This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2018-10-10
Product Windows Server 2019 Last view 2022-01-11
Version - Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2019

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.8 2022-01-11 CVE-2022-21963

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962.

6.8 2022-01-11 CVE-2022-21962

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21963.

6.8 2022-01-11 CVE-2022-21961

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21962, CVE-2022-21963.

6.8 2022-01-11 CVE-2022-21960

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

6.8 2022-01-11 CVE-2022-21959

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

6.8 2022-01-11 CVE-2022-21958

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

6.4 2022-01-11 CVE-2022-21928

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

5.3 2022-01-11 CVE-2022-21924

Workstation Service Remote Protocol Security Feature Bypass Vulnerability.

8.8 2022-01-11 CVE-2022-21922

Remote Procedure Call Runtime Remote Code Execution Vulnerability.

8.8 2022-01-11 CVE-2022-21920

Windows Kerberos Elevation of Privilege Vulnerability.

7 2022-01-11 CVE-2022-21919

Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895.

6.5 2022-01-11 CVE-2022-21918

DirectX Graphics Kernel File Denial of Service Vulnerability.

7.8 2022-01-11 CVE-2022-21916

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21897.

6.5 2022-01-11 CVE-2022-21915

Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21880.

7.8 2022-01-11 CVE-2022-21914

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21885.

7.5 2022-01-11 CVE-2022-21913

Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass.

7.8 2022-01-11 CVE-2022-21912

DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21898.

7.8 2022-01-11 CVE-2022-21910

Microsoft Cluster Port Driver Elevation of Privilege Vulnerability.

7.8 2022-01-11 CVE-2022-21908

Windows Installer Elevation of Privilege Vulnerability.

9.8 2022-01-11 CVE-2022-21907

HTTP Protocol Stack Remote Code Execution Vulnerability.

5.5 2022-01-11 CVE-2022-21906

Windows Defender Application Control Security Feature Bypass Vulnerability.

8 2022-01-11 CVE-2022-21905

Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21900.

7.5 2022-01-11 CVE-2022-21904

Windows GDI Information Disclosure Vulnerability.

7.8 2022-01-11 CVE-2022-21903

Windows GDI Elevation of Privilege Vulnerability.

7.8 2022-01-11 CVE-2022-21902

Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21896.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
39% (237) CWE-269 Improper Privilege Management
11% (68) CWE-200 Information Exposure
10% (60) CWE-787 Out-of-bounds Write
8% (49) CWE-20 Improper Input Validation
4% (27) CWE-59 Improper Link Resolution Before File Access ('Link Following')
2% (15) CWE-125 Out-of-bounds Read
2% (12) CWE-404 Improper Resource Shutdown or Release
1% (11) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (10) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (9) CWE-665 Improper Initialization
1% (9) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (9) CWE-190 Integer Overflow or Wraparound
1% (8) CWE-668 Exposure of Resource to Wrong Sphere
1% (6) CWE-416 Use After Free
0% (5) CWE-755 Improper Handling of Exceptional Conditions
0% (5) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (4) CWE-362 Race Condition
0% (4) CWE-295 Certificate Issues
0% (4) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
0% (4) CWE-19 Data Handling
0% (3) CWE-347 Improper Verification of Cryptographic Signature
0% (3) CWE-264 Permissions, Privileges, and Access Controls
0% (3) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
0% (2) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (2) CWE-522 Insufficiently Protected Credentials

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56562 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56561 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Microsoft Windows NFS v3 Server heap overflow denial of service attempt
RuleID : 56312 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Microsoft Windows NFS v3 Server heap overflow denial of service attempt
RuleID : 56311 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56302 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56301 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k DirectComposition privilege escalation attempt
RuleID : 56260 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k DirectComposition privilege escalation attempt
RuleID : 56259 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows DirectX graphics kernel subsystem privilege escalation attempt
RuleID : 56255 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

id Description
2018-10-22 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO