Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2018-10-10 |
Product | Windows Server 2019 | Last view | 2022-06-15 |
Version | - | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_server_2019 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-06-15 | CVE-2022-30166 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30165 | Windows Kerberos Elevation of Privilege Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30164 | Kerberos AppContainer Security Feature Bypass Vulnerability. |
8.5 | 2022-06-15 | CVE-2022-30163 | Windows Hyper-V Remote Code Execution Vulnerability. |
5.5 | 2022-06-15 | CVE-2022-30162 | Windows Kernel Information Disclosure Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30161 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153. |
7.8 | 2022-06-15 | CVE-2022-30160 | Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability. |
5.5 | 2022-06-15 | CVE-2022-30155 | Windows Kernel Denial of Service Vulnerability. |
5.3 | 2022-06-15 | CVE-2022-30154 | Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30153 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30152 | Windows Network Address Translation (NAT) Denial of Service Vulnerability. |
7 | 2022-06-15 | CVE-2022-30151 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability. |
8.1 | 2022-06-15 | CVE-2022-30150 | Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30149 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161. |
5.5 | 2022-06-15 | CVE-2022-30148 | Windows Desired State Configuration (DSC) Information Disclosure Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30147 | Windows Installer Elevation of Privilege Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30146 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
8.1 | 2022-06-15 | CVE-2022-30145 | Windows Encrypting File System (EFS) Remote Code Execution Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30143 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30142 | Windows File History Remote Code Execution Vulnerability. |
8.1 | 2022-06-15 | CVE-2022-30141 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30140 | Windows iSCSI Discovery Service Remote Code Execution Vulnerability. |
8.1 | 2022-06-15 | CVE-2022-30139 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
9.8 | 2022-06-15 | CVE-2022-30136 | Windows Network File System Remote Code Execution Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30132 | Windows Container Manager Service Elevation of Privilege Vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
35% (231) | CWE-269 | Improper Privilege Management |
10% (68) | CWE-200 | Information Exposure |
9% (60) | CWE-787 | Out-of-bounds Write |
7% (50) | CWE-20 | Improper Input Validation |
5% (34) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
4% (29) | CWE-362 | Race Condition |
3% (23) | CWE-668 | Exposure of Resource to Wrong Sphere |
2% (15) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (15) | CWE-125 | Out-of-bounds Read |
1% (12) | CWE-404 | Improper Resource Shutdown or Release |
1% (11) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (11) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (9) | CWE-665 | Improper Initialization |
1% (9) | CWE-190 | Integer Overflow or Wraparound |
1% (8) | CWE-416 | Use After Free |
0% (5) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (5) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
0% (5) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
0% (4) | CWE-295 | Certificate Issues |
0% (4) | CWE-19 | Data Handling |
0% (3) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (3) | CWE-347 | Improper Verification of Cryptographic Signature |
0% (3) | CWE-290 | Authentication Bypass by Spoofing |
0% (3) | CWE-264 | Permissions, Privileges, and Access Controls |
0% (3) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56856 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56855 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56854 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56853 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56852 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56851 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56850 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56849 - Type : OS-WINDOWS - Revision : 1 |
2021-01-28 | Cisco RV Series Routers stack buffer overflow attempt RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2 |
2021-01-12 | Microsoft Windows SMB2 SET_INFO information disclosure attempt RuleID : 56571 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56562 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56561 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Microsoft Windows NFS v3 Server heap overflow denial of service attempt RuleID : 56312 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Microsoft Windows NFS v3 Server heap overflow denial of service attempt RuleID : 56311 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Windows Network File System denial of service attempt RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56302 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56301 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56296 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56295 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt RuleID : 56290 - Type : OS-WINDOWS - Revision : 6 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56262 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56261 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k DirectComposition privilege escalation attempt RuleID : 56260 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k DirectComposition privilege escalation attempt RuleID : 56259 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt RuleID : 56255 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-10-22 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO |