Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2020-11-11 |
Product | Windows Server 2016 | Last view | 2022-06-15 |
Version | 20h2 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_server_2016 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-06-15 | CVE-2022-30166 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30165 | Windows Kerberos Elevation of Privilege Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30164 | Kerberos AppContainer Security Feature Bypass Vulnerability. |
8.5 | 2022-06-15 | CVE-2022-30163 | Windows Hyper-V Remote Code Execution Vulnerability. |
5.5 | 2022-06-15 | CVE-2022-30162 | Windows Kernel Information Disclosure Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30161 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153. |
7.8 | 2022-06-15 | CVE-2022-30160 | Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability. |
5.5 | 2022-06-15 | CVE-2022-30155 | Windows Kernel Denial of Service Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30153 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30152 | Windows Network Address Translation (NAT) Denial of Service Vulnerability. |
7 | 2022-06-15 | CVE-2022-30151 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30149 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30146 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30143 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
8.1 | 2022-06-15 | CVE-2022-30141 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30140 | Windows iSCSI Discovery Service Remote Code Execution Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30131 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability. |
7.8 | 2022-05-18 | CVE-2022-30138 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104, CVE-2022-29132. |
5.5 | 2022-04-15 | CVE-2022-26920 | Windows Graphics Component Information Disclosure Vulnerability. |
8.1 | 2022-04-15 | CVE-2022-26919 | Windows LDAP Remote Code Execution Vulnerability. |
7.8 | 2022-04-15 | CVE-2022-26918 | Windows Fax Compose Form Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-26916, CVE-2022-26917. |
7.8 | 2022-04-15 | CVE-2022-26917 | Windows Fax Compose Form Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-26916, CVE-2022-26918. |
7.8 | 2022-04-15 | CVE-2022-26916 | Windows Fax Compose Form Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-26917, CVE-2022-26918. |
7.5 | 2022-04-15 | CVE-2022-26915 | Windows Secure Channel Denial of Service Vulnerability. |
7.8 | 2022-04-15 | CVE-2022-26914 | Win32k Elevation of Privilege Vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
64% (134) | CWE-269 | Improper Privilege Management |
12% (26) | CWE-200 | Information Exposure |
7% (16) | CWE-362 | Race Condition |
3% (8) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
2% (5) | CWE-787 | Out-of-bounds Write |
1% (4) | CWE-416 | Use After Free |
0% (2) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (2) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
0% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
0% (1) | CWE-668 | Exposure of Resource to Wrong Sphere |
0% (1) | CWE-639 | Access Control Bypass Through User-Controlled Key |
0% (1) | CWE-294 | Authentication Bypass by Capture-replay |
0% (1) | CWE-290 | Authentication Bypass by Spoofing |
0% (1) | CWE-190 | Integer Overflow or Wraparound |
0% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
0% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
0% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
0% (1) | CWE-20 | Improper Input Validation |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56856 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56855 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56854 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56853 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56852 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56851 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56850 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56849 - Type : OS-WINDOWS - Revision : 1 |
2021-01-12 | Microsoft Windows SMB2 SET_INFO information disclosure attempt RuleID : 56571 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56562 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56561 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Microsoft Windows NFS v3 Server heap overflow denial of service attempt RuleID : 56312 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Microsoft Windows NFS v3 Server heap overflow denial of service attempt RuleID : 56311 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Windows Network File System denial of service attempt RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56302 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56301 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56296 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56295 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k privilege escalation attempt RuleID : 56264 - Type : FILE-EXECUTABLE - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k privilege escalation attempt RuleID : 56263 - Type : FILE-EXECUTABLE - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56262 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56261 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k DirectComposition privilege escalation attempt RuleID : 56260 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k DirectComposition privilege escalation attempt RuleID : 56259 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt RuleID : 56255 - Type : OS-WINDOWS - Revision : 1 |