This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:microsoft:windows_2003_server::sp2:x64
Detail
VendorMicrosoftFirst view 2002-12-31
ProductWindows 2003 ServerLast view2015-07-14
VersionTypeOs
Editionx64 
Language 
Updatesp2 

Activity : Overall

COMMON PLATFORM ENUMERATION : Repartition per Version

CPE NameAffected CVE
cpe:/o:microsoft:windows_2003_server::sp2307
cpe:/o:microsoft:windows_2003_server::sp2:itanium186
cpe:/o:microsoft:windows_2003_server::sp2:x6476
cpe:/o:microsoft:windows_2003_server:r275
cpe:/o:microsoft:windows_2003_server:web68
Hide | Show 45 More...
CPE NameAffected CVE
cpe:/o:microsoft:windows_2003_server:sp167
cpe:/o:microsoft:windows_2003_server:enterprise::64-bit61
cpe:/o:microsoft:windows_2003_server:standard::64-bit61
cpe:/o:microsoft:windows_2003_server:r2::datacenter_64-bit60
cpe:/o:microsoft:windows_2003_server:r2::64-bit59
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit59
cpe:/o:microsoft:windows_2003_server53
cpe:/o:microsoft:windows_2003_server:sp241
cpe:/o:microsoft:windows_2003_server::sp137
cpe:/o:microsoft:windows_2003_server:sp1::itanium36
cpe:/o:microsoft:windows_2003_server:64-bit27
cpe:/o:microsoft:windows_2003_server:::x6426
cpe:/o:microsoft:windows_2003_server:standard:sp126
cpe:/o:microsoft:windows_2003_server:web:sp126
cpe:/o:microsoft:windows_2003_server:sp2::itanium22
cpe:/o:microsoft:windows_2003_server:standard_64-bit22
cpe:/o:microsoft:windows_2003_server:enterprise:sp119
cpe:/o:microsoft:windows_2003_server:r2:sp118
cpe:/o:microsoft:windows_2003_server:itanium17
cpe:/o:microsoft:windows_2003_server:sp2::x6415
cpe:/o:microsoft:windows_2003_server:datacenter_64-bit:sp115
cpe:/o:microsoft:windows_2003_server::sp1:itanium14
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit:sp114
cpe:/o:microsoft:windows_2003_server:gold13
cpe:/o:microsoft:windows_2003_server:standard:sp1_beta_112
cpe:/o:microsoft:windows_2003_server:web:sp1_beta_112
cpe:/o:microsoft:windows_2003_server:-:sp2:x6411
cpe:/o:microsoft:windows_2003_server:standard11
cpe:/o:microsoft:windows_2003_server:datacenter_edition10
cpe:/o:microsoft:windows_2003_server:enterprise:sp1_beta_110
cpe:/o:microsoft:windows_2003_server:r2:sp210
cpe:/o:microsoft:windows_2003_server:r2:sp1_beta_19
cpe:/o:microsoft:windows_2003_server:-:sp28
cpe:/o:microsoft:windows_2003_server:gold::itanium8
cpe:/o:microsoft:windows_2003_server:sp1::enterprise8
cpe:/o:microsoft:windows_2003_server:enterprise_edition:sp18
cpe:/o:microsoft:windows_2003_server:datacenter_edition:sp18
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit:sp1_beta_18
cpe:/o:microsoft:windows_2003_server:datacenter_64-bit:sp1_beta_18
cpe:/o:microsoft:windows_2003_server:gold::x647
cpe:/o:microsoft:windows_2003_server:datacenter_edition_64-bit7
cpe:/o:microsoft:windows_2003_server:enterprise_edition_64-bit7
cpe:/o:microsoft:windows_2003_server::gold6
cpe:/o:microsoft:windows_2003_server::gold:itanium6
cpe:/o:microsoft:windows_2003_server::gold:x646

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
52015-07-14CVE-2015-2417NetworkLowNone Requ...
52015-07-14CVE-2015-2416NetworkLowNone Requ...
7.22015-07-14CVE-2015-2387LocalLowNone Requ...
3.32015-07-14CVE-2015-2374Adjacent ...LowNone Requ...
6.92015-07-14CVE-2015-2371LocalMediumNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
7.22015-07-14CVE-2015-2370LocalLowNone Requ...
6.92015-07-14CVE-2015-2369LocalMediumNone Requ...
2.12015-07-14CVE-2015-2367LocalLowNone Requ...
7.22015-07-14CVE-2015-2365LocalLowNone Requ...
7.22015-07-14CVE-2015-2364LocalLowNone Requ...
7.22015-07-14CVE-2015-2363LocalLowNone Requ...
7.22015-06-09CVE-2015-1768LocalLowNone Requ...
7.22015-04-21CVE-2015-1701LocalLowNone Requ...
7.22015-03-11CVE-2015-0075LocalLowNone Requ...
4.32015-03-11CVE-2015-0005Adjacent ...MediumNone Requ...
7.62014-05-08CVE-2013-5016NetworkHighNone Requ...
7.22013-11-27CVE-2013-5065LocalLowNone Requ...
7.22013-09-11CVE-2013-3866LocalLowNone Requ...
7.22013-09-11CVE-2013-3865LocalLowNone Requ...
7.22013-09-11CVE-2013-3864LocalLowNone Requ...
7.22013-09-11CVE-2013-1344LocalLowNone Requ...
7.22013-09-11CVE-2013-1343LocalLowNone Requ...
7.22013-09-11CVE-2013-1342LocalLowNone Requ...
7.22013-09-11CVE-2013-1341LocalLowNone Requ...

CWE : Common Weakness Enumeration

%idName
20% (77)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
16% (64)CWE-20Improper Input Validation
15% (59)CWE-94Failure to Control Generation of Code ('Code Injection')
13% (52)CWE-399Resource Management Errors
10% (42)CWE-264Permissions, Privileges, and Access Controls
Hide | Show 13 More...
%idName
7% (30)CWE-200Information Exposure
5% (23)CWE-189Numeric Errors
2% (11)CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (6)CWE-362Race Condition
1% (5)CWE-310Cryptographic Issues
1% (4)CWE-16Configuration
0% (2)CWE-352Cross-Site Request Forgery (CSRF)
0% (2)CWE-287Improper Authentication
0% (2)CWE-255Credentials Management
0% (2)CWE-78Improper Sanitization of Special Elements used in an OS Command ('O...
0% (2)CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (1)CWE-254Security Features
0% (1)CWE-89Improper Sanitization of Special Elements used in an SQL Command ('...

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idName
CAPEC-2Inducing Account Lockout
CAPEC-3Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7Blind SQL Injection
CAPEC-8Buffer Overflow in an API Call
CAPEC-9Buffer Overflow in Local Command-Line Utilities
Hide | Show 20 More...
idName
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-13Subverting Environment Variable Values
CAPEC-14Client-side Injection-induced Buffer Overflow
CAPEC-18Embedding Scripts in Nonscript Elements
CAPEC-22Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24Filter Failure through Buffer Overflow
CAPEC-27Leveraging Race Conditions via Symbolic Links
CAPEC-28Fuzzing
CAPEC-29Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-31Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32Embedding Scripts in HTTP Query Strings
CAPEC-41Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-42MIME Conversion
CAPEC-43Exploiting Multiple Input Interpretation Layers
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-46Overflow Variables and Tags
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-52Embedding NULL Bytes
CAPEC-53Postfix, Null Terminate, and Backslash
CAPEC-59Session Credential Falsification through Prediction

SAINT Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DescriptionLink
Internet Explorer iepeers.dll use-after-free vulnerabilityMore info here
Microsoft Jet Engine MDB file ColumnName buffer overflowMore info here
Internet Explorer COL SPAN Heap OverflowMore info here
Microsoft Internet Explorer Time Element Memory CorruptionMore info here
Windows Telephony API buffer overflowMore info here
Hide | Show 20 More...
DescriptionLink
Windows Metafile rendering buffer overflowMore info here
Internet Explorer VML integer overflowMore info here
Microsoft Speech API memory corruptionMore info here
Windows LSASS buffer overflowMore info here
Internet Explorer CSS clip attribute memory corruptionMore info here
Windows Server Service buffer overflowMore info here
Windows RRAS memory corruption vulnerabilityMore info here
Internet Explorer DOM modification memory corruptionMore info here
Windows Cursor and Icon handling vulnerabilityMore info here
Microsoft Internet Explorer layout-grid-char Style Property Use-After-Free Memory CorruptionMore info here
Windows Telnet credential reflectionMore info here
Windows compressed folders buffer overflowMore info here
Microsoft WordPad Word97 text converter buffer overflowMore info here
Internet Explorer HTML+TIME element OuterText memory corruptionMore info here
Windows WMF handling vulnerabilityMore info here
Windows GDI EMF filename buffer overflowMore info here
Microsoft DirectX DirectShow QuickTime movie parsing vulnerabilityMore info here
Microsoft DirectShow Video Streaming ActiveX IMPEG2TuneRequest OverflowMore info here
Windows Media Encoder 9 wmex.dll ActiveX buffer overflowMore info here
Windows Animated Cursor Header buffer overflowMore info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
77907Parallels Plesk Panel Control Panel Multiple Script Content-type Handling Wea...
77906Parallels Plesk Panel Control Panel Multiple Script Content-Type Header HTML ...
77905Parallels Plesk Panel Control Panel get_enabled_product_icon Content-Type HTT...
77904Parallels Plesk Panel Control Panel Multiple Script RFC 1918 IP Address Discl...
77903Parallels Plesk Panel Control Panel Multiple Script Cross-Domain Referer Leak...
Hide | Show 20 More...
idDescription
77902Parallels Plesk Panel Control Panel Multiple Script Password Field Autocomple...
77901Parallels Plesk Panel Control Panel Multiple Script HTTPOnly Flag Set-Cookie ...
77900Parallels Plesk Panel Control Panel Multiple Script HTTPS Session Cookie Secu...
77899Parallels Plesk Panel Control Panel client@1/domain@1/backup/local-repository...
77898Parallels Plesk Panel Control Panel notification@/ certificateslist Cookie SQ...
77897Parallels Plesk Small Business Panel Site Editor (SiteBuilder) Feature /prefe...
77896Parallels Plesk Panel Control Panel /smb/my-profile general[vcard][email][ema...
77895Parallels Plesk Panel Control Panel /smb/email-address/create autoResponder[a...
77894Parallels Plesk Panel Control Panel /smb/app/applications-list-data/catalogId...
77893Parallels Plesk Panel Control Panel /relay Multiple Parameter XSS
77892Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-man...
77891Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-man...
77890Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-man...
77889Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-man...
77888Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-man...
77887Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-man...
77886Parallels Plesk Panel Control Panel /admin/update/settings/ branch Parameter XSS
77885Parallels Plesk Panel Control Panel Root Directory start_page Parameter XSS
76232Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
76231Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injectio...

ExploitDB Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
35273Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.1 Bypass ...
34815Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.0 Bypass ...
33944Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 4.1.X Bypass
30392Microsoft Windows ndproxy.sys - Local Privilege Escalation
30014Windows NDPROXY Local SYSTEM Privilege Escalation
Hide | Show 20 More...
idDescription
25389Multiple Vendor ICMP Message Handling DoS
25388Multiple Vendor ICMP Implementation Malformed Path MTU DoS
25387Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS
24017Internet Explorer 8 - Fixed Col Span ID Full ASLR & DEP Bypass
20174Microsoft Internet Explorer Fixed Table Col Span Heap Overflow
19777IE9, SharePoint, Lync toStaticHTML HTML Sanitizing Bypass
18176MS11-080 Afd.sys Privilege Escalation Exploit
18024MS11-077 Win32k Null Pointer De-reference Vulnerability POC
17978MS11-077 .fon Kernel-Mode Buffer Overrun PoC
17831MS WINS ECommEndDlg Input Validation Error
17659MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow
17544GDI+ CreateDashedPath Integer overflow in gdiplus.dll
16590Internet Explorer DHTML Behaviors Use After Free
15985MS10-073: Win32k Keyboard Layout Vulnerability
15421Internet Explorer 6, 7, 8 Memory Corruption 0day Exploit
15266Windows NTLM Weak Nonce Vulnerability
15262Microsoft Office HtmlDlgHelper Class Memory Corruption
14895MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit
14608Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048)
12564Microsoft Windows Outlook Express and Windows Mail Integer Overflow

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2012-12-12Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-09-27Name : IBM DB2 UTL_FILE Module Directory Traversal Vulnerability (Windows)
File : nvt/gb_ibm_db2_utl_file_module_dir_trav_vuln_win.nasl
2012-07-11Name : Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
File : nvt/secpod_ms12-048.nasl
2012-07-11Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502)
File : nvt/secpod_ms12-050.nasl
2012-06-13Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
File : nvt/secpod_ms12-037.nasl
Hide | Show 20 More...
idDescription
2012-06-13Name : Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
File : nvt/secpod_ms12-038.nasl
2012-06-13Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
File : nvt/secpod_ms12-039.nasl
2012-06-13Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2709162)
File : nvt/secpod_ms12-041.nasl
2012-03-16Name : VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCe...
File : nvt/gb_VMSA-2011-0003.nasl
2012-03-06Name : Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
File : nvt/secpod_ms11-020_remote.nasl
2012-02-29Name : MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
File : nvt/secpod_ms10-054_remote.nasl
2011-12-30Name : MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
File : nvt/secpod_ms06-040_remote.nasl
2011-11-21Name : Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerab...
File : nvt/secpod_ms_windows_ip_validation_code_exec_vuln.nasl
2011-10-12Name : Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
File : nvt/secpod_ms11-075.nasl
2011-10-12Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2567053)
File : nvt/secpod_ms11-077.nasl
2011-10-12Name : Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability ...
File : nvt/secpod_ms11-078.nasl
2011-10-12Name : MS Windows Ancillary Function Driver Privilege Elevation Vulnerability (2592799)
File : nvt/secpod_ms11-080.nasl
2011-10-12Name : Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
File : nvt/secpod_ms11-081.nasl
2011-09-14Name : Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
File : nvt/secpod_ms11-070.nasl
2011-09-14Name : Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
File : nvt/secpod_ms11-071.nasl
2011-09-14Name : Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
File : nvt/secpod_ms11-074.nasl
2011-08-11Name : Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
File : nvt/secpod_ms11-057.nasl
2011-08-11Name : Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
File : nvt/secpod_ms11-058.nasl
2011-08-11Name : MS Windows Remote Access Service NDISTAPI Driver Privilege Elevation Vulnerab...
File : nvt/secpod_ms11-062.nasl
2011-08-11Name : Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulne...
File : nvt/secpod_ms11-063.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2015-A-0165Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity : Category II - VMSKEY : V0061093
2015-A-0164Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity : Category II - VMSKEY : V0061095
2015-A-0162Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity : Category II - VMSKEY : V0061097
2015-A-0169Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity : Category II - VMSKEY : V0061103
2015-A-0168Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity : Category II - VMSKEY : V0061105
Hide | Show 20 More...
idDescription
2015-A-0173Microsoft Windows Netlogon Privilege Escalation Vulnerability (MS15-071)
Severity : Category II - VMSKEY : V0061111
2015-A-0167Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity : Category II - VMSKEY : V0061129
2015-A-0108Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity : Category II - VMSKEY : V0060653
2015-A-0048Multiple Vulnerabilities in Windows Kernel (MS15-025)
Severity : Category II - VMSKEY : V0058995
2014-A-0068Symantec Critical System Protection Security Bypass Vulnerability
Severity : Category II - VMSKEY : V0050239
2014-A-0004Microsoft Windows Kernel Privilege Escalation Vulnerability
Severity : Category II - VMSKEY : V0043405
2013-B-0019RSA Authentication Agent Authentication Bypass Vulnerability
Severity : Category I - VMSKEY : V0037264
2012-A-0110Microsoft Windows Shell Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0033309
2012-A-0002Microsoft Windows Components Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0030932
2011-A-0138Microsoft Active Accessibility Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0030402
2011-B-0115Multiple Vulnerabilities in Microsoft Office SharePoint
Severity : Category II - VMSKEY : V0030239
2011-A-0126Microsoft Windows WINS Server Privilege Escalation Vulnerability
Severity : Category I - VMSKEY : V0030247
2011-A-0115Microsoft Windows Client/Server Run-time Subsystem Elevation of Privilege Vul...
Severity : Category I - VMSKEY : V0029760
2011-A-0117Microsoft Windows Remote Access Service Elevation of Privilege Vulnerability
Severity : Category I - VMSKEY : V0029767
2011-B-0100Microsoft ASP.NET Chart Control Information Disclosure Vulnerability
Severity : Category II - VMSKEY : V0029781
2011-A-0079Microsoft SMB Client Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0028592
2011-A-0087Microsoft Distributed File System Remote Code Execution Vulnerabilities
Severity : Category I - VMSKEY : V0028593
2011-A-0082Microsoft .NET Framework Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0028594
2011-A-0081Microsoft Windows OLE Automation Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0028597
2011-B-0067Microsoft Windows Ancillary Function Driver Privilege Escalation Vulnerability
Severity : Category II - VMSKEY : V0028611

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10SMB tapisrv ClientRequest andx object call LSetAppPriority overflow attempt
RuleID : 9999 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest little endian andx object call LSetAppPriority o...
RuleID : 9998 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX unicode little endian andx object call...
RuleID : 9997 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX unicode andx object call LSetAppPriori...
RuleID : 9996 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX little endian andx object call LSetApp...
RuleID : 9995 - Type : NETBIOS - Revision : 5
Hide | Show 20 More...
DateDescription
2014-01-10SMB-DS tapisrv ClientRequest andx object call LSetAppPriority overflow attempt
RuleID : 9994 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest unicode little endian andx LSetAppPriority overf...
RuleID : 9993 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest WriteAndX unicode little endian andx LSetAppPriorit...
RuleID : 9992 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest unicode little endian andx LSetAppPriority overflow...
RuleID : 9991 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest WriteAndX little endian andx LSetAppPriority overfl...
RuleID : 9990 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest little endian andx LSetAppPriority overflow attempt
RuleID : 9989 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX andx LSetAppPriority overflow attempt
RuleID : 9988 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest unicode andx LSetAppPriority overflow attempt
RuleID : 9987 - Type : NETBIOS - Revision : 4
2014-01-10SMB tapisrv ClientRequest unicode andx LSetAppPriority overflow attempt
RuleID : 9986 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest WriteAndX andx LSetAppPriority overflow attempt
RuleID : 9985 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest WriteAndX unicode andx LSetAppPriority overflow att...
RuleID : 9984 - Type : NETBIOS - Revision : 5
2014-01-10SMB tapisrv ClientRequest andx LSetAppPriority overflow attempt
RuleID : 9983 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest little endian andx LSetAppPriority overflow attempt
RuleID : 9982 - Type : NETBIOS - Revision : 4
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX unicode little endian andx LSetAppPrio...
RuleID : 9981 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX unicode andx LSetAppPriority overflow ...
RuleID : 9980 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest WriteAndX little endian andx LSetAppPriority ove...
RuleID : 9979 - Type : NETBIOS - Revision : 5
2014-01-10SMB v4 tapisrv ClientRequest unicode little endian andx LSetAppPriority overf...
RuleID : 9978 - Type : NETBIOS - Revision : 5
2014-01-10SMB v4 tapisrv ClientRequest little endian andx LSetAppPriority overflow attempt
RuleID : 9977 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS tapisrv ClientRequest andx LSetAppPriority overflow attempt
RuleID : 9976 - Type : NETBIOS - Revision : 5
2014-01-10SMB-DS v4 tapisrv ClientRequest WriteAndX andx LSetAppPriority overflow attempt
RuleID : 9975 - Type : NETBIOS - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2018-04-03Name : The remote mail server may be affected by multiple vulnerabilities.
File : exchange_ms10-024.nasl - Type : ACT_GATHER_INFO
2018-04-03Name : The remote web server may allow remote code execution.
File : iis_7_pci.nasl - Type : ACT_GATHER_INFO
2017-05-08Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL23440942.nasl - Type : ACT_GATHER_INFO
2016-04-14Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3548.nasl - Type : ACT_GATHER_INFO
2016-03-04Name : The remote VMware ESX / ESXi host is missing a security-related patch.
File : vmware_VMSA-2011-0003_remote.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2015-09-18Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL4583.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by multiple remote code execution vulnera...
File : smb_nt_ms15-069.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by a privilege escalation vulnerability.
File : smb_nt_ms15-071.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by a privilege escalation vulnerability.
File : smb_nt_ms15-072.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-073.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by a privilege escalation vulnerability.
File : smb_nt_ms15-074.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by multiple elevation of privilege vulner...
File : smb_nt_ms15-075.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The remote Windows host is affected by a privilege escalation vulnerability.
File : smb_nt_ms15-076.nasl - Type : ACT_GATHER_INFO
2015-07-14Name : The Adobe Font driver on the remote host is affected by a privilege escalatio...
File : smb_nt_ms15-077.nasl - Type : ACT_GATHER_INFO
2015-06-09Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-061.nasl - Type : ACT_GATHER_INFO
2015-05-12Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-051.nasl - Type : ACT_GATHER_INFO
2015-03-10Name : The remote Windows host is affected by multiple privilege escalation vulnerab...
File : smb_nt_ms15-025.nasl - Type : ACT_GATHER_INFO
2015-03-10Name : The remote Windows host is affected by a spoofing vulnerability.
File : smb_nt_ms15-027.nasl - Type : ACT_GATHER_INFO
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL4743.nasl - Type : ACT_GATHER_INFO
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL10509.nasl - Type : ACT_GATHER_INFO
2014-05-09Name : The remote windows host has a security application installed that is potentia...
File : symantec_critical_system_protection_sym14-008.nasl - Type : ACT_GATHER_INFO
2014-03-10Name : Arbitrary code can be executed on the remote host through the Microsoft GDI r...
File : smb_kb957488.nasl - Type : ACT_GATHER_INFO
2014-03-05Name : The DNS server running on the remote host has multiple vulnerabilities.
File : ms_dns_kb2562485.nasl - Type : ACT_GATHER_INFO
2014-03-05Name : The DNS server running on the remote host is potentially affected by a remote...
File : ms_dns_kb935966.nasl - Type : ACT_GATHER_INFO
2014-03-05Name : The DNS server running on the remote host is vulnerable to DNS spoofing attacks.
File : ms_dns_kb941672.nasl - Type : ACT_GATHER_INFO