Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2007-09-27 |
Product | Windows Xp | Last view | 2011-06-16 |
Version | * | Type | Os |
Update | sp2 | ||
Edition | x64 | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_xp |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.3 | 2011-06-16 | CVE-2011-1894 | The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for embedded content in an HTML document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted EMBED element in a web page that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability." |
9.3 | 2011-03-09 | CVE-2011-0042 | SBE.dll in the Stream Buffer Engine in Windows Media Player and Windows Media Center in Microsoft Windows XP SP2 and SP3, Windows XP Media Center Edition 2005 SP3, Windows Vista SP1 and SP2, Windows 7 Gold and SP1, and Windows Media Center TV Pack for Windows Vista does not properly parse Digital Video Recording (.dvr-ms) files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DVR-MS Vulnerability." |
4.3 | 2011-01-31 | CVE-2011-0096 | The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for content blocks in a document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability." |
9.3 | 2010-02-10 | CVE-2010-0250 | Heap-based buffer overflow in DirectShow in Microsoft DirectX, as used in the AVI Filter on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2, and in Quartz on Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, allows remote attackers to execute arbitrary code via an AVI file with a crafted length field in an unspecified video stream, which is not properly handled by the RLE video decompressor, aka "DirectShow Heap Overflow Vulnerability." |
9.3 | 2010-02-04 | CVE-2010-0555 | Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving the product's use of text/html as the default content type for files that are encountered after a redirection, aka the URLMON sniffing vulnerability, a variant of CVE-2009-1140 and related to CVE-2008-1448. |
6.8 | 2009-12-09 | CVE-2009-3675 | LSASS.exe in the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote authenticated users to cause a denial of service (CPU consumption) via a malformed ISAKMP request over IPsec, aka "Local Security Authority Subsystem Service Resource Exhaustion Vulnerability." |
9.3 | 2009-12-09 | CVE-2009-3674 | Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671. |
9.3 | 2009-12-09 | CVE-2009-3673 | Microsoft Internet Explorer 7 and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability." |
9.3 | 2009-12-09 | CVE-2009-3671 | Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674. |
9.3 | 2009-12-09 | CVE-2009-2506 | Integer overflow in the text converters in Microsoft Office Word 2002 SP3 and 2003 SP3; Works 8.5; Office Converter Pack; and WordPad in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a DOC file with an invalid number of property names in the DocumentSummaryInformation stream, which triggers a heap-based buffer overflow. |
9.3 | 2009-10-14 | CVE-2009-2525 | Microsoft Windows Media Runtime, as used in DirectShow WMA Voice Codec, Windows Media Audio Voice Decoder, and Audio Compression Manager (ACM), does not properly initialize unspecified functions within compressed audio files, which allows remote attackers to execute arbitrary code via (1) a crafted media file or (2) crafted streaming content, aka "Windows Media Runtime Heap Corruption Vulnerability." |
6.9 | 2009-10-14 | CVE-2009-2516 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly validate data sent from user mode, which allows local users to gain privileges via a crafted PE .exe file that triggers a NULL pointer dereference during chain traversal, aka "Windows Kernel NULL Pointer Dereference Vulnerability." |
7.2 | 2009-10-14 | CVE-2009-2515 | Integer underflow in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows local users to gain privileges via a crafted application that triggers an incorrect truncation of a 64-bit integer to a 32-bit integer, aka "Windows Kernel Integer Underflow Vulnerability." |
10 | 2009-08-12 | CVE-2009-1930 | The Telnet service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote Telnet servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, aka "Telnet Credential Reflection Vulnerability," a related issue to CVE-2000-0834. |
9.3 | 2009-08-12 | CVE-2009-1929 | Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3; allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Remote Desktop Connection ActiveX Control Heap Overflow Vulnerability." |
8.5 | 2009-08-12 | CVE-2009-1546 | Integer overflow in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows allows remote attackers to execute arbitrary code on a Windows 2000 SP4 system via a crafted AVI file, or cause a denial of service on a Windows XP SP2 or SP3, Server 2003 SP2, Vista Gold, SP1, or SP2, or Server 2008 Gold or SP2 system via a crafted AVI file, aka "AVI Integer Overflow Vulnerability." |
9.3 | 2009-08-12 | CVE-2009-1545 | Unspecified vulnerability in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a malformed header in a crafted AVI file, aka "Malformed AVI Header Vulnerability." |
9 | 2009-08-12 | CVE-2009-1544 | Double free vulnerability in the Workstation service in Microsoft Windows allows remote authenticated users to gain privileges via a crafted RPC message to a Windows XP SP2 or SP3 or Server 2003 SP2 system, or cause a denial of service via a crafted RPC message to a Vista Gold, SP1, or SP2 or Server 2008 Gold or SP2 system, aka "Workstation Service Memory Corruption Vulnerability." |
7.1 | 2009-03-10 | CVE-2009-0085 | The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability." |
7.2 | 2009-03-10 | CVE-2009-0083 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 does not properly handle invalid pointers, which allows local users to gain privileges via an application that triggers use of a crafted pointer, aka "Windows Kernel Invalid Pointer Vulnerability." |
7.2 | 2009-03-10 | CVE-2009-0082 | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate handles, which allows local users to gain privileges via a crafted application that triggers unspecified "actions," aka "Windows Kernel Handle Validation Vulnerability." |
9.3 | 2009-03-10 | CVE-2009-0081 | The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability." |
7.1 | 2008-10-20 | CVE-2008-4609 | The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. |
10 | 2008-10-14 | CVE-2008-4038 | Buffer underflow in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a Server Message Block (SMB) request that contains a filename with a crafted length, aka "SMB Buffer Underflow Vulnerability." |
7.2 | 2008-10-14 | CVE-2008-4036 | Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
21% (7) | CWE-20 | Improper Input Validation |
18% (6) | CWE-399 | Resource Management Errors |
15% (5) | CWE-189 | Numeric Errors |
15% (5) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
12% (4) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
6% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
3% (1) | CWE-287 | Improper Authentication |
3% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
3% (1) | CWE-255 | Credentials Management |
3% (1) | CWE-16 | Configuration |
SAINT Exploits
Description | Link |
---|---|
Microsoft Windows Media Player DVR-MS File Code Execution | More info here |
Windows Telnet credential reflection | More info here |
Windows GDI EMF filename buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
72935 | Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS |
71016 | Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code ... |
70693 | Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS |
62257 | Microsoft Windows DirectShow AVI File Decompression Overflow |
62157 | Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access |
62144 | F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St... |
61133 | Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC... |
60839 | Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution |
60838 | Microsoft IE CSS Element Access Race Condition Memory Corruption |
60837 | Microsoft IE XHTML DOM Manipulation Memory Corruption |
60834 | Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corrup... |
60831 | Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message H... |
59482 | Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation... |
58860 | Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Pr... |
58859 | Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege E... |
58845 | Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruptio... |
58614 | McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio... |
58321 | Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati... |
58189 | Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC... |
57993 | Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem... |
57795 | Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State... |
57794 | Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl... |
57793 | Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta... |
56912 | Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow |
56909 | Microsoft Windows AVI Media File Parsing Unspecified Overflow |
OpenVAS Exploits
id | Description |
---|---|
2011-06-15 | Name : Windows MHTML Information Disclosure Vulnerability (2544893) File : nvt/secpod_ms11-037.nasl |
2011-04-13 | Name : Windows MHTML Information Disclosure Vulnerability (2503658) File : nvt/secpod_ms11-026.nasl |
2011-03-09 | Name : Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030) File : nvt/secpod_ms11-015.nasl |
2011-02-05 | Name : Microsoft Internet Explorer Information Disclosure Vulnerability (2501696) File : nvt/secpod_ms_ie_mhtml_info_disc_vuln.nasl |
2011-01-18 | Name : Microsoft Active Directory Denial of Service Vulnerability (953235) File : nvt/gb_ms08-035.nasl |
2011-01-10 | Name : Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerab... File : nvt/gb_ms08-025.nasl |
2010-02-10 | Name : Microsoft DirectShow Remote Code Execution Vulnerability (977935) File : nvt/secpod_ms10-013.nasl |
2009-12-09 | Name : WordPad and Office Text Converters Remote Code Execution Vulnerability (975539) File : nvt/secpod_ms09-073.nasl |
2009-12-09 | Name : Microsoft Windows LSASS Denial of Service Vulnerability (975467) File : nvt/secpod_ms09-069.nasl |
2009-12-04 | Name : MS Internet Explorer 'Style' Object Remote Code Execution Vulnerability File : nvt/gb_ms_ie_style_object_remote_code_exec_vuln.nasl |
2009-10-14 | Name : Microsoft Windows Kernel Privilege Escalation Vulnerability (971486) File : nvt/secpod_ms09-058.nasl |
2009-10-14 | Name : Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution (9... File : nvt/secpod_ms09-051.nasl |
2009-09-10 | Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723) File : nvt/secpod_ms09-048.nasl |
2009-08-12 | Name : Telnet NTLM Credential Reflection Authentication Bypass Vulnerability (960859) File : nvt/secpod_ms09-042.nasl |
2009-08-12 | Name : Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706) File : nvt/secpod_ms09-044.nasl |
2009-08-12 | Name : Vulnerability in Workstation Service Could Allow Elevation of Privilege (971657) File : nvt/secpod_ms09-041.nasl |
2009-08-12 | Name : Microsoft Windows AVI Media File Parsing Vulnerabilities (971557) File : nvt/secpod_ms09-038.nasl |
2009-03-11 | Name : Vulnerability in SChannel Could Allow Spoofing (960225) File : nvt/secpod_ms09-007.nasl |
2009-03-11 | Name : Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690) File : nvt/secpod_ms09-006.nasl |
2008-10-15 | Name : Virtual Address Descriptor Manipulation Elevation of Privilege Vulnerability ... File : nvt/secpod_ms08-064_900225.nasl |
2008-10-15 | Name : SMB Remote Code Execution Vulnerability (957095) File : nvt/secpod_ms08-063_900053.nasl |
2008-10-15 | Name : Windows Kernel Elevation of Privilege Vulnerability (954211) File : nvt/secpod_ms08-061_900051.nasl |
2008-09-30 | Name : Bluetooth Stack Could Allow Remote Code Execution Vulnerability (951376) File : nvt/gb_ms08-030.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2011-B-0065 | Microsoft MHTML Information Disclosure Vulnerability Severity: Category II - VMSKEY: V0028617 |
2011-A-0031 | Multiple Vulnerabilities in Microsoft Windows Media Severity: Category II - VMSKEY: V0026088 |
2010-A-0025 | Microsoft DirectShow Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0022679 |
2009-A-0128 | Microsoft WordPad and Office Text Converters Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0021551 |
2009-B-0064 | Microsoft Windows Local Security Authority Subsystem Service (LSASS) Denial o... Severity: Category II - VMSKEY: V0022096 |
2009-A-0091 | Multiple Vulnerabilities in Microsoft Windows Media Runtime Severity: Category II - VMSKEY: V0021744 |
2009-B-0037 | Microsoft Telnet Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0019879 |
2009-B-0035 | Microsoft Windows Workstation Service Elevation of Privilege Vulnerability Severity: Category II - VMSKEY: V0019880 |
2009-A-0071 | Multiple Vulnerabilities in Microsoft Remote Desktop Connection Severity: Category II - VMSKEY: V0019884 |
2009-A-0019 | Microsoft Windows Secure Channel Vulnerability Severity: Category II - VMSKEY: V0018549 |
2008-B-0049 | Microsoft Bluetooth Stack Remote Code Execution Vulnerability (951376) Severity: Category I - VMSKEY: V0016051 |
2008-A-0041 | Microsoft Active Directory Denial of Service Vulnerability Severity: Category I - VMSKEY: V0016040 |
2008-B-0034 | Microsoft VBScript and JScript Scripting Engines Remote Code Execution Severity: Category II - VMSKEY: V0015940 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-03 | Microsoft Windows MHTML XSS attempt RuleID : 52335 - Type : OS-WINDOWS - Revision : 1 |
2019-10-10 | Microsoft Windows WordPad and Office text converter integer overflow attempt RuleID : 51473 - Type : FILE-OFFICE - Revision : 1 |
2019-10-10 | Microsoft Windows WordPad and Office text converter integer overflow attempt RuleID : 51472 - Type : FILE-OFFICE - Revision : 1 |
2019-09-05 | Microsoft Windows GDI EMF parsing arbitrary code execution attempt RuleID : 50885 - Type : FILE-OTHER - Revision : 1 |
2019-09-05 | Microsoft Windows GDI EMF parsing arbitrary code execution attempt RuleID : 50884 - Type : FILE-OTHER - Revision : 1 |
2017-10-10 | Microsoft DirectShow memory corruption attempt RuleID : 44306 - Type : OS-WINDOWS - Revision : 2 |
2017-10-10 | Microsoft DirectShow memory corruption attempt RuleID : 44305 - Type : OS-WINDOWS - Revision : 2 |
2017-07-25 | Microsoft Windows DirectX directshow wav file overflow attempt RuleID : 43270 - Type : FILE-MULTIMEDIA - Revision : 1 |
2017-07-25 | Microsoft Windows DirectX directshow wav file overflow attempt RuleID : 43269 - Type : FILE-MULTIMEDIA - Revision : 1 |
2016-11-08 | Microsoft Windows Media Runtime malformed ASF codec memory corruption attempt RuleID : 40354 - Type : OS-WINDOWS - Revision : 2 |
2016-04-19 | DCERPC Direct detection of malicious DCE RPC request in suspicious pcap RuleID : 38264 - Type : OS-WINDOWS - Revision : 1 |
2014-01-10 | Microsoft Windows AVIFile truncated media file processing memory corruption a... RuleID : 23569 - Type : FILE-MULTIMEDIA - Revision : 5 |
2014-01-10 | Microsoft Windows AVIFile media file processing memory corruption attempt RuleID : 23568 - Type : FILE-MULTIMEDIA - Revision : 5 |
2014-01-10 | Microsoft Windows AVI Header insufficient data corruption attempt RuleID : 23567 - Type : FILE-MULTIMEDIA - Revision : 5 |
2014-01-10 | Microsoft Windows MHTML XSS attempt RuleID : 23563 - Type : FILE-OTHER - Revision : 4 |
2014-01-10 | Microsoft MHTML XSS attempt RuleID : 23562 - Type : FILE-OTHER - Revision : 3 |
2014-01-10 | Microsoft Internet Explorer 8 DOM memory corruption attempt RuleID : 21994 - Type : BROWSER-IE - Revision : 5 |
2014-01-10 | Microsoft Windows SMB Trans2 Find_First2 filename overflow attempt RuleID : 21529 - Type : OS-WINDOWS - Revision : 9 |
2014-01-10 | Microsoft Internet Explorer orphan DOM objects memory corruption attempt RuleID : 21272 - Type : BROWSER-IE - Revision : 5 |
2014-01-10 | Microsoft Windows Remote Desktop Client ActiveX clsid access RuleID : 20175 - Type : BROWSER-PLUGINS - Revision : 12 |
2014-01-10 | MHTML XSS attempt RuleID : 20133 - Type : FILE-OTHER - Revision : 10 |
2014-01-10 | Microsoft Windows AVI Header insufficient data corruption attempt RuleID : 19320 - Type : FILE-MULTIMEDIA - Revision : 13 |
2014-01-10 | Microsoft Media Player dvr-ms file parsing remote code execution attempt RuleID : 18498 - Type : FILE-OTHER - Revision : 16 |
2014-01-10 | Microsoft Windows MHTML XSS attempt RuleID : 18335 - Type : OS-WINDOWS - Revision : 21 |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 17723 - Type : OS-WINDOWS - Revision : 12 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2014-10-10 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL10509.nasl - Type: ACT_GATHER_INFO |
2011-06-15 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms11-037.nasl - Type: ACT_GATHER_INFO |
2011-04-13 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms11-026.nasl - Type: ACT_GATHER_INFO |
2011-03-08 | Name: The version of Windows Media installed on the remote host has multiple code e... File: smb_nt_ms11-015.nasl - Type: ACT_GATHER_INFO |
2010-09-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20090908-tcp24http.nasl - Type: ACT_GATHER_INFO |
2010-02-09 | Name: It is possible to execute arbitrary code on the remote Windows host using Dir... File: smb_nt_ms10-013.nasl - Type: ACT_GATHER_INFO |
2009-12-08 | Name: Arbitrary code can be executed on the remote host through opening a Microsoft... File: smb_nt_ms09-073.nasl - Type: ACT_GATHER_INFO |
2009-12-08 | Name: Arbitrary code can be executed on the remote host through a web browser. File: smb_nt_ms09-072.nasl - Type: ACT_GATHER_INFO |
2009-12-08 | Name: The remote Windows host has a denial of service vulnerability. File: smb_nt_ms09-069.nasl - Type: ACT_GATHER_INFO |
2009-10-13 | Name: The Windows kernel is vulnerable to multiple buffer overflow attacks. File: smb_nt_ms09-058.nasl - Type: ACT_GATHER_INFO |
2009-10-13 | Name: Arbitrary code can be executed on the remote host through opening a Windows M... File: smb_nt_ms09-051.nasl - Type: ACT_GATHER_INFO |
2009-09-08 | Name: Multiple vulnerabilities in the Windows TCP/IP implementation could lead to d... File: smb_nt_ms09-048.nasl - Type: ACT_GATHER_INFO |
2009-08-11 | Name: Users can elevate their privileges on the remote host. File: smb_nt_ms09-041.nasl - Type: ACT_GATHER_INFO |
2009-08-11 | Name: It is possible to execute arbitrary code on the remote host. File: smb_nt_ms09-044.nasl - Type: ACT_GATHER_INFO |
2009-08-11 | Name: Arbitrary code can be executed on the remote host through the remote Telnet c... File: smb_nt_ms09-042.nasl - Type: ACT_GATHER_INFO |
2009-08-11 | Name: Arbitrary code can be executed on the remote host through Windows Media file ... File: smb_nt_ms09-038.nasl - Type: ACT_GATHER_INFO |
2009-08-11 | Name: Arbitrary code can be executed on the remote host through Microsoft Remote De... File: macosx_rdesktop.nasl - Type: ACT_GATHER_INFO |
2009-03-11 | Name: It may be possible to spoof user identities. File: smb_nt_ms09-007.nasl - Type: ACT_GATHER_INFO |
2009-03-11 | Name: It is possible to execute arbitrary code on the remote host. File: smb_nt_ms09-006.nasl - Type: ACT_GATHER_INFO |
2008-10-15 | Name: A local user can elevate privileges on the remote host. File: smb_nt_ms08-064.nasl - Type: ACT_GATHER_INFO |
2008-10-15 | Name: It is possible to crash the remote host due to a flaw in the 'server' service. File: smb_nt_ms08-063.nasl - Type: ACT_GATHER_INFO |
2008-10-15 | Name: A local user can elevate his privileges on the remote host. File: smb_nt_ms08-061.nasl - Type: ACT_GATHER_INFO |
2008-06-12 | Name: It is possible to crash Active Directory on the remote host. File: smb_nt_ms08-035.nasl - Type: ACT_GATHER_INFO |
2008-06-11 | Name: Arbitrary code can be executed on the remote host through Bluetooth. File: smb_nt_ms08-030.nasl - Type: ACT_GATHER_INFO |
2008-04-08 | Name: A local user can elevate his privileges on the remote host. File: smb_nt_ms08-025.nasl - Type: ACT_GATHER_INFO |