This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-06-12
Product Lync Last view 2020-07-14
Version 2010 Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:* 24
cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:* 19
cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:* 16
cpe:2.3:a:microsoft:lync:2010:*:x64:*:*:*:*:* 7
cpe:2.3:a:microsoft:lync:2010:*:x86:*:*:*:*:* 7
cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:x64:* 3
cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:x86:* 3
cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:* 3
cpe:2.3:a:microsoft:lync:2013:-:x64:*:*:*:*:* 2
cpe:2.3:a:microsoft:lync:2013:-:x86:*:*:*:*:* 2
cpe:2.3:a:microsoft:lync:2013:*:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:x64:* 2
cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:x86:* 2
cpe:2.3:a:microsoft:lync:2010:*:attendant_x64:*:*:*:*:* 1
cpe:2.3:a:microsoft:lync:2010:*:attendant_x86:*:*:*:*:* 1
cpe:2.3:a:microsoft:lync:-:sp1:*:*:*:*:*:* 1
cpe:2.3:a:microsoft:lync:2013:sp1:*:*:basic:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2020-07-14 CVE-2020-1025

An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Business Server improperly handle OAuth token validation, aka 'Microsoft Office Elevation of Privilege Vulnerability'.

6.5 2019-09-11 CVE-2019-1209

An information disclosure vulnerability exists in Lync 2013, aka 'Lync 2013 Information Disclosure Vulnerability'.

6.5 2019-07-15 CVE-2019-1084

An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'.

5.9 2018-11-13 CVE-2018-8546

A denial of service vulnerability exists in Skype for Business, aka "Microsoft Skype for Business Denial of Service Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Lync, Skype.

8.8 2018-07-10 CVE-2018-8311

A remote code execution vulnerability exists when Skype for Business and Microsoft Lync clients fail to properly sanitize specially crafted content, aka "Remote Code Execution Vulnerability in Skype For Business and Lync." This affects Skype, Microsoft Lync.

7.8 2018-07-10 CVE-2018-8238

A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages, aka "Skype for Business and Lync Security Feature Bypass Vulnerability." This affects Skype, Microsoft Lync.

8.8 2017-10-13 CVE-2017-11786

Skype for Business in Microsoft Lync 2013 SP1 and Skype for Business 2016 allows an attacker to steal an authentication hash that can be reused elsewhere, due to how Skype for Business handles authentication requests, aka "Skype for Business Elevation of Privilege Vulnerability."

7.5 2017-09-12 CVE-2017-8696

Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to execute code remotely via a specially crafted website or a specially crafted document or email attachment, aka "Microsoft Graphics Component Remote Code Execution."

5.3 2017-09-12 CVE-2017-8695

Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability."

3.3 2017-09-12 CVE-2017-8676

The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an authenticated attacker to retrieve information from a targeted system via a specially crafted application, aka "Windows GDI+ Information Disclosure Vulnerability."

8.8 2017-06-14 CVE-2017-8527

Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Graphics Remote Code Execution Vulnerability".

8.8 2017-06-14 CVE-2017-0283

Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office Word Viewer, Microsoft Lync 2013 SP1, Skype for Business 2016, Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows, and Microsoft Silverlight 5 when installed on Microsoft Windows allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8528.

7.8 2017-03-16 CVE-2017-0108

The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014.

9.8 2016-10-13 CVE-2016-7182

The Graphics component in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows attackers to execute arbitrary code via a crafted True Type font, aka "True Type Font Parsing Elevation of Privilege Vulnerability."

7.8 2016-10-13 CVE-2016-3396

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "GDI+ Remote Code Execution Vulnerability."

5.5 2016-10-13 CVE-2016-3263

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3262.

5.5 2016-10-13 CVE-2016-3262

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3263.

5.5 2016-10-13 CVE-2016-3209

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; Live Meeting 2007 Console; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4.5.2, and 4.6; and Silverlight 5 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "True Type Font Parsing Information Disclosure Vulnerability."

7.8 2016-08-09 CVE-2016-3304

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303.

7.8 2016-08-09 CVE-2016-3303

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3304.

7.8 2016-08-09 CVE-2016-3301

The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability."

8.8 2016-04-12 CVE-2016-0145

The font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold and 1511; Office 2007 SP3 and 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, and 3.5.1; Skype for Business 2016; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2015-12-09 CVE-2015-6108

The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2015-12-09 CVE-2015-6107

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10 Gold and 1511, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2015-12-09 CVE-2015-6106

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

CWE : Common Weakness Enumeration

%idName
28% (9) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25% (8) CWE-200 Information Exposure
18% (6) CWE-20 Improper Input Validation
6% (2) CWE-264 Permissions, Privileges, and Access Controls
6% (2) CWE-94 Failure to Control Generation of Code ('Code Injection')
6% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
3% (1) CWE-294 Authentication Bypass by Capture-replay
3% (1) CWE-269 Improper Privilege Management
3% (1) CWE-19 Data Handling

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:14874 Lync Insecure Library Loading Vulnerability (CVE-2012-1849)
oval:org.mitre.oval:def:15530 HTML Sanitization Vulnerability - MS12-050
oval:org.mitre.oval:def:14976 Vulnerability in HTML Sanitization Component Could Allow Elevation of Privile...
oval:org.mitre.oval:def:15952 Vulnerability in Lync Could Allow Remote Code Execution - MS13-041
oval:org.mitre.oval:def:17341 TrueType Font Parsing Vulnerability - CVE-2013-3129 (MS13-052, MS13-053, MS13...
oval:org.mitre.oval:def:17323 TrueType font parsing vulnerability in Microsoft Silverlight - CVE-2013-3129,...
oval:org.mitre.oval:def:21019 Microsoft Graphics Component Memory Corruption Vulnerability (CVE-2013-3906) ...
oval:org.mitre.oval:def:28875 TrueType font parsing vulnerability - CVE-2015-1671 (MS15-044) (Mac OS X)
oval:org.mitre.oval:def:28207 TrueType font parsing vulnerability - CVE-2015-1671 (MS15-044)

ExploitDB Exploits

id Description
30011 Microsoft Tagged Image File Format (TIFF) Integer Overflow
19777 IE9, SharePoint, Lync toStaticHTML HTML Sanitizing Bypass

OpenVAS Exploits

id Description
2012-10-10 Name : Microsoft Products HTML Sanitisation Component XSS Vulnerability (2741517)
File : nvt/secpod_ms12-066.nasl
2012-07-11 Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502)
File : nvt/secpod_ms12-050.nasl
2012-06-13 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
File : nvt/secpod_ms12-037.nasl
2012-06-13 Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
File : nvt/secpod_ms12-039.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2013-A-0225 Microsoft GDI Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0042593
2013-A-0135 Microsoft GDI+ Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0039199
2013-B-0071 Multiple Vulnerabilities in Microsoft .NET Framework and Silverlight
Severity: Category II - VMSKEY: V0039211
2013-B-0051 Microsoft Lync Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0037938

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2017-04-12 Microsoft Windows Uniscribe privilege escalation attempt
RuleID : 41933 - Type : FILE-OTHER - Revision : 2
2017-04-12 Microsoft Windows Uniscribe privilege escalation attempt
RuleID : 41932 - Type : FILE-OTHER - Revision : 2
2016-11-11 Microsoft Windows Win32k.sys sbit_Embolden use after free attempt
RuleID : 40428 - Type : OS-WINDOWS - Revision : 2
2016-11-11 Microsoft Windows Win32k.sys sbit_Embolden use after free attempt
RuleID : 40427 - Type : OS-WINDOWS - Revision : 2
2016-11-11 Microsoft Windows GDI+ EMF buffer overread attempt
RuleID : 40426 - Type : OS-WINDOWS - Revision : 2
2016-11-11 Microsoft Windows GDI+ EMF buffer overread attempt
RuleID : 40425 - Type : OS-WINDOWS - Revision : 2
2016-11-08 Microsoft Windows malformed TrueType file RCVT out of bounds read attempt
RuleID : 40409 - Type : FILE-OTHER - Revision : 2
2016-11-08 Microsoft Windows malformed TrueType file RCVT out of bounds read attempt
RuleID : 40408 - Type : FILE-OTHER - Revision : 2
2016-09-13 Microsoft Windows gdiplus EMF EmrText out of bounds write attempt
RuleID : 39844 - Type : OS-WINDOWS - Revision : 6
2016-09-13 Microsoft Windows gdiplus EMF EmrText out of bounds write attempt
RuleID : 39843 - Type : OS-WINDOWS - Revision : 6
2016-09-08 Microsoft Windows GDI emf file integer overflow attempt
RuleID : 39825 - Type : OS-WINDOWS - Revision : 4
2016-09-08 Microsoft Windows GDI emf file integer overflow attempt
RuleID : 39824 - Type : OS-WINDOWS - Revision : 4
2016-05-12 Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces...
RuleID : 38494 - Type : FILE-OTHER - Revision : 2
2016-05-12 Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces...
RuleID : 38493 - Type : FILE-OTHER - Revision : 2
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38011 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38010 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38009 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38008 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38007 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38006 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38005 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38004 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38003 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38002 - Type : BROWSER-PLUGINS - Revision : 1
2016-04-05 Microsoft Windows RDP ActiveX component mstscax use after free attempt
RuleID : 38001 - Type : BROWSER-PLUGINS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The Microsoft Skype for Business or Microsoft Lync installation on the remote...
File: smb_nt_ms17_oct_skype.nasl - Type: ACT_GATHER_INFO
2017-09-13 Name: An application installed on the remote Windows host is affected by multiple r...
File: smb_nt_ms17_sep_office_web.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038782.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macosx_ms17_sep_office.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038777.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038783.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038788.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038792.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038799.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The Microsoft Office Products are affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_office.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The Microsoft Office Products are affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_office_viewers.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The Microsoft Skype for Business or Microsoft Lync or Microsoft Live Meeting ...
File: smb_nt_ms17_sep_skype.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_win2008.nasl - Type: ACT_GATHER_INFO
2017-06-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_win2008.nasl - Type: ACT_GATHER_INFO
2017-06-14 Name: An application installed on the remote Windows host is affected by multiple v...
File: smb_nt_ms17_jun_office.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022715.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: An application installed on the remote Windows host is affected by a remote c...
File: smb_nt_ms17_jun_skype.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: A web application framework running on the remote host is affected by multipl...
File: smb_nt_ms17_jun_4023307.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022727.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022726.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022725.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022724.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022719.nasl - Type: ACT_GATHER_INFO
2017-06-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jun_4022714.nasl - Type: ACT_GATHER_INFO