This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2010-02-10
Product Windows Server 2008 Last view 2021-03-11
Version r2 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware x64  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2008

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2021-03-11 CVE-2021-26872

Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26898, CVE-2021-26901.

5.5 2021-03-11 CVE-2021-26869

Windows ActiveX Installer Service Information Disclosure Vulnerability

9 2020-07-14 CVE-2020-1043

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1040, CVE-2020-1041, CVE-2020-1042.

9 2020-07-14 CVE-2020-1042

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1040, CVE-2020-1041, CVE-2020-1043.

9 2020-07-14 CVE-2020-1041

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1040, CVE-2020-1042, CVE-2020-1043.

9 2020-07-14 CVE-2020-1040

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043.

9 2020-07-14 CVE-2020-1036

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1040, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043.

9 2020-07-14 CVE-2020-1032

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1036, CVE-2020-1040, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043.

5.5 2019-04-08 CVE-2019-0754

A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'.

7.8 2018-12-11 CVE-2018-8639

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641.

7.8 2018-12-11 CVE-2018-8611

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

8.8 2018-11-13 CVE-2018-8450

A remote code execution vulnerability exists when Windows Search handles objects in memory, aka "Windows Search Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

7.8 2013-02-13 CVE-2013-0075

The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."

7.2 2013-01-09 CVE-2013-0008

win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."

9.3 2012-12-11 CVE-2012-2556

The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability."

7.2 2012-07-10 CVE-2012-1893

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate callback parameters during creation of a hook procedure, which allows local users to gain privileges via a crafted application, aka "Win32k Incorrect Type Handling Vulnerability."

7.2 2012-07-10 CVE-2012-1890

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle keyboard-layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout Vulnerability."

4.3 2012-07-10 CVE-2012-1870

The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."

7.2 2012-06-12 CVE-2012-0217

The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.

9.3 2012-06-12 CVE-2012-0173

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability," a different vulnerability than CVE-2012-0002.

7.2 2012-05-08 CVE-2012-1848

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Scrollbar Calculation Vulnerability."

7.2 2012-05-08 CVE-2012-0180

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability."

7.2 2012-05-08 CVE-2012-0178

Race condition in partmgr.sys in Windows Partition Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that makes multiple simultaneous Plug and Play (PnP) Configuration Manager function calls, aka "Plug and Play (PnP) Configuration Manager Vulnerability."

9.3 2012-04-10 CVE-2012-0151

The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."

7.2 2012-03-13 CVE-2012-0157

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability."

CWE : Common Weakness Enumeration

%idName
31% (36) CWE-399 Resource Management Errors
27% (31) CWE-20 Improper Input Validation
11% (13) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (9) CWE-264 Permissions, Privileges, and Access Controls
5% (6) CWE-94 Failure to Control Generation of Code ('Code Injection')
4% (5) CWE-189 Numeric Errors
3% (4) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
2% (3) CWE-404 Improper Resource Shutdown or Release
2% (3) CWE-200 Information Exposure
1% (2) CWE-287 Improper Authentication
0% (1) CWE-476 NULL Pointer Dereference
0% (1) CWE-269 Improper Privilege Management

SAINT Exploits

Description Link
Windows Media MIDI Invalid Channel More info here
Microsoft Office ClickOnce Unsafe Execution More info here
Windows Shell LNK file CONTROL item command execution More info here
Microsoft Remote Desktop Connection Insecure Library Injection More info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78211 Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Ex...
78210 Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Co...
78209 Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading Safe...
78207 Microsoft Windows Embedded ClickOnce Application Office File Handling Remote ...
77667 Microsoft Windows Active Directory Query Parsing Remote Overflow
77662 Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
76902 Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication...
76901 Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL ...
76900 Microsoft Windows Malformed TrueType Font Parsing DoS
76899 Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote O...
76231 Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injectio...
76221 Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arb...
76220 Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
76219 Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handl...
76218 Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Co...
75444 Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Esca...
75382 Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Co...
74483 Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
74482 Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
74408 Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL...
74407 Microsoft Windows Kernel File Metadata Handling Remote DoS
74406 Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
74401 Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Devi...
74400 Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
74399 Microsoft Windows DNS Service NAPTR Query Parsing Overflow

ExploitDB Exploits

id Description
24485 MS13-005 HWND_BROADCAST PoC
19037 MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability
18426 MS12-004 midiOutPlayNextPolyEvent Heap Overflow
18372 Microsoft Windows Assembly Execution Vulnerability MS12-005
18024 MS11-077 Win32k Null Pointer De-reference Vulnerability POC
17981 MS11-064 TCP/IP Stack Denial of Service
17978 MS11-077 .fon Kernel-Mode Buffer Overrun PoC
17831 MS WINS ECommEndDlg Input Validation Error
17401 MS HyperV Persistent DoS Vulnerability
15758 Windows Win32k Pointer Dereferencement PoC (MS10-098)
14608 Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048)

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-07-09 Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671...
File : nvt/secpod_ms12-020_remote.nasl
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-24 Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-10 Name : Debian Security Advisory DSA 2501-1 (xen)
File : nvt/deb_2501_1.nasl
2012-08-10 Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8)
File : nvt/deb_2508_1.nasl
2012-08-10 Name : FreeBSD Ports: FreeBSD
File : nvt/freebsd_FreeBSD16.nasl
2012-08-06 Name : Fedora Update for xen FEDORA-2012-11190
File : nvt/gb_fedora_2012_11190_xen_fc16.nasl
2012-07-30 Name : CentOS Update for kernel CESA-2012:0721 centos5
File : nvt/gb_CESA-2012_0721_kernel_centos5.nasl
2012-07-11 Name : Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
File : nvt/secpod_ms12-049.nasl
2012-07-11 Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (27...
File : nvt/secpod_ms12-047.nasl
2012-06-28 Name : Fedora Update for xen FEDORA-2012-9399
File : nvt/gb_fedora_2012_9399_xen_fc16.nasl
2012-06-28 Name : Fedora Update for xen FEDORA-2012-9430
File : nvt/gb_fedora_2012_9430_xen_fc15.nasl
2012-06-15 Name : RedHat Update for kernel RHSA-2012:0721-01
File : nvt/gb_RHSA-2012_0721-01_kernel.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-A-0108 Microsoft TLS Protocol Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0033310
2012-A-0092 Microsoft Remote Desktop Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0032826
2012-B-0052 Microsoft Windows Partition Manager Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0032311
2012-A-0060 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031983
2012-A-0040 Microsoft Windows DNS Server Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0031886
2012-A-0039 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol
Severity: Category I - VMSKEY: V0031885
2012-B-0021 Microsoft Windows Ancillary Function Driver Privilege Escalation Vulnerabilities
Severity: Category II - VMSKEY: V0031355
2012-A-0026 Microsoft Windows C Run-Time Library Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031348
2012-A-0003 Microsoft Windows Kernel Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0030998
2012-A-0005 Multiple Remote Code Execution Vulnerabilities in Microsoft Windows Media
Severity: Category II - VMSKEY: V0031000
2012-A-0007 Microsoft Windows Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0031010
2012-A-0002 Microsoft Windows Components Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0030932
2011-A-0162 Microsoft Windows Client/Server Run-time Subsystem Elevation of Privilege Vul...
Severity: Category II - VMSKEY: V0030835
2011-B-0135 Microsoft Windows Mail and Windows Meeting Space Remote Code Execution Vulner...
Severity: Category II - VMSKEY: V0030608
2011-A-0138 Microsoft Active Accessibility Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0030402
2011-A-0126 Microsoft Windows WINS Server Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0030247
2011-B-0103 Microsoft Windows Remote Desktop Web Access Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0029786
2011-B-0101 Microsoft Windows Data Access Components Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0029783
2011-A-0115 Microsoft Windows Client/Server Run-time Subsystem Elevation of Privilege Vul...
Severity: Category I - VMSKEY: V0029760
2011-B-0104 Microsoft Windows Kernel Remote Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0029745
2011-B-0067 Microsoft Windows Ancillary Function Driver Privilege Escalation Vulnerability
Severity: Category II - VMSKEY: V0028611
2011-B-0065 Microsoft MHTML Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0028617
2011-B-0068 Microsoft Active Directory Certificate Services Web Enrollment Privilege Esca...
Severity: Category II - VMSKEY: V0028615
2011-B-0066 Microsoft Windows Hyper-V Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0028605
2011-A-0078 Microsoft Server Message Block (SMB) Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0028598

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-03-19 Microsoft Windows Data Analyzer 3.5 ActiveX clsid access
RuleID : 53118 - Type : BROWSER-PLUGINS - Revision : 1
2020-03-19 Microsoft Windows Data Analyzer 3.5 ActiveX use-after-free attempt
RuleID : 53117 - Type : BROWSER-PLUGINS - Revision : 1
2020-03-19 Microsoft Windows Data Analyzer 3.5 ActiveX use-after-free attempt
RuleID : 53116 - Type : BROWSER-PLUGINS - Revision : 1
2020-01-03 Microsoft Windows MHTML XSS attempt
RuleID : 52335 - Type : OS-WINDOWS - Revision : 1
2019-09-17 Microsoft Windows Object Packager ClickOnce object remote code execution attempt
RuleID : 51029 - Type : OS-WINDOWS - Revision : 1
2019-09-17 Microsoft Windows Object Packager ClickOnce object remote code execution attempt
RuleID : 51028 - Type : OS-WINDOWS - Revision : 1
2019-09-05 Microsoft Fax Cover Page Editor heap corruption attempt
RuleID : 50873 - Type : OS-WINDOWS - Revision : 1
2019-09-05 Microsoft Fax Cover Page Editor heap corruption attempt
RuleID : 50872 - Type : OS-WINDOWS - Revision : 1
2019-01-15 Microsoft Windows kernel use-after-free attempt
RuleID : 48613 - Type : FILE-EXECUTABLE - Revision : 1
2019-01-15 Microsoft Windows kernel use-after-free attempt
RuleID : 48612 - Type : FILE-EXECUTABLE - Revision : 1
2019-01-15 Microsoft Windows win32k NtGdiCreateDIBitmapInternal memory corruption attempt
RuleID : 48607 - Type : OS-WINDOWS - Revision : 1
2019-01-15 Microsoft Windows win32k NtGdiCreateDIBitmapInternal memory corruption attempt
RuleID : 48606 - Type : OS-WINDOWS - Revision : 1
2017-10-10 Microsoft DirectShow memory corruption attempt
RuleID : 44306 - Type : OS-WINDOWS - Revision : 2
2017-10-10 Microsoft DirectShow memory corruption attempt
RuleID : 44305 - Type : OS-WINDOWS - Revision : 2
2017-02-21 Microsoft Windows RtlQueryRegistryValues buffer overflow attempt
RuleID : 41365 - Type : OS-WINDOWS - Revision : 3
2016-09-13 Microsoft Windows win32k.sys escalation of privilege attempt
RuleID : 39863 - Type : OS-WINDOWS - Revision : 2
2016-03-14 Microsoft Windows wininet request for peerdistsvc.dll over SMB attempt
RuleID : 36805 - Type : OS-WINDOWS - Revision : 3
2016-03-14 Microsoft Windows wininet peerdistsvc.dll dll-load exploit attempt
RuleID : 36804 - Type : OS-WINDOWS - Revision : 3
2015-07-13 Win.Trojan.Fanny outbound connection
RuleID : 34857 - Type : MALWARE-CNC - Revision : 2
2015-06-23 Microsoft Windows Font Library file buffer overflow attempt
RuleID : 34566 - Type : FILE-OTHER - Revision : 3
2015-04-07 Microsoft Windows Media MIDI file memory corruption attempt
RuleID : 33684 - Type : FILE-OTHER - Revision : 3
2015-03-17 Microsoft Windows Comctl32.dll third-party SVG viewer heap overflow attempt
RuleID : 33479 - Type : OS-WINDOWS - Revision : 2
2015-01-20 Microsoft Internet Explorer 8 Developer Tool ActiveX clsid access
RuleID : 32843 - Type : BROWSER-PLUGINS - Revision : 3
2015-01-20 Microsoft Internet Explorer 8 Developer Tool ActiveX clsid access
RuleID : 32842 - Type : BROWSER-PLUGINS - Revision : 4
2015-01-20 Microsoft Internet Explorer 8 Developer Tool ActiveX clsid access
RuleID : 32840 - Type : BROWSER-PLUGINS - Revision : 4

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2014-11-26 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2012-0020.nasl - Type: ACT_GATHER_INFO
2014-11-26 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2012-0021.nasl - Type: ACT_GATHER_INFO
2014-11-26 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2012-0022.nasl - Type: ACT_GATHER_INFO
2014-07-26 Name: The remote Solaris system is missing a security patch from CPU oct2012.
File: solaris_oct2012_SRU10_5.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2012-403.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2012-404.nasl - Type: ACT_GATHER_INFO
2014-03-05 Name: The DNS server running on the remote host has multiple vulnerabilities.
File: ms_dns_kb2562485.nasl - Type: ACT_GATHER_INFO
2014-03-05 Name: The DNS server running on the remote host is susceptible to a denial of servi...
File: ms_dns_kb2647170.nasl - Type: ACT_GATHER_INFO
2013-09-28 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201309-24.nasl - Type: ACT_GATHER_INFO
2013-07-12 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2012-0721-1.nasl - Type: ACT_GATHER_INFO
2013-07-12 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2012-0721.nasl - Type: ACT_GATHER_INFO
2013-02-12 Name: The remote Windows host is affected by a denial of service vulnerability.
File: smb_nt_ms13-018.nasl - Type: ACT_GATHER_INFO
2013-01-25 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_xen-201206-120606.nasl - Type: ACT_GATHER_INFO
2013-01-24 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2012-0720.nasl - Type: ACT_GATHER_INFO
2013-01-09 Name: The Windows kernel on the remote host is affected by a privilege escalation v...
File: smb_nt_ms13-005.nasl - Type: ACT_GATHER_INFO
2012-12-11 Name: The remote Windows host is affected by remote code execution vulnerabilities.
File: smb_nt_ms12-078.nasl - Type: ACT_GATHER_INFO
2012-08-01 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20120612_kernel_on_SL5_x.nasl - Type: ACT_GATHER_INFO
2012-07-23 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2508.nasl - Type: ACT_GATHER_INFO
2012-07-11 Name: The remote Windows host is affected by multiple privilege escalation vulnerab...
File: smb_nt_ms12-047.nasl - Type: ACT_GATHER_INFO
2012-07-11 Name: The remote Windows host has an information disclosure vulnerability.
File: smb_nt_ms12-049.nasl - Type: ACT_GATHER_INFO
2012-06-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2501.nasl - Type: ACT_GATHER_INFO
2012-06-28 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_aed44c4ec06711e1b5e0000c299b62e1.nasl - Type: ACT_GATHER_INFO
2012-06-26 Name: The remote Fedora host is missing a security update.
File: fedora_2012-9386.nasl - Type: ACT_GATHER_INFO
2012-06-26 Name: The remote Fedora host is missing a security update.
File: fedora_2012-9399.nasl - Type: ACT_GATHER_INFO
2012-06-26 Name: The remote Fedora host is missing a security update.
File: fedora_2012-9430.nasl - Type: ACT_GATHER_INFO