This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2016-11-10
Product Windows Server 2016 Last view 2020-07-29
Version - Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2016

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.4 2020-07-29 CVE-2020-15707

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15706

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15705

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.

6.5 2020-07-14 CVE-2020-1468

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.

7.8 2020-07-14 CVE-2020-1463

An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory, aka 'Windows SharedStream Library Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1438

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428.

7.8 2020-07-14 CVE-2020-1437

An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows Network Location Awareness Service Elevation of Privilege Vulnerability'.

8.8 2020-07-14 CVE-2020-1436

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'.

8.8 2020-07-14 CVE-2020-1435

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.

5.3 2020-07-14 CVE-2020-1434

An elevation of privilege vulnerability exists in the way that the Windows Sync Host Service handles objects in memory, aka 'Windows Sync Host Service Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1430

An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows UPnP Device Host Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1354.

7.8 2020-07-14 CVE-2020-1429

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1428

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1438.

7.8 2020-07-14 CVE-2020-1427

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438.

8.8 2020-07-14 CVE-2020-1421

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.

5.5 2020-07-14 CVE-2020-1420

An information disclosure vulnerability exists when Windows Error Reporting improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Error Reporting Information Disclosure Vulnerability'.

5.5 2020-07-14 CVE-2020-1419

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1426.

8.8 2020-07-14 CVE-2020-1416

An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka 'Visual Studio and Visual Studio Code Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1413

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.

8.8 2020-07-14 CVE-2020-1412

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1411

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1336.

7.8 2020-07-14 CVE-2020-1410

A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1409

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'.

8.8 2020-07-14 CVE-2020-1408

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1407

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1401.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
29% (299) CWE-269 Improper Privilege Management
24% (246) CWE-200 Information Exposure
18% (180) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
9% (98) CWE-20 Improper Input Validation
6% (69) CWE-264 Permissions, Privileges, and Access Controls
2% (28) CWE-404 Improper Resource Shutdown or Release
1% (12) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (10) CWE-254 Security Features
0% (6) CWE-284 Access Control (Authorization) Issues
0% (5) CWE-19 Data Handling
0% (4) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (4) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (4) CWE-281 Improper Preservation of Permissions
0% (3) CWE-295 Certificate Issues
0% (3) CWE-287 Improper Authentication
0% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
0% (3) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (2) CWE-522 Insufficiently Protected Credentials
0% (2) CWE-502 Deserialization of Untrusted Data
0% (2) CWE-434 Unrestricted Upload of File with Dangerous Type
0% (2) CWE-416 Use After Free
0% (2) CWE-362 Race Condition
0% (1) CWE-755 Improper Handling of Exceptional Conditions
0% (1) CWE-668 Exposure of Resource to Wrong Sphere
0% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

SAINT Exploits

Description Link
Windows RRAS Service Remote Code Execution Vulnerability More info here

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54297 - Type : OS-WINDOWS - Revision : 1
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54296 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows kernel security feature bypass attempt
RuleID : 54250 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows kernel security feature bypass attempt
RuleID : 54249 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54248 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54247 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54242 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54241 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows SMBv1 remote code execution attempt
RuleID : 54240 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54216 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54215 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53984 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53983 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53951 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53950 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53933 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53932 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 53917 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 53916 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows CF_PALETTE privilege escalation attempt
RuleID : 53653 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows CF_PALETTE privilege escalation attempt
RuleID : 53652 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Kernel CSRSS privilege escalation attempt
RuleID : 53630 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Kernel CSRSS privilege escalation attempt
RuleID : 53629 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 53628 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 53627 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO
2017-10-17 Name: The remote Windows host is affected by multiple vulnerabilities.
File: ms17_oct_smbv1_multi_vulns.nasl - Type: ACT_GATHER_INFO
2017-10-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_win2008.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041693.nasl - Type: ACT_GATHER_INFO