41464 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41463 - Type : FILE-EXECUTABLE - Revision : 2
2017-03-01 Microsoft Windows Win32 Divide Error Exception Denial of Service attempt
RuleID : 41462 - Type : FILE-EXECUTABLE - Revision : 2
2015-03-17 Microsoft Windows Comctl32.dll third-party SVG viewer heap overflow attempt
RuleID : 33479 - Type : OS-WINDOWS - Revision : 2
2015-01-06 Web Service on Devices API WSDAPI URL processing buffer corruption attempt
RuleID : 32673 - Type : SERVER-OTHER - Revision : 2
2014-11-16 Microsoft Windows C Run-Time Library remote code execution attempt
RuleID : 31427 - Type : FILE-OTHER - Revision : 3
2014-06-07 Microsoft Windows NtUserMessageCall implementation exploitation attempt
RuleID : 30940 - Type : FILE-EXECUTABLE - Revision : 5
2014-06-07 Microsoft Windows NtUserMessageCall implementation exploitation attempt
RuleID : 30939 - Type : FILE-EXECUTABLE - Revision : 5
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28526 - Type : FILE-OFFICE - Revision : 8
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28525 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft GDI library TIFF handling memory corruption attempt
RuleID : 28488 - Type : OS-WINDOWS - Revision : 3
2014-01-10 Microsoft GDI library TIFF handling memory corruption attempt
RuleID : 28487 - Type : OS-WINDOWS - Revision : 3
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28473 - Type : FILE-OFFICE - Revision : 8
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28472 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28471 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28470 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28469 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28468 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28467 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28466 - Type : FILE-OFFICE - Revision : 10
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28465 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28464 - Type : FILE-OFFICE - Revision : 9
2014-01-10 Microsoft Windows XP .theme file remote code execution attempt
RuleID : 27822 - Type : FILE-OTHER - Revision : 9
2014-01-10 Microsoft ICMPv6 mismatched prefix length and length field denial of service ...
RuleID : 27624 - Type : OS-WINDOWS - Revision : 3

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-12-11 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-101.nasl - Type: ACT_GATHER_INFO
2013-12-11 Name: The remote Windows host has a remote code execution vulnerability.
File: smb_nt_ms13-096.nasl - Type: ACT_GATHER_INFO
2013-11-13 Name: The remote Windows host contains a driver that allows information disclosure.
File: smb_nt_ms13-093.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: A library on the remote Windows host has an integer overflow vulnerability.
File: smb_nt_ms13-083.nasl - Type: ACT_GATHER_INFO
2013-10-09 Name: The Windows kernel drivers on the remote host are affected by multiple vulner...
File: smb_nt_ms13-081.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-076.nasl - Type: ACT_GATHER_INFO
2013-09-11 Name: The remote Windows host is affected by a code execution vulnerability.
File: smb_nt_ms13-071.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms13-065.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-063.nasl - Type: ACT_GATHER_INFO
2013-08-14 Name: The Windows install on the remote host is affected by a privilege escalation ...
File: smb_nt_ms13-062.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The remote Windows host has a remote code execution vulnerability.
File: smb_nt_ms13-054.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-053.nasl - Type: ACT_GATHER_INFO
2013-07-10 Name: The .NET Framework install on the remote Windows host could allow arbitrary c...
File: smb_nt_ms13-052.nasl - Type: ACT_GATHER_INFO
2013-06-11 Name: The remote Windows host is potentially affected by a privilege escalation vul...
File: smb_nt_ms13-050.nasl - Type: ACT_GATHER_INFO
2013-06-11 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms13-049.nasl - Type: ACT_GATHER_INFO
2013-05-15 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-046.nasl - Type: ACT_GATHER_INFO
2013-04-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-036.nasl - Type: ACT_GATHER_INFO
2013-04-10 Name: The remote Windows host has a privilege escalation vulnerability.
File: smb_nt_ms13-033.nasl - Type: ACT_GATHER_INFO
2013-04-10 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-031.nasl - Type: ACT_GATHER_INFO
2013-02-12 Name: The Windows kernel on the remote host is affected by multiple vulnerabilities.
File: smb_nt_ms13-017.nasl - Type: ACT_GATHER_INFO
2013-02-12 Name: The Windows kernel on the remote host is affected by multiple race condition ...
File: smb_nt_ms13-016.nasl - Type: ACT_GATHER_INFO
2013-02-12 Name: The remote Windows host is potentially affected by a code execution vulnerabi...
File: smb_nt_ms13-011.nasl - Type: ACT_GATHER_INFO
2013-01-09 Name: The remote Windows host is affected by a security feature bypass vulnerability.
File: smb_nt_ms13-006.nasl - Type: ACT_GATHER_INFO
2012-12-11 Name: The remote Windows host has a remote code execution vulnerability.
File: smb_nt_ms12-081.nasl - Type: ACT_GATHER_INFO
2012-12-11 Name: The remote Windows host is affected by remote code execution vulnerabilities.
File: smb_nt_ms12-078.nasl - Type: ACT_GATHER_INFO