Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2004-01-20 |
Product | Windows Server 2003 | Last view | 2020-02-20 |
Version | Type | ||
Update | sp1 | ||
Edition | x86 | ||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2020-02-20 | CVE-2012-5364 | The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries. |
7.5 | 2020-02-20 | CVE-2012-5362 | The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669. |
9.8 | 2019-05-16 | CVE-2019-0708 | A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. |
8.1 | 2017-06-22 | CVE-2017-0176 | A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled. |
7.8 | 2017-06-15 | CVE-2017-8487 | Windows OLE in Windows XP and Windows Server 2003 allows an attacker to execute code when a victim opens a specially crafted file or program aka "Windows olecnv32.dll Remote Code Execution Vulnerability." |
7.8 | 2017-06-15 | CVE-2017-8461 | Windows RPC with Routing and Remote Access enabled in Windows XP and Windows Server 2003 allows an attacker to execute code on a targeted RPC server which has Routing and Remote Access enabled via a specially crafted application, aka "Windows RPC Remote Code Execution Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-2360 | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1768 | win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1727 | Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Pool Buffer Overflow Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1726 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1725 | Buffer overflow in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Buffer Overflow Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1724 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Object Use After Free Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1723 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Station Use After Free Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1722 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1721 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer Dereference Vulnerability." |
7.2 | 2015-06-09 | CVE-2015-1720 | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability." |
2.1 | 2015-06-09 | CVE-2015-1719 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to obtain sensitive information from kernel memory via a crafted application, aka "Microsoft Windows Kernel Information Disclosure Vulnerability." |
5 | 2015-05-13 | CVE-2015-1716 | Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict Diffie-Hellman Ephemeral (DHE) key lengths, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, aka "Schannel Information Disclosure Vulnerability." |
6.9 | 2015-05-13 | CVE-2015-1702 | The Service Control Manager (SCM) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Service Control Manager Elevation of Privilege Vulnerability." |
2.1 | 2015-05-13 | CVE-2015-1680 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1679. |
2.1 | 2015-05-13 | CVE-2015-1679 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, and CVE-2015-1680. |
2.1 | 2015-05-13 | CVE-2015-1678 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1677, CVE-2015-1679, and CVE-2015-1680. |
2.1 | 2015-05-13 | CVE-2015-1677 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1676, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680. |
2.1 | 2015-05-13 | CVE-2015-1676 | The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680. |
9.3 | 2015-04-14 | CVE-2015-1645 | Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
16% (68) | CWE-20 | Improper Input Validation |
13% (58) | CWE-399 | Resource Management Errors |
13% (56) | CWE-264 | Permissions, Privileges, and Access Controls |
13% (56) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
12% (52) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8% (37) | CWE-362 | Race Condition |
5% (23) | CWE-200 | Information Exposure |
4% (19) | CWE-189 | Numeric Errors |
1% (7) | CWE-416 | Use After Free |
1% (5) | CWE-476 | NULL Pointer Dereference |
0% (4) | CWE-310 | Cryptographic Issues |
0% (4) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
0% (3) | CWE-16 | Configuration |
0% (2) | CWE-426 | Untrusted Search Path |
0% (2) | CWE-415 | Double Free |
0% (2) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
0% (2) | CWE-287 | Improper Authentication |
0% (2) | CWE-255 | Credentials Management |
0% (2) | CWE-190 | Integer Overflow or Wraparound |
0% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (2) | CWE-19 | Data Handling |
0% (1) | CWE-787 | Out-of-bounds Write |
0% (1) | CWE-284 | Access Control (Authorization) Issues |
0% (1) | CWE-254 | Security Features |
0% (1) | CWE-134 | Uncontrolled Format String |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-26 | Leveraging Race Conditions |
CAPEC-28 | Fuzzing |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-66 | SQL Injection |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:477 | MS Exchange / OWA NTLM Authentication Vulnerability |
oval:org.mitre.oval:def:1997 | Windows XP Negotiate Security Software Provider Denial of Service Vulnerability |
oval:org.mitre.oval:def:1962 | Windows Server 2003 Negotiate Security Software Provider Denial of Service Vu... |
oval:org.mitre.oval:def:1808 | Windows 2000 Negotiate Security Software Provider Denial of Service Vulnerabi... |
oval:org.mitre.oval:def:5926 | Windows 2000 NNTP Component Buffer Overflow |
oval:org.mitre.oval:def:5070 | Windows NT NNTP Component Buffer Overflow |
oval:org.mitre.oval:def:5021 | Vulnerability in NNTP Could Allow Remote Code Execution |
oval:org.mitre.oval:def:4392 | Windows Server 2003 NNTP Component Buffer Overflow |
oval:org.mitre.oval:def:246 | Network News Transfer Protocol Buffer Overflow |
oval:org.mitre.oval:def:5509 | Exchange Server 2003 Routing Engine Buffer Overflow |
oval:org.mitre.oval:def:3460 | Exchange Server 2003 (Windows Server 2003, 64-Bit Edition) Routing Engine Buf... |
oval:org.mitre.oval:def:2300 | Exchange Server 2003 (INTERIM) Routing Engine Buffer Overflow |
oval:org.mitre.oval:def:848 | Buffer Overflow in CDOSYS Message Processing (64-bit WinXP,SP1) |
oval:org.mitre.oval:def:581 | Buffer Overflow in CDOSYS Message Processing (Server 2003,SP1) |
oval:org.mitre.oval:def:1515 | Buffer Overflow in CDOSYS Message Processing (WinXP,SP2) |
oval:org.mitre.oval:def:1420 | Buffer Overflow in CDOSYS Message Processing (Win2K,SP4) |
oval:org.mitre.oval:def:1406 | Buffer Overflow in CDOSYS Message Processing (WinXP,SP1) |
oval:org.mitre.oval:def:1201 | Buffer Overflow in CDOEX Message Processing |
oval:org.mitre.oval:def:1130 | Buffer Overflow in CDOSYS Message Processing (Server 2003) |
oval:org.mitre.oval:def:1559 | Windows Media Player Plug-in EMBED Vulnerability |
oval:org.mitre.oval:def:2007 | SMB Driver Elevation of Privilege Vulnerability (XP,SP1) |
oval:org.mitre.oval:def:1942 | SMB Driver Elevation of Privilege Vulnerability (XP,SP2) |
oval:org.mitre.oval:def:1904 | SMB Driver Elevation of Privilege Vulnerability (Win2K) |
oval:org.mitre.oval:def:1792 | SMB Driver Elevation of Privilege Vulnerability (WinS03) |
oval:org.mitre.oval:def:1730 | SMB Driver Elevation of Privilege Vulnerability (64-bit XP) |
SAINT Exploits
Description | Link |
---|---|
Internet Explorer iepeers.dll use-after-free vulnerability | More info here |
Visual Studio Active Template Library object type mismatch vulnerability | More info here |
Windows Server Service buffer overflow MS08-067 | More info here |
Windows OLE Automation Array command execution | More info here |
Microsoft OLE Object File Handling vulnerability | More info here |
Internet Explorer WinINet credential reflection vulnerability | More info here |
Windows Thumbnail View CreateSizedDIBSECTION buffer overflow | More info here |
Windows Media MIDI Invalid Channel | More info here |
Microsoft DirectX DirectShow QuickTime movie parsing vulnerability | More info here |
Windows Help and Support Center -FromHCP URL whitelist bypass | More info here |
Microsoft Office ClickOnce Unsafe Execution | More info here |
Windows Object Packager Insecure Execution | More info here |
Windows Shell LNK file CONTROL item command execution | More info here |
Microsoft Remote Desktop Connection Insecure Library Injection | More info here |
Windows Crafted Theme File Handling Vulnerability | More info here |
Windows Media Player plugin EMBED buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78212 | Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote... |
78211 | Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Ex... |
78210 | Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Co... |
78209 | Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading Safe... |
78207 | Microsoft Windows Embedded ClickOnce Application Office File Handling Remote ... |
78206 | Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character ... |
78057 | Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS |
78056 | Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content P... |
78055 | Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass |
78054 | Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary S... |
77908 | Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote M... |
77667 | Microsoft Windows Active Directory Query Parsing Remote Overflow |
77666 | Microsoft Windows Kernel Exception Handler Local Privilege Escalation |
77665 | Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote C... |
77663 | Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Rem... |
77662 | Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation |
76902 | Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication... |
76843 | Microsoft Windows Win32k TrueType Font Handling Privilege Escalation |
76232 | Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation |
76231 | Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injectio... |
76221 | Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arb... |
76220 | Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow |
76218 | Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Co... |
75444 | Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Esca... |
75382 | Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Co... |
ExploitDB Exploits
id | Description |
---|---|
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
35101 | Windows TrackPopupMenu Win32k NULL Pointer Dereference |
33213 | Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei) |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
27050 | DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056) |
26554 | Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation |
19037 | MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability |
19002 | Microsoft Windows OLE Object File Handling Remote Code Execution |
18426 | MS12-004 midiOutPlayNextPolyEvent Heap Overflow |
18372 | Microsoft Windows Assembly Execution Vulnerability MS12-005 |
18176 | MS11-080 Afd.sys Privilege Escalation Exploit |
18024 | MS11-077 Win32k Null Pointer De-reference Vulnerability POC |
17978 | MS11-077 .fon Kernel-Mode Buffer Overrun PoC |
17831 | MS WINS ECommEndDlg Input Validation Error |
17659 | MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow |
17544 | GDI+ CreateDashedPath Integer overflow in gdiplus.dll |
16590 | Internet Explorer DHTML Behaviors Use After Free |
15985 | MS10-073: Win32k Keyboard Layout Vulnerability |
15158 | MOAUB #30 - Microsoft Unicode Scripts Processor Remote Code Execution |
14895 | MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit |
14608 | Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048) |
11683 | Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta) |
11199 | Windows NT - User Mode to Ring 0 Escalation Vulnerability |
9893 | Microsoft Internet Explorer 5,6,7 memory corruption PoC |
OpenVAS Exploits
id | Description |
---|---|
2013-07-09 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671... File : nvt/secpod_ms12-020_remote.nasl |
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
2012-12-12 | Name : Microsoft Windows File Handling Component Remote Code Execution Vulnerability... File : nvt/secpod_ms12-081.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
2012-11-14 | Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528) File : nvt/secpod_ms12-072.nasl |
2012-11-14 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-075.nasl |
2012-10-10 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197) File : nvt/secpod_ms12-068.nasl |
2012-09-28 | Name : Google Chrome Windows Kernel Memory Corruption Vulnerability File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
2012-08-15 | Name : Microsoft Windows Networking Components Remote Code Execution Vulnerabilities... File : nvt/secpod_ms12-054.nasl |
2012-08-15 | Name : Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731... File : nvt/secpod_ms12-055.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2501-1 (xen) File : nvt/deb_2501_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8) File : nvt/deb_2508_1.nasl |
2012-08-10 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD16.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
2015-A-0053 | Multiple Vulnerabilities in Microsoft Windows (MS15-020) Severity: Category II - VMSKEY: V0059001 |
2015-B-0036 | Microsoft Windows Information Disclosure Vulnerability (MS15-024) Severity: Category II - VMSKEY: V0059021 |
2015-A-0033 | Microsoft Group Policy Remote Code Execution (MS15-011) Severity: Category I - VMSKEY: V0058743 |
2015-B-0017 | Microsoft Group Policy Security Feature Bypass Vulnerability (MS15-014) Severity: Category I - VMSKEY: V0058755 |
2015-B-0006 | Microsoft Windows Telnet Buffer Overflow Vulnerability (MS15-002) Severity: Category I - VMSKEY: V0058199 |
2015-B-0004 | Microsoft Network Location Awareness Service Security Bypass Vulnerability (M... Severity: Category II - VMSKEY: V0058201 |
2015-A-0006 | Microsoft Windows Kernel-Mode Driver Privilege Escalation Vulnerability (MS15... Severity: Category II - VMSKEY: V0058205 |
2015-A-0007 | Microsoft Windows Network Policy Server Remote Denial of Service Vulnerabilit... Severity: Category I - VMSKEY: V0058207 |
2015-A-0008 | Microsoft Windows User Profile Service Privilege Escalation Vulnerability (MS... Severity: Category II - VMSKEY: V0058209 |
2014-A-0180 | Microsoft Windows Kerberos Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0057571 |
2014-B-0147 | Microsoft XML Core Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0057361 |
2014-A-0171 | Multiple Vulnerabilities in Windows OLE Severity: Category I - VMSKEY: V0057379 |
2014-A-0174 | Microsoft TCP/IP Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0057385 |
2014-A-0176 | Microsoft Secure Channel Remote Code Execution Vulnerability (MS14-066) Severity: Category I - VMSKEY: V0057389 |
2014-A-0179 | Microsoft Input Method Editor (IME) Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0057395 |
2014-A-0148 | Microsoft FAT32 Disk Partition Driver Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0055429 |
2014-A-0124 | Multiple Vulnerabilities in Microsoft Kernel-Mode Drivers Severity: Category II - VMSKEY: V0053797 |
2014-B-0093 | Microsoft Ancillary Function Driver Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0052955 |
2014-A-0080 | Multiple Vulnerabilities in Microsoft Graphics Component Severity: Category II - VMSKEY: V0052491 |
2014-A-0075 | Microsoft Windows Shell Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0050445 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows Media Player Plugin for Non-IE browsers buffer overflow att... RuleID : 5710 - Type : OS-WINDOWS - Revision : 17 |
2014-01-10 | Microsoft Windows wmf file arbitrary code execution attempt RuleID : 5318 - Type : FILE-MULTIMEDIA - Revision : 20 |
2020-01-14 | Microsoft Windows Wordpad Converter sprmT record heap overflow attempt RuleID : 52422 - Type : FILE-OFFICE - Revision : 1 |
2020-01-14 | Microsoft Windows Wordpad Converter sprmT record heap overflow attempt RuleID : 52421 - Type : FILE-OFFICE - Revision : 1 |
2020-01-03 | Microsoft Windows MHTML XSS attempt RuleID : 52335 - Type : OS-WINDOWS - Revision : 1 |
2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51557 - Type : OS-WINDOWS - Revision : 1 |
2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51556 - Type : OS-WINDOWS - Revision : 1 |
2019-10-17 | Microsoft DirectShow QuickTime file atom size parsing heap corruption attempt RuleID : 51555 - Type : OS-WINDOWS - Revision : 1 |
2019-10-10 | Microsoft Windows WordPad and Office text converter integer overflow attempt RuleID : 51473 - Type : FILE-OFFICE - Revision : 1 |
2019-10-10 | Microsoft Windows WordPad and Office text converter integer overflow attempt RuleID : 51472 - Type : FILE-OFFICE - Revision : 1 |
2019-09-17 | Microsoft Windows Object Packager ClickOnce object remote code execution attempt RuleID : 51029 - Type : OS-WINDOWS - Revision : 1 |
2019-09-17 | Microsoft Windows Object Packager ClickOnce object remote code execution attempt RuleID : 51028 - Type : OS-WINDOWS - Revision : 1 |
2019-09-05 | Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt RuleID : 50893 - Type : FILE-MULTIMEDIA - Revision : 1 |
2019-09-05 | Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt RuleID : 50892 - Type : FILE-MULTIMEDIA - Revision : 1 |
2019-09-05 | Microsoft OpenType font index remote code execution attempt RuleID : 50889 - Type : FILE-OTHER - Revision : 1 |
2019-09-05 | Microsoft OpenType font index remote code execution attempt RuleID : 50888 - Type : FILE-OTHER - Revision : 1 |
2019-09-05 | Microsoft Windows GDI EMF parsing arbitrary code execution attempt RuleID : 50885 - Type : FILE-OTHER - Revision : 1 |
2019-09-05 | Microsoft Windows GDI EMF parsing arbitrary code execution attempt RuleID : 50884 - Type : FILE-OTHER - Revision : 1 |
2019-09-05 | Microsoft Fax Cover Page Editor heap corruption attempt RuleID : 50873 - Type : OS-WINDOWS - Revision : 1 |
2019-09-05 | Microsoft Fax Cover Page Editor heap corruption attempt RuleID : 50872 - Type : OS-WINDOWS - Revision : 1 |
2019-08-31 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ... RuleID : 50849 - Type : FILE-OTHER - Revision : 1 |
2019-08-31 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ... RuleID : 50848 - Type : FILE-OTHER - Revision : 1 |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50707 - Type : OS-WINDOWS - Revision : 1 |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50706 - Type : OS-WINDOWS - Revision : 1 |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50705 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-04-03 | Name: The remote mail server may be affected by multiple vulnerabilities. File: exchange_ms10-024.nasl - Type: ACT_GATHER_INFO |
2018-04-03 | Name: The remote web server may allow remote code execution. File: iis_7_pci.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jun_windows8.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_june_xp_2003.nasl - Type: ACT_GATHER_INFO |
2015-10-19 | Name: The remote printer is affected by a security bypass vulnerability known as FR... File: lexmark_printer_TE701.nasl - Type: ACT_GATHER_INFO |
2015-06-09 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-061.nasl - Type: ACT_GATHER_INFO |
2015-05-12 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-050.nasl - Type: ACT_GATHER_INFO |
2015-05-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-051.nasl - Type: ACT_GATHER_INFO |
2015-05-12 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-055.nasl - Type: ACT_GATHER_INFO |
2015-04-14 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-035.nasl - Type: ACT_GATHER_INFO |
2015-04-14 | Name: The remote Windows host is affected by multiple privilege escalation vulnerab... File: smb_nt_ms15-038.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-020.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The Adobe Font driver on the remote host is affected by multiple vulnerabilit... File: smb_nt_ms15-021.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-023.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-024.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by multiple privilege escalation vulnerab... File: smb_nt_ms15-025.nasl - Type: ACT_GATHER_INFO |
2015-03-10 | Name: The remote Windows host is affected by a security feature bypass vulnerability. File: smb_nt_ms15-031.nasl - Type: ACT_GATHER_INFO |
2015-03-05 | Name: The remote Windows host is affected by a security feature bypass vulnerability. File: smb_kb3046015.nasl - Type: ACT_GATHER_INFO |
2015-02-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-010.nasl - Type: ACT_GATHER_INFO |
2015-02-10 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-011.nasl - Type: ACT_GATHER_INFO |
2015-02-10 | Name: The remote Windows host is affected by a security downgrade vulnerability. File: smb_nt_ms15-014.nasl - Type: ACT_GATHER_INFO |
2015-02-10 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-016.nasl - Type: ACT_GATHER_INFO |
2015-01-13 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms15-002.nasl - Type: ACT_GATHER_INFO |
2015-01-13 | Name: The remote Windows host is affected by a privilege escalation vulnerability. File: smb_nt_ms15-003.nasl - Type: ACT_GATHER_INFO |
2015-01-13 | Name: The remote Windows host is affected by a security bypass vulnerability. File: smb_nt_ms15-005.nasl - Type: ACT_GATHER_INFO |