This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2007-06-06
Product Windows Server 2008 Last view 2020-05-21
Version - Type Os
Update sp2  
Edition x64  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2008

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2020-05-21 CVE-2020-1113

A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC, aka 'Windows Task Scheduler Security Feature Bypass Vulnerability'.

9.3 2013-01-09 CVE-2013-0007

Microsoft XML Core Services (aka MSXML) 4.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML XSLT Vulnerability."

9.3 2013-01-09 CVE-2013-0006

Microsoft XML Core Services (aka MSXML) 3.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML Integer Truncation Vulnerability."

6.4 2012-02-17 CVE-2012-1194

The resolver in the DNS Server service in Microsoft Windows Server 2008 before R2 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.

9.3 2011-12-29 CVE-2011-3417

The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0, when sliding expiry is enabled, does not properly handle cached content, which allows remote attackers to obtain access to arbitrary user accounts via a crafted URL, aka "ASP.NET Forms Authentication Ticket Caching Vulnerability."

8.5 2011-12-29 CVE-2011-3416

The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote authenticated users to obtain access to arbitrary user accounts via a crafted username, aka "ASP.Net Forms Authentication Bypass Vulnerability."

6.8 2011-12-29 CVE-2011-3415

Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL, aka "Insecure Redirect in .NET Form Authentication Vulnerability."

7.8 2011-12-29 CVE-2011-3414

The CaseInsensitiveHashProvider.getHashCode function in the HashTable implementation in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka "Collisions in HashTable May Cause DoS Vulnerability."

9.3 2011-04-13 CVE-2011-0660

The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Response Parsing Vulnerability."

6.4 2010-04-14 CVE-2010-0812

Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to bypass intended IPv4 source-address restrictions via a mismatched IPv6 source address in a tunneled ISATAP packet, aka "ISATAP IPv6 Source Address Spoofing Vulnerability."

4.7 2010-04-14 CVE-2010-0810

The kernel in Microsoft Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, does not properly handle unspecified exceptions, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Exception Handler Vulnerability."

9.3 2010-04-14 CVE-2010-0487

The Authenticode Signature verification functionality in cabview.dll in Cabinet File Viewer Shell Extension 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows remote attackers to execute arbitrary code via a modified cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "Cabview Corruption Validation Vulnerability."

9.3 2010-04-14 CVE-2010-0486

The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows user-assisted remote attackers to execute arbitrary code via a modified (1) Portable Executable (PE) or (2) cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "WinVerifyTrust Signature Validation Vulnerability."

4.7 2010-04-14 CVE-2010-0481

The kernel in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly translate a registry key's virtual path to its real path, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Virtual Path Parsing Vulnerability."

9.3 2010-04-14 CVE-2010-0480

Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability."

10 2010-04-14 CVE-2010-0476

The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted SMB transaction response that uses (1) SMBv1 or (2) SMBv2, aka "SMB Client Response Parsing Vulnerability."

10 2010-04-14 CVE-2010-0269

The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Memory Allocation Vulnerability."

4.7 2010-04-14 CVE-2010-0234

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Null Pointer Vulnerability."

9.3 2010-03-31 CVE-2010-0807

Microsoft Internet Explorer 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, leading to memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."

4.3 2010-03-31 CVE-2010-0494

Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted HTML document in a situation where the client user drags one browser window across another browser window, aka "HTML Element Cross-Domain Vulnerability."

9.3 2010-03-31 CVE-2010-0490

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."

9.3 2010-03-31 CVE-2010-0489

Race condition in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Race Condition Memory Corruption Vulnerability."

4.3 2010-03-31 CVE-2010-0488

Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 does not properly handle unspecified "encoding strings," which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site, aka "Post Encoding Information Disclosure Vulnerability."

9.3 2010-03-31 CVE-2010-0267

Microsoft Internet Explorer 6, 6 SP1, and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."

9.3 2010-03-10 CVE-2010-0806

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."

CWE : Common Weakness Enumeration

%idName
27% (10) CWE-94 Failure to Control Generation of Code ('Code Injection')
13% (5) CWE-399 Resource Management Errors
13% (5) CWE-20 Improper Input Validation
8% (3) CWE-362 Race Condition
8% (3) CWE-264 Permissions, Privileges, and Access Controls
8% (3) CWE-189 Numeric Errors
8% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
5% (2) CWE-200 Information Exposure
2% (1) CWE-310 Cryptographic Issues
2% (1) CWE-295 Certificate Issues

SAINT Exploits

Description Link
Internet Explorer iepeers.dll use-after-free vulnerability More info here
Visual Studio Active Template Library object type mismatch vulnerability More info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78057 Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
78056 Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content P...
78055 Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
78054 Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary S...
71772 Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
64928 Microsoft Windows SMB Client Transaction Response Handling Memory Corruption ...
64925 Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption ...
63749 Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
63747 Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing W...
63746 Microsoft Windows Authenticode Signature Verification Cabview Manipulation Pr...
63745 Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validati...
63735 Microsoft Windows Kernel Exception Handling Unspecified Local DoS
63729 Microsoft Windows Kernel Virtual Path Parsing Local DoS
63728 Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
63335 Microsoft IE Unspecified Uninitialized Memory Corruption
63334 Microsoft IE Post Encoding Information Disclosure
63333 Microsoft IE Unspecified Race Condition Memory Corruption
63332 Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
63330 Microsoft IE HTML Rendering Unspecified Memory Corruption
63328 Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
62810 Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
62243 Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege ...
58876 Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
58875 Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
58862 Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow...

ExploitDB Exploits

id Description
17659 MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow
16590 Internet Explorer DHTML Behaviors Use After Free
14895 MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit
11683 Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta)

OpenVAS Exploits

id Description
2011-12-30 Name : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)
File : nvt/secpod_ms11-100.nasl
2011-04-13 Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
File : nvt/secpod_ms11-019.nasl
2010-12-06 Name : Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerabilit...
File : nvt/gb_ms09-049.nasl
2010-04-14 Name : Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
File : nvt/secpod_ms10-029.nasl
2010-04-14 Name : Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
File : nvt/secpod_ms10-026.nasl
2010-04-14 Name : Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
File : nvt/secpod_ms10-021.nasl
2010-04-14 Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
File : nvt/secpod_ms10-020.nasl
2010-04-14 Name : Microsoft Windows Authentication Verification Remote Code Execution Vulnerabi...
File : nvt/secpod_ms10-019.nasl
2010-04-01 Name : Microsoft Internet Explorer Multiple Vulnerabilities (980182)
File : nvt/secpod_ms10-018.nasl
2010-03-10 Name : MS Internet Explorer Remote Code Execution Vulnerability (981374)
File : nvt/gb_ms_ie_remote_code_exe_vuln_981374.nasl
2010-02-10 Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
File : nvt/secpod_ms10-006.nasl
2009-10-15 Name : Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
File : nvt/secpod_ms09-050-remote.nasl
2009-10-14 Name : Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
File : nvt/secpod_ms09-058.nasl
2009-10-14 Name : Microsoft Windows LSASS Denial of Service Vulnerability (975467)
File : nvt/secpod_ms09-059.nasl
2009-10-14 Name : Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
File : nvt/secpod_ms09-056.nasl
2009-10-06 Name : Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
File : nvt/gb_ms_ie_ssl_certi_sec_bypass_vuln_oct09.nasl
2009-09-10 Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-09-10 Name : Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
File : nvt/secpod_ms09-047.nasl
2009-09-10 Name : Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
File : nvt/secpod_ms09-045.nasl
2009-08-14 Name : Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
File : nvt/secpod_ms09-037.nasl
2009-08-12 Name : Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
File : nvt/secpod_ms09-044.nasl
2009-06-15 Name : Ubuntu USN-785-1 (ipsec-tools)
File : nvt/ubuntu_785_1.nasl
2009-06-10 Name : Cumulative Security Update for Internet Explorer (969897)
File : nvt/secpod_ms09-019.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2013-A-0004 Multiple Vulnerabilities in Microsoft XML Core Services
Severity: Category I - VMSKEY: V0036444
2012-A-0001 Multiple Vulnerabilities in Microsoft .NET Framework
Severity: Category I - VMSKEY: V0030927
2010-B-0030 Microsoft Windows ISATAP Spoofing Vulnerability
Severity: Category I - VMSKEY: V0023956
2010-A-0053 Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0023999
2009-B-0054 Microsoft Windows Local Security Authority Subsystem Service (LSASS) Denial o...
Severity: Category I - VMSKEY: V0021747
2009-A-0095 Multiple Vulnerabilities in Microsoft Windows CryptoAPI
Severity: Category I - VMSKEY: V0021760
2009-A-0078 Microsoft Wireless LAN AutoConfig Service Vulnerability
Severity: Category I - VMSKEY: V0019913
2009-A-0074 Microsoft JScript Scripting Engine Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0019914
2009-A-0076 Multiple Vulnerabilities in Microsoft Windows Media Format
Severity: Category II - VMSKEY: V0019916
2009-A-0077 Multiple Microsoft TCP/IP Remote Code Execution Vulnerabilities
Severity: Category I - VMSKEY: V0019917
2009-A-0067 Multiple Vulnerabilities in Microsoft Active Template Library
Severity: Category II - VMSKEY: V0019882
2009-A-0071 Multiple Vulnerabilities in Microsoft Remote Desktop Connection
Severity: Category II - VMSKEY: V0019884

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-09-05 Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt
RuleID : 50893 - Type : FILE-MULTIMEDIA - Revision : 1
2019-09-05 Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt
RuleID : 50892 - Type : FILE-MULTIMEDIA - Revision : 1
2018-06-12 SMB client NULL deref race condition attempt
RuleID : 46637 - Type : NETBIOS - Revision : 1
2014-01-10 (ipv6)ISATAP-addressedIPv6trafficspoofingattempt
RuleID : 453 - Type : - Revision : 2
2014-11-16 Microsoft Internet Explorer outerHTML against incomplete element heap corrupt...
RuleID : 31504 - Type : BROWSER-IE - Revision : 3
2014-01-10 overly large XML file MSXML heap overflow attempt
RuleID : 28286 - Type : FILE-OTHER - Revision : 3
2014-01-10 Microsoft Internet Explorer innerHTML against incomplete element heap corrupt...
RuleID : 27222 - Type : BROWSER-IE - Revision : 4
2014-01-10 Microsoft Windows SMB malformed process ID high field denial of service attempt
RuleID : 26643 - Type : OS-WINDOWS - Revision : 6
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 25986 - Type : BROWSER-IE - Revision : 7
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 25985 - Type : BROWSER-IE - Revision : 9
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 25984 - Type : BROWSER-IE - Revision : 9
2014-01-10 MSXML dynamic pointer casting arbitrary code execution attempt
RuleID : 25275 - Type : FILE-OTHER - Revision : 2
2014-01-10 overly large XML file MSXML heap overflow attempt
RuleID : 25270 - Type : FILE-OTHER - Revision : 6
2014-01-10 Microsoft Windows IIS .NET null character username truncation attempt
RuleID : 25251 - Type : SERVER-IIS - Revision : 5
2014-01-10 Microsoft Windows IIS .NET null character username truncation attempt
RuleID : 25250 - Type : SERVER-IIS - Revision : 6
2014-01-10 Microsoft Windows CryptoAPI common name spoofing attempt
RuleID : 24490 - Type : OS-WINDOWS - Revision : 4
2014-01-10 Microsoft Windows CryptoAPI common name spoofing attempt
RuleID : 24489 - Type : OS-WINDOWS - Revision : 4
2014-01-10 Microsoft Windows CryptoAPI common name spoofing attempt
RuleID : 24488 - Type : OS-WINDOWS - Revision : 4
2014-01-10 Microsoft Windows Media encryption sample ID header RCE attempt
RuleID : 23576 - Type : FILE-MULTIMEDIA - Revision : 5
2014-01-10 Microsoft Windows Media encryption sample ID header RCE attempt
RuleID : 23575 - Type : FILE-MULTIMEDIA - Revision : 5
2014-01-10 Microsoft Windows Media pixel aspect ratio header RCE attempt
RuleID : 23574 - Type : FILE-MULTIMEDIA - Revision : 5
2014-01-10 Microsoft Windows Media content type header RCE attempt
RuleID : 23573 - Type : FILE-MULTIMEDIA - Revision : 5
2014-01-10 Microsoft Windows Media file name header RCE attempt
RuleID : 23572 - Type : FILE-MULTIMEDIA - Revision : 5
2014-01-10 Microsoft Windows Media Timecode header RCE attempt
RuleID : 23571 - Type : FILE-MULTIMEDIA - Revision : 5
2014-01-10 Microsoft Windows Media sample duration header RCE attempt
RuleID : 23570 - Type : FILE-MULTIMEDIA - Revision : 5

Nessus® Vulnerability Scanner

id Description
2013-01-09 Name: Arbitrary code can be executed on the remote host through Microsoft XML Core ...
File: smb_nt_ms13-002.nasl - Type: ACT_GATHER_INFO
2012-07-17 Name: The remote device has a denial of service vulnerability.
File: juniper_psn-2012-07-650.nasl - Type: ACT_GATHER_INFO
2011-12-29 Name: The version of ASP.NET Framework installed on the remote host is affected by ...
File: smb_nt_ms11-100.nasl - Type: ACT_GATHER_INFO
2011-04-13 Name: Arbitrary code can be executed on the remote host through the installed SMB c...
File: smb_nt_ms11-019.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The remote host is vulnerable to network spoofing attacks.
File: smb_nt_ms10-029.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: An audio codec on the remote Windows host has a buffer overflow vulnerability.
File: smb_nt_ms10-026.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The Windows kernel is affected by eight vulnerabilities, including some that ...
File: smb_nt_ms10-021.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: Arbitrary code can be executed on the remote host through the installed SMB c...
File: smb_nt_ms10-020.nasl - Type: ACT_GATHER_INFO
2010-04-13 Name: The remote Windows host has multiple code execution vulnerabilities.
File: smb_nt_ms10-019.nasl - Type: ACT_GATHER_INFO
2010-03-30 Name: Arbitrary code can be executed on the remote host through a web browser.
File: smb_nt_ms10-018.nasl - Type: ACT_GATHER_INFO
2010-02-09 Name: Arbitrary code can be executed on the remote host through its SMB client.
File: smb_nt_ms10-006.nasl - Type: ACT_GATHER_INFO
2009-10-13 Name: The Windows kernel is vulnerable to multiple buffer overflow attacks.
File: smb_nt_ms09-058.nasl - Type: ACT_GATHER_INFO
2009-10-13 Name: The remote Windows host is prone to a denial of service attack.
File: smb_nt_ms09-059.nasl - Type: ACT_GATHER_INFO
2009-10-13 Name: Certain identity validation methods may be bypassed allowing impersonation.
File: smb_nt_ms09-056.nasl - Type: ACT_GATHER_INFO
2009-10-13 Name: The remote SMB server can be abused to execute code remotely.
File: smb_nt_ms09-050.nasl - Type: ACT_GATHER_INFO
2009-09-08 Name: Arbitrary code can be executed on the remote host through the Wireless LAN Au...
File: smb_nt_ms09-049.nasl - Type: ACT_GATHER_INFO
2009-09-08 Name: Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d...
File: smb_nt_ms09-048.nasl - Type: ACT_GATHER_INFO
2009-09-08 Name: Arbitrary code can be executed on the remote host through opening a Windows M...
File: smb_nt_ms09-047.nasl - Type: ACT_GATHER_INFO
2009-09-08 Name: Arbitrary code can be executed on the remote host through the web or email cl...
File: smb_nt_ms09-045.nasl - Type: ACT_GATHER_INFO
2009-09-08 Name: Arbitrary code may be executed on the remote host through the SMB port
File: smb2_pid_high_vuln.nasl - Type: ACT_ATTACK
2009-08-11 Name: It is possible to execute arbitrary code on the remote host.
File: smb_nt_ms09-044.nasl - Type: ACT_GATHER_INFO
2009-08-11 Name: Arbitrary code can be executed on the remote host through Microsoft Active Te...
File: smb_nt_ms09-037.nasl - Type: ACT_GATHER_INFO
2009-08-11 Name: Arbitrary code can be executed on the remote host through Microsoft Remote De...
File: macosx_rdesktop.nasl - Type: ACT_GATHER_INFO
2009-06-10 Name: Arbitrary code can be executed on the remote host through a web browser.
File: smb_nt_ms09-019.nasl - Type: ACT_GATHER_INFO