This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-05-08
Product Windows 8 Last view 2018-02-28
Version Type
Update  
Edition x86  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:* 182
cpe:2.3:o:microsoft:windows_8:-:*:*:*:pro_n:*:x86:* 53
cpe:2.3:o:microsoft:windows_8:-:*:*:*:pro_n:*:x64:* 51
cpe:2.3:o:microsoft:windows_8:*:*:*:*:*:*:*:* 8
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:x64:* 2
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:x86:* 2
cpe:2.3:o:microsoft:windows_8:consumer_preview:*:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2018-02-28 CVE-2018-6947

An uninitialised stack variable in the nxfuse component that is part of the Open Source DokanFS library shipped with NoMachine 6.0.66_2 and earlier allows a local low privileged user to gain elevation of privileges on Windows 7 (32 and 64bit), and denial of service for Windows 8 and 10.

5.5 2018-02-26 CVE-2018-7250

An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.

7 2018-02-26 CVE-2018-7249

An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. Two carefully timed calls to IOCTL 0xCA002813 can cause a race condition that leads to a use-after-free. When exploited, an unprivileged attacker can run arbitrary code in the kernel.

7.8 2017-03-16 CVE-2017-0050

The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to spoof processes, spoof inter-process communication, or cause a denial of service via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."

7.3 2016-01-13 CVE-2016-0018

Microsoft Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 R2, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."

7.8 2016-01-13 CVE-2016-0016

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."

7.8 2016-01-13 CVE-2016-0015

DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka "DirectShow Heap Corruption Remote Code Execution Vulnerability."

7.8 2016-01-13 CVE-2016-0014

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Elevation of Privilege Vulnerability."

4.3 2016-01-13 CVE-2016-0008

The graphics device interface in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Windows GDI32.dll ASLR Bypass Vulnerability."

7.8 2016-01-13 CVE-2016-0007

The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006.

7.3 2016-01-13 CVE-2016-0006

The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0007.

7.2 2015-12-09 CVE-2015-6174

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6171 and CVE-2015-6173.

7.2 2015-12-09 CVE-2015-6173

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6171 and CVE-2015-6174.

7.2 2015-12-09 CVE-2015-6171

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6173 and CVE-2015-6174.

7.2 2015-12-09 CVE-2015-6133

Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."

7.2 2015-12-09 CVE-2015-6132

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."

9.3 2015-12-09 CVE-2015-6131

Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted .mcl file, aka "Media Center Library Parsing RCE Vulnerability."

4.3 2015-12-09 CVE-2015-6127

Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to read arbitrary files via a crafted .mcl file, aka "Windows Media Center Information Disclosure Vulnerability."

7.2 2015-12-09 CVE-2015-6126

Race condition in the Pragmatic General Multicast (PGM) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application, aka "Windows PGM UAF Elevation of Privilege Vulnerability."

9.3 2015-12-09 CVE-2015-6108

The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2015-12-09 CVE-2015-6107

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10 Gold and 1511, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

2.1 2015-11-11 CVE-2015-6113

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass intended filesystem permissions by leveraging Low Integrity access, aka "Windows Kernel Security Feature Bypass Vulnerability."

5.8 2015-11-11 CVE-2015-6112

SChannel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 lacks the required extended master-secret binding support to ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack," aka "Schannel TLS Triple Handshake Vulnerability."

6.8 2015-11-11 CVE-2015-6111

IPSec in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles encryption negotiation, which allows remote authenticated users to cause a denial of service (system hang) via crafted IP traffic, aka "Windows IPSec Denial of Service Vulnerability."

9.3 2015-11-11 CVE-2015-6104

The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6103.

CWE : Common Weakness Enumeration

%idName
27% (68) CWE-264 Permissions, Privileges, and Access Controls
14% (35) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (28) CWE-200 Information Exposure
10% (26) CWE-20 Improper Input Validation
9% (23) CWE-94 Failure to Control Generation of Code ('Code Injection')
4% (11) CWE-399 Resource Management Errors
4% (10) CWE-416 Use After Free
2% (6) CWE-362 Race Condition
2% (6) CWE-254 Security Features
2% (5) CWE-426 Untrusted Search Path
2% (5) CWE-310 Cryptographic Issues
2% (5) CWE-189 Numeric Errors
1% (4) CWE-19 Data Handling
1% (3) CWE-476 NULL Pointer Dereference
1% (3) CWE-190 Integer Overflow or Wraparound
0% (2) CWE-415 Double Free
0% (2) CWE-284 Access Control (Authorization) Issues
0% (2) CWE-255 Credentials Management
0% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (1) CWE-665 Improper Initialization
0% (1) CWE-287 Improper Authentication
0% (1) CWE-129 Improper Validation of Array Index

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:15667 TrueType Font Parsing Vulnerability (CVE-2012-0159)
oval:org.mitre.oval:def:15388 TrueType Font Parsing Vulnerability (CVE-2012-0159)
oval:org.mitre.oval:def:15847 TrueType Font Parsing Vulnerability - MS12-075
oval:org.mitre.oval:def:15975 Windows Briefcase Integer Underflow Vulnerability - MS12-072
oval:org.mitre.oval:def:15528 Windows Briefcase Integer Overflow Vulnerability - MS12-072
oval:org.mitre.oval:def:16067 OpenType Font Parsing Vulnerability - MS12-078
oval:org.mitre.oval:def:16429 MSXML Integer Truncation Vulnerability - MS13-002
oval:org.mitre.oval:def:15458 MSXML XSLT Vulnerability - MS13-002
oval:org.mitre.oval:def:16326 Win32k Improper Message Handling Vulnerability - MS13-005
oval:org.mitre.oval:def:16273 Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerabilit...
oval:org.mitre.oval:def:16373 TCP FIN WAIT Vulnerability - MS13-018
oval:org.mitre.oval:def:16441 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16591 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16498 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16563 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16455 Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031)
oval:org.mitre.oval:def:16504 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16575 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16257 Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031)
oval:org.mitre.oval:def:16088 Vulnerability in HTTP.sys could allow denial of service - MS13-039
oval:org.mitre.oval:def:16332 DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046
oval:org.mitre.oval:def:16091 Win32k Window Handle Vulnerability - MS13-046
oval:org.mitre.oval:def:17360 Win32k Read AV Vulnerability - CVE-2013-3660 (MS13-053)
oval:org.mitre.oval:def:16837 Vulnerability in Windows Print Spooler Components Could Allow Elevation of Pr...
oval:org.mitre.oval:def:16847 Kernel Information Disclosure Vulnerability - MS13-048

SAINT Exploits

Description Link
Windows OLE Automation Array command execution More info here
Windows Media Center command execution More info here
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here

ExploitDB Exploits

id Description
35236 MS14-064 Microsoft Windows OLE Package Manager Code Execution
35235 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
35216 MS Office 2007 and 2010 - OLE Arbitrary Command Execution
35101 Windows TrackPopupMenu Win32k NULL Pointer Dereference
35055 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
35020 MS14-060 Microsoft Windows OLE Package Manager Code Execution
35019 Windows OLE Package Manager SandWorm Exploit
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)
27050 DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056)
26554 Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
24485 MS13-005 HWND_BROADCAST PoC

OpenVAS Exploits

id Description
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-11-14 Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
File : nvt/secpod_ms12-072.nasl
2012-11-14 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-075.nasl
2012-09-28 Name : Google Chrome Windows Kernel Memory Corruption Vulnerability
File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl
2012-06-13 Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
File : nvt/secpod_ms12-039.nasl
2012-05-14 Name : Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
File : nvt/secpod_ms12-034_macosx.nasl
2012-05-09 Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268...
File : nvt/secpod_ms12-034.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-B-0112 Microsoft Media Center Remote Code Execution Vulnerability (MS15-100)
Severity: Category II - VMSKEY: V0061373
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-B-0091 Multiple Vulnerabilities in Microsoft Hyper-V (MS15-068)
Severity: Category II - VMSKEY: V0061119
2015-A-0170 Microsoft Remote Desktop Protocol Vulnerability (MS15-067)
Severity: Category I - VMSKEY: V0061107
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0122 Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
Severity: Category II - VMSKEY: V0060961
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659
2015-A-0107 Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050)
Severity: Category II - VMSKEY: V0060651
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0092 Microsoft Windows HTTP stack Remote Code Execution Vulnerability (MS15-034)
Severity: Category I - VMSKEY: V0059899

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50707 - Type : OS-WINDOWS - Revision : 1
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50706 - Type : OS-WINDOWS - Revision : 1
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50705 - Type : OS-WINDOWS - Revision : 1
2019-08-13 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 50704 - Type : OS-WINDOWS - Revision : 1
2019-07-18 Directshow GIF logical height overflow attempt
RuleID : 50454 - Type : FILE-IMAGE - Revision : 1
2019-07-18 Directshow GIF logical width overflow attempt
RuleID : 50453 - Type : FILE-IMAGE - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49977 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49976 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49975 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49974 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49973 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49972 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49971 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49970 - Type : OS-WINDOWS - Revision : 1
2019-05-30 Microsoft Windows SChannel CertificateVerify buffer overflow attempt
RuleID : 49969 - Type : OS-WINDOWS - Revision : 1
2019-04-18 Microsoft Windows TTF parsing counter overflow attempt
RuleID : 49483 - Type : FILE-OTHER - Revision : 1
2019-04-18 Microsoft Windows TTF parsing counter overflow attempt
RuleID : 49482 - Type : FILE-OTHER - Revision : 1
2019-04-13 Microsoft Wordpad embedded BMP overflow attempt
RuleID : 49428 - Type : FILE-OTHER - Revision : 1
2019-04-13 Microsoft Wordpad embedded BMP overflow attempt
RuleID : 49427 - Type : FILE-OTHER - Revision : 1
2018-09-11 CTSWebProxy ActiveX privilege escalation attempt
RuleID : 47462 - Type : BROWSER-PLUGINS - Revision : 2
2018-09-11 CTSWebProxy ActiveX privilege escalation attempt
RuleID : 47461 - Type : BROWSER-PLUGINS - Revision : 2
2017-08-31 Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43805 - Type : FILE-OFFICE - Revision : 2
2017-08-31 Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43804 - Type : FILE-OFFICE - Revision : 2
2017-08-31 Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43803 - Type : FILE-OFFICE - Revision : 2
2017-08-31 Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43802 - Type : FILE-OFFICE - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-03-14 Name: The remote Windows host is affected multiple elevation of privilege vulnerabi...
File: smb_nt_ms17-017.nasl - Type: ACT_GATHER_INFO
2016-01-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms16-005.nasl - Type: ACT_GATHER_INFO
2016-01-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms16-007.nasl - Type: ACT_GATHER_INFO
2016-01-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms16-008.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: A multimedia application framework installed on the remote Mac OS X host is a...
File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-132.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by an elevation of privilege vulnerability.
File: smb_nt_ms15-133.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-134.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Windows host is affected by multiple elevation of privilege vulner...
File: smb_nt_ms15-135.nasl - Type: ACT_GATHER_INFO
2015-11-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-115.nasl - Type: ACT_GATHER_INFO
2015-11-10 Name: The remote Windows host is affected by an elevation of privilege vulnerability.
File: smb_nt_ms15-119.nasl - Type: ACT_GATHER_INFO
2015-11-10 Name: The remote host is affected by a denial of service vulnerability.
File: smb_nt_ms15-120.nasl - Type: ACT_GATHER_INFO
2015-11-10 Name: The remote Windows host is affected by a spoofing vulnerability.
File: smb_nt_ms15-121.nasl - Type: ACT_GATHER_INFO
2015-11-10 Name: The remote Windows host is affected by a security feature bypass vulnerability.
File: smb_nt_ms15-122.nasl - Type: ACT_GATHER_INFO
2015-10-19 Name: The remote printer is affected by a security bypass vulnerability known as FR...
File: lexmark_printer_TE701.nasl - Type: ACT_GATHER_INFO
2015-10-13 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms15-109.nasl - Type: ACT_GATHER_INFO
2015-10-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-111.nasl - Type: ACT_GATHER_INFO
2015-09-10 Name: The remote Windows host is affected by a remote code execution vulnerability.
File: smb_nt_ms15-100.nasl - Type: ACT_GATHER_INFO
2015-09-09 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-097.nasl - Type: ACT_GATHER_INFO
2015-09-09 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-098.nasl - Type: ACT_GATHER_INFO
2015-09-08 Name: The remote Windows host is affected by multiple elevation of privilege vulner...
File: smb_nt_ms15-102.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-080.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO
2015-08-11 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-079.nasl - Type: ACT_GATHER_INFO