Summary
| Detail | |||
|---|---|---|---|
| Vendor | Microsoft | First view | 2003-11-17 |
| Product | Windows Server 2003 | Last view | 2020-02-20 |
| Version | Type | ||
| Update | |||
| Edition | x64 | ||
| Language | |||
| Sofware Edition | |||
| Target Software | |||
| Target Hardware | |||
| Other | |||
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
| Date | Alert | Description | |
|---|---|---|---|
| 7.5 | 2020-02-20 | CVE-2012-5364 | The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries. |
| 7.5 | 2020-02-20 | CVE-2012-5362 | The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669. |
| 8.1 | 2017-06-22 | CVE-2017-0176 | A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled. |
| 7.8 | 2017-06-15 | CVE-2017-8487 | Windows OLE in Windows XP and Windows Server 2003 allows an attacker to execute code when a victim opens a specially crafted file or program aka "Windows olecnv32.dll Remote Code Execution Vulnerability." |
| 7.8 | 2017-06-15 | CVE-2017-8461 | Windows RPC with Routing and Remote Access enabled in Windows XP and Windows Server 2003 allows an attacker to execute code on a targeted RPC server which has Routing and Remote Access enabled via a specially crafted application, aka "Windows RPC Remote Code Execution Vulnerability." |
| 7.8 | 2015-07-14 | CVE-2015-2387 | ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-2360 | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1768 | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1727 | Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Pool Buffer Overflow Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1726 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1725 | Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Buffer Overflow Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1724 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Object Use After Free Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1723 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Station Use After Free Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1722 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1721 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer Dereference Vulnerability." |
| 7.2 | 2015-06-09 | CVE-2015-1720 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability." |
| 2.1 | 2015-06-09 | CVE-2015-1719 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to obtain sensitive information from kernel memory via a crafted application, aka "Microsoft Windows Kernel Information Disclosure Vulnerability." |
| 5 | 2015-05-13 | CVE-2015-1716 | Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict Diffie-Hellman Ephemeral (DHE) key lengths, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, aka "Schannel Information Disclosure Vulnerability." |
| 6.9 | 2015-05-13 | CVE-2015-1702 | The Service Control Manager (SCM) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Service Control Manager Elevation of Privilege Vulnerability." |
| 2.1 | 2015-05-13 | CVE-2015-1680 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1679. |
| 2.1 | 2015-05-13 | CVE-2015-1679 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1680. |
| 2.1 | 2015-05-13 | CVE-2015-1678 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1679, and CVE-2015-1680. |
| 2.1 | 2015-05-13 | CVE-2015-1677 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680. |
| 2.1 | 2015-05-13 | CVE-2015-1676 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680. |
| 9.3 | 2015-04-14 | CVE-2015-1645 | Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability." |
CWE : Common Weakness Enumeration
| % | id | Name |
|---|---|---|
| 15% (65) | CWE-20 | Improper Input Validation |
| 13% (57) | CWE-399 | Resource Management Errors |
| 13% (56) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
| 12% (51) | CWE-264 | Permissions, Privileges, and Access Controls |
| 12% (51) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
| 8% (37) | CWE-362 | Race Condition |
| 5% (23) | CWE-200 | Information Exposure |
| 4% (19) | CWE-189 | Numeric Errors |
| 1% (6) | CWE-416 | Use After Free |
| 1% (5) | CWE-476 | NULL Pointer Dereference |
| 0% (4) | CWE-310 | Cryptographic Issues |
| 0% (4) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
| 0% (3) | CWE-787 | Out-of-bounds Write |
| 0% (3) | CWE-415 | Double Free |
| 0% (3) | CWE-16 | Configuration |
| 0% (2) | CWE-426 | Untrusted Search Path |
| 0% (2) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
| 0% (2) | CWE-287 | Improper Authentication |
| 0% (2) | CWE-255 | Credentials Management |
| 0% (2) | CWE-190 | Integer Overflow or Wraparound |
| 0% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
| 0% (2) | CWE-88 | Argument Injection or Modification |
| 0% (2) | CWE-19 | Data Handling |
| 0% (1) | CWE-681 | Incorrect Conversion between Numeric Types |
| 0% (1) | CWE-667 | Insufficient Locking |
CAPEC : Common Attack Pattern Enumeration & Classification
| id | Name |
|---|---|
| CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
| CAPEC-7 | Blind SQL Injection |
| CAPEC-8 | Buffer Overflow in an API Call |
| CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
| CAPEC-10 | Buffer Overflow via Environment Variables |
| CAPEC-13 | Subverting Environment Variable Values |
| CAPEC-14 | Client-side Injection-induced Buffer Overflow |
| CAPEC-18 | Embedding Scripts in Nonscript Elements |
| CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
| CAPEC-24 | Filter Failure through Buffer Overflow |
| CAPEC-26 | Leveraging Race Conditions |
| CAPEC-27 | Leveraging Race Conditions via Symbolic Links |
| CAPEC-28 | Fuzzing |
| CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
| CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
| CAPEC-32 | Embedding Scripts in HTTP Query Strings |
| CAPEC-41 | Using Meta-characters in E-mail Headers to Inject Malicious Payloads |
| CAPEC-42 | MIME Conversion |
| CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
| CAPEC-45 | Buffer Overflow via Symbolic Links |
| CAPEC-46 | Overflow Variables and Tags |
| CAPEC-47 | Buffer Overflow via Parameter Expansion |
| CAPEC-52 | Embedding NULL Bytes |
| CAPEC-53 | Postfix, Null Terminate, and Backslash |
| CAPEC-59 | Session Credential Falsification through Prediction |
Oval Markup Language : Definitions
| OvalID | Name |
|---|---|
| oval:org.mitre.oval:def:900 | Windows XP RPCSS DCOM Buffer Overflow (Blaster) |
| oval:org.mitre.oval:def:894 | Server 2003 RPCSS DCOM Buffer Overflow |
| oval:org.mitre.oval:def:893 | Windows 2000 RPCSS DCOM Buffer Overflow (Blaster, Test 3) |
| oval:org.mitre.oval:def:477 | MS Exchange / OWA NTLM Authentication Vulnerability |
| oval:org.mitre.oval:def:904 | Windows Server 2003 Help Center Command Insertion Vulnerability |
| oval:org.mitre.oval:def:1000 | Windows XP Help Center Command Insertion Vulnerability |
| oval:org.mitre.oval:def:517 | IE v6.0,SP1 (Server 2003) Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:509 | IE v5.01,SP4 Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:236 | IE v6.0,SP1 Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:212 | IE v5.01,SP3 Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:2100 | IE v5.5,SP2 Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:206 | IE v5.01,SP2 Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:1793 | IE v6.0 Malformed GIF Image Double-free Vulnerability |
| oval:org.mitre.oval:def:1997 | Windows XP Negotiate Security Software Provider Denial of Service Vulnerability |
| oval:org.mitre.oval:def:1962 | Windows Server 2003 Negotiate Security Software Provider Denial of Service Vu... |
| oval:org.mitre.oval:def:1808 | Windows 2000 Negotiate Security Software Provider Denial of Service Vulnerabi... |
| oval:org.mitre.oval:def:5711 | Cisco Systems Spoofed TCP Reset and SYN Denial of Service Vulnerability |
| oval:org.mitre.oval:def:4791 | Win2k Large Window Size TCP RST Denial of Service |
| oval:org.mitre.oval:def:3508 | WinXP Large Window Size TCP RST Denial of Service |
| oval:org.mitre.oval:def:270 | TCP Connection Reset Vulnerability |
| oval:org.mitre.oval:def:2689 | Server 2003 Large Window Size TCP RST Denial of Service |
| oval:org.mitre.oval:def:28134 | Critical Patch Update January 2015 |
| oval:org.mitre.oval:def:5926 | Windows 2000 NNTP Component Buffer Overflow |
| oval:org.mitre.oval:def:5070 | Windows NT NNTP Component Buffer Overflow |
| oval:org.mitre.oval:def:5021 | Vulnerability in NNTP Could Allow Remote Code Execution |
SAINT Exploits
| Description | Link |
|---|---|
| Internet Explorer iepeers.dll use-after-free vulnerability | More info here |
| Visual Studio Active Template Library object type mismatch vulnerability | More info here |
| Windows Server Service buffer overflow MS08-067 | More info here |
| Windows OLE Automation Array command execution | More info here |
| Microsoft OLE Object File Handling vulnerability | More info here |
| Internet Explorer WinINet credential reflection vulnerability | More info here |
| Windows Thumbnail View CreateSizedDIBSECTION buffer overflow | More info here |
| Windows Media MIDI Invalid Channel | More info here |
| Microsoft DirectX DirectShow QuickTime movie parsing vulnerability | More info here |
| Windows Help and Support Center -FromHCP URL whitelist bypass | More info here |
| Microsoft Office ClickOnce Unsafe Execution | More info here |
| Windows Object Packager Insecure Execution | More info here |
| Windows Shell LNK file CONTROL item command execution | More info here |
| Microsoft Remote Desktop Connection Insecure Library Injection | More info here |
| Windows Crafted Theme File Handling Vulnerability | More info here |
| Windows Media Player plugin EMBED buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
| id | Description |
|---|---|
| 78212 | Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote... |
| 78211 | Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Ex... |
| 78210 | Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Co... |
| 78209 | Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading Safe... |
| 78207 | Microsoft Windows Embedded ClickOnce Application Office File Handling Remote ... |
| 78206 | Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character ... |
| 78057 | Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS |
| 78056 | Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content P... |
| 78055 | Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass |
| 78054 | Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary S... |
| 77908 | Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote M... |
| 77667 | Microsoft Windows Active Directory Query Parsing Remote Overflow |
| 77666 | Microsoft Windows Kernel Exception Handler Local Privilege Escalation |
| 77665 | Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote C... |
| 77663 | Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Rem... |
| 77662 | Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation |
| 76902 | Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication... |
| 76843 | Microsoft Windows Win32k TrueType Font Handling Privilege Escalation |
| 76232 | Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation |
| 76231 | Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injectio... |
| 76221 | Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arb... |
| 76220 | Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow |
| 76218 | Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Co... |
| 75444 | Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Esca... |
| 75382 | Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Co... |
ExploitDB Exploits
| id | Description |
|---|---|
| 35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
| 35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
| 35101 | Windows TrackPopupMenu Win32k NULL Pointer Dereference |
| 33213 | Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei) |
| 30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
| 27050 | DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056) |
| 26554 | Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation |
| 19037 | MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability |
| 19002 | Microsoft Windows OLE Object File Handling Remote Code Execution |
| 18426 | MS12-004 midiOutPlayNextPolyEvent Heap Overflow |
| 18372 | Microsoft Windows Assembly Execution Vulnerability MS12-005 |
| 18176 | MS11-080 Afd.sys Privilege Escalation Exploit |
| 18024 | MS11-077 Win32k Null Pointer De-reference Vulnerability POC |
| 17978 | MS11-077 .fon Kernel-Mode Buffer Overrun PoC |
| 17831 | MS WINS ECommEndDlg Input Validation Error |
| 17659 | MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow |
| 17544 | GDI+ CreateDashedPath Integer overflow in gdiplus.dll |
| 16590 | Internet Explorer DHTML Behaviors Use After Free |
| 15985 | MS10-073: Win32k Keyboard Layout Vulnerability |
| 15158 | MOAUB #30 - Microsoft Unicode Scripts Processor Remote Code Execution |
| 14895 | MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit |
| 14608 | Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048) |
| 11683 | Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta) |
| 9893 | Microsoft Internet Explorer 5,6,7 memory corruption PoC |
| 5547 | Novell eDirectory < 8.7.3 SP 10 / 8.8.2 - HTTP headers DoS Vulnerability |
OpenVAS Exploits
| id | Description |
|---|---|
| 2013-07-09 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671... File : nvt/secpod_ms12-020_remote.nasl |
| 2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
| 2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
| 2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
| 2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
| 2012-12-12 | Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability... File : nvt/secpod_ms12-081.nasl |
| 2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
| 2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
| 2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
| 2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
| 2012-11-14 | Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528) File : nvt/secpod_ms12-072.nasl |
| 2012-11-14 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-075.nasl |
| 2012-10-10 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197) File : nvt/secpod_ms12-068.nasl |
| 2012-09-28 | Name : Google Chrome Windows Kernel Memory Corruption Vulnerability File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl |
| 2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
| 2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
| 2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
| 2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
| 2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
| 2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
| 2012-08-15 | Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities... File : nvt/secpod_ms12-054.nasl |
| 2012-08-15 | Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731... File : nvt/secpod_ms12-055.nasl |
| 2012-08-10 | Name : Debian Security Advisory DSA 2501-1 (xen) File : nvt/deb_2501_1.nasl |
| 2012-08-10 | Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8) File : nvt/deb_2508_1.nasl |
| 2012-08-10 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD16.nasl |
Information Assurance Vulnerability Management (IAVM)
| id | Description |
|---|---|
| 2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
| 2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
| 2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
| 2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
| 2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
| 2015-A-0053 | Multiple Vulnerabilities in Microsoft Windows (MS15-020) Severity: Category II - VMSKEY: V0059001 |
| 2015-B-0036 | Microsoft Windows Information Disclosure Vulnerability (MS15-024) Severity: Category II - VMSKEY: V0059021 |
| 2015-A-0033 | Microsoft Group Policy Remote Code Execution (MS15-011) Severity: Category I - VMSKEY: V0058743 |
| 2015-B-0017 | Microsoft Group Policy Security Feature Bypass Vulnerability (MS15-014) Severity: Category I - VMSKEY: V0058755 |
| 2015-B-0006 | Microsoft Windows Telnet Buffer Overflow Vulnerability (MS15-002) Severity: Category I - VMSKEY: V0058199 |
| 2015-B-0004 | Microsoft Network Location Awareness Service Security Bypass Vulnerability (M... Severity: Category II - VMSKEY: V0058201 |
| 2015-A-0006 | Microsoft Windows Kernel-Mode Driver Privilege Escalation Vulnerability (MS15... Severity: Category II - VMSKEY: V0058205 |
| 2015-A-0007 | Microsoft Windows Network Policy Server Remote Denial of Service Vulnerabilit... Severity: Category I - VMSKEY: V0058207 |
| 2015-A-0008 | Microsoft Windows User Profile Service Privilege Escalation Vulnerability (MS... Severity: Category II - VMSKEY: V0058209 |
| 2014-A-0180 | Microsoft Windows Kerberos Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0057571 |
| 2014-B-0147 | Microsoft XML Core Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0057361 |
| 2014-A-0171 | Multiple Vulnerabilities in Windows OLE Severity: Category I - VMSKEY: V0057379 |
| 2014-A-0174 | Microsoft TCP/IP Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0057385 |
| 2014-A-0176 | Microsoft Secure Channel Remote Code Execution Vulnerability (MS14-066) Severity: Category I - VMSKEY: V0057389 |
| 2014-A-0179 | Microsoft Input Method Editor (IME) Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0057395 |
| 2014-A-0148 | Microsoft FAT32 Disk Partition Driver Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0055429 |
| 2014-A-0124 | Multiple Vulnerabilities in Microsoft Kernel-Mode Drivers Severity: Category II - VMSKEY: V0053797 |
| 2014-B-0093 | Microsoft Ancillary Function Driver Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0052955 |
| 2014-A-0080 | Multiple Vulnerabilities in Microsoft Graphics Component Severity: Category II - VMSKEY: V0052491 |
| 2014-A-0075 | Microsoft Windows Shell Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0050445 |
Snort® IPS/IDS
| Date | Description |
|---|---|
| 2018-06-15 | Microsoft Windows RTF file with embedded object package download attempt RuleID : 8445-community - Type : FILE-OFFICE - Revision : 17 |
| 2014-01-10 | Microsoft Windows RTF file with embedded object package download attempt RuleID : 8445 - Type : FILE-OFFICE - Revision : 17 |
| 2014-01-10 | Microsoft Windows Media Player Plugin for Non-IE browsers buffer overflow att... RuleID : 5710 - Type : OS-WINDOWS - Revision : 17 |
| 2014-01-10 | Microsoft Windows wmf file arbitrary code execution attempt RuleID : 5318 - Type : FILE-MULTIMEDIA - Revision : 20 |
| 2020-01-14 | Microsoft Windows Wordpad Converter sprmT record heap overflow attempt RuleID : 52422 - Type : FILE-OFFICE - Revision : 1 |
| 2020-01-14 | Microsoft Windows Wordpad Converter sprmT record heap overflow attempt RuleID : 52421 - Type : FILE-OFFICE - Revision : 1 |
| 2020-01-03 | Microsoft Windows MHTML XSS attempt RuleID : 52335 - Type : OS-WINDOWS - Revision : 1 |
| 2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51557 - Type : OS-WINDOWS - Revision : 1 |
| 2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51556 - Type : OS-WINDOWS - Revision : 1 |
| 2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51555 - Type : OS-WINDOWS - Revision : 1 |
| 2019-10-10 | Microsoft Windows WordPad and Office text converter integer overflow attempt RuleID : 51473 - Type : FILE-OFFICE - Revision : 1 |
| 2019-10-10 | Microsoft Windows WordPad and Office text converter integer overflow attempt RuleID : 51472 - Type : FILE-OFFICE - Revision : 1 |
| 2019-09-17 | Microsoft Windows Object Packager ClickOnce object remote code execution attempt RuleID : 51029 - Type : OS-WINDOWS - Revision : 1 |
| 2019-09-17 | Microsoft Windows Object Packager ClickOnce object remote code execution attempt RuleID : 51028 - Type : OS-WINDOWS - Revision : 1 |
| 2019-09-05 | Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt RuleID : 50893 - Type : FILE-MULTIMEDIA - Revision : 1 |
| 2019-09-05 | Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt RuleID : 50892 - Type : FILE-MULTIMEDIA - Revision : 1 |
| 2019-09-05 | Microsoft OpenType font index remote code execution attempt RuleID : 50889 - Type : FILE-OTHER - Revision : 1 |
| 2019-09-05 | Microsoft OpenType font index remote code execution attempt RuleID : 50888 - Type : FILE-OTHER - Revision : 1 |
| 2019-09-05 | Microsoft Windows GDI EMF parsing arbitrary code execution attempt RuleID : 50885 - Type : FILE-OTHER - Revision : 1 |
| 2019-09-05 | Microsoft Windows GDI EMF parsing arbitrary code execution attempt RuleID : 50884 - Type : FILE-OTHER - Revision : 1 |
| 2019-09-05 | Microsoft Fax Cover Page Editor heap corruption attempt RuleID : 50873 - Type : OS-WINDOWS - Revision : 1 |
| 2019-09-05 | Microsoft Fax Cover Page Editor heap corruption attempt RuleID : 50872 - Type : OS-WINDOWS - Revision : 1 |
| 2019-08-31 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ... RuleID : 50849 - Type : FILE-OTHER - Revision : 1 |
| 2019-08-31 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ... RuleID : 50848 - Type : FILE-OTHER - Revision : 1 |
| 2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50707 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
| id | Description |
|---|---|
| 2018-04-03 | Name: The remote mail server may be affected by multiple vulnerabilities. File: exchange_ms10-024.nasl - Type: ACT_GATHER_INFO |
| 2018-04-03 | Name: The remote web server may allow remote code execution. File: iis_7_pci.nasl - Type: ACT_GATHER_INFO |
| 2017-06-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_windows8.nasl - Type: ACT_GATHER_INFO |
| 2017-06-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_june_xp_2003.nasl - Type: ACT_GATHER_INFO |
| 2017-02-21 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0494-1.nasl - Type: ACT_GATHER_INFO |
| 2017-02-10 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0437-1.nasl - Type: ACT_GATHER_INFO |
| 2017-01-31 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-0333-1.nasl - Type: ACT_GATHER_INFO |
| 2016-08-12 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_729c4a9f600711e6a6c314dae9d210b8.nasl - Type: ACT_GATHER_INFO |
| 2015-10-19 | Name: The remote printer is affected by a security bypass vulnerability known as FR... File: lexmark_printer_TE701.nasl - Type: ACT_GATHER_INFO |
| 2015-07-14 | Name: The Adobe Font driver on the remote host is affected by a privilege escalatio... File: smb_nt_ms15-077.nasl - Type: ACT_GATHER_INFO |
| 2015-06-09 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-061.nasl - Type: ACT_GATHER_INFO |
| 2015-05-12 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-050.nasl - Type: ACT_GATHER_INFO |
| 2015-05-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO |
| 2015-05-12 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-055.nasl - Type: ACT_GATHER_INFO |
| 2015-04-14 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-035.nasl - Type: ACT_GATHER_INFO |
| 2015-04-14 | Name: The remote Windows host is affected by multiple privilege escalation vulnerab... File: smb_nt_ms15-038.nasl - Type: ACT_GATHER_INFO |
| 2015-03-10 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-020.nasl - Type: ACT_GATHER_INFO |
| 2015-03-10 | Name: The Adobe Font driver on the remote host is affected by multiple vulnerabilit... File: smb_nt_ms15-021.nasl - Type: ACT_GATHER_INFO |
| 2015-03-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-023.nasl - Type: ACT_GATHER_INFO |
| 2015-03-10 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-024.nasl - Type: ACT_GATHER_INFO |
| 2015-03-10 | Name: The remote Windows host is affected by multiple privilege escalation vulnerab... File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO |
| 2015-03-10 | Name: The remote Windows host is affected by a security feature bypass vulnerability. File: smb_nt_ms15-031.nasl - Type: ACT_GATHER_INFO |
| 2015-03-05 | Name: The remote Windows host is affected by a security feature bypass vulnerability. File: smb_kb3046015.nasl - Type: ACT_GATHER_INFO |
| 2015-02-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-010.nasl - Type: ACT_GATHER_INFO |
| 2015-02-10 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-011.nasl - Type: ACT_GATHER_INFO |
















