This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-09-26
Product Windows Server 2012 Last view 2024-11-12
Version - Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* 2895
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* 2756
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* 139
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:* 73
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:* 65
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:* 65
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:* 61
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:* 60
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:* 57
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:-:*:-:* 54
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:x64:*:* 45
cpe:2.3:o:microsoft:windows_server_2012:*:gold:*:*:*:*:*:* 40
cpe:2.3:o:microsoft:windows_server_2012:r2:-:*:*:*:*:x64:* 39
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:datacenter:*:x64:* 39
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:* 38

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2024-11-12 CVE-2024-49046

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

7.8 2024-11-12 CVE-2024-49019

Active Directory Certificate Services Elevation of Privilege Vulnerability

7.8 2024-11-12 CVE-2024-43644

Windows Client-Side Caching Elevation of Privilege Vulnerability

6.8 2024-11-12 CVE-2024-43643

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

7.8 2024-11-12 CVE-2024-43641

Windows Registry Elevation of Privilege Vulnerability

9.8 2024-11-12 CVE-2024-43639

Windows KDC Proxy Remote Code Execution Vulnerability

6.8 2024-11-12 CVE-2024-43638

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

6.8 2024-11-12 CVE-2024-43637

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

7.8 2024-11-12 CVE-2024-43636

Win32k Elevation of Privilege Vulnerability

8.8 2024-11-12 CVE-2024-43635

Windows Telephony Service Remote Code Execution Vulnerability

6.8 2024-11-12 CVE-2024-43634

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

8.8 2024-11-12 CVE-2024-43628

Windows Telephony Service Remote Code Execution Vulnerability

8.8 2024-11-12 CVE-2024-43627

Windows Telephony Service Remote Code Execution Vulnerability

7.8 2024-11-12 CVE-2024-43626

Windows Telephony Service Elevation of Privilege Vulnerability

7.8 2024-11-12 CVE-2024-43623

Windows NT OS Kernel Elevation of Privilege Vulnerability

8.8 2024-11-12 CVE-2024-43622

Windows Telephony Service Remote Code Execution Vulnerability

8.8 2024-11-12 CVE-2024-43621

Windows Telephony Service Remote Code Execution Vulnerability

8.8 2024-11-12 CVE-2024-43620

Windows Telephony Service Remote Code Execution Vulnerability

6.5 2024-11-12 CVE-2024-43451

NTLM Hash Disclosure Spoofing Vulnerability

7.5 2024-11-12 CVE-2024-43450

Windows DNS Spoofing Vulnerability

6.8 2024-11-12 CVE-2024-43449

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

5.5 2024-11-12 CVE-2024-38203

Windows Package Library Manager Information Disclosure Vulnerability

8.8 2024-10-08 CVE-2024-43611

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

8.8 2024-10-08 CVE-2024-43608

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

8.8 2024-10-08 CVE-2024-43607

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
19% (217) CWE-200 Information Exposure
10% (120) CWE-264 Permissions, Privileges, and Access Controls
10% (120) CWE-20 Improper Input Validation
7% (87) CWE-269 Improper Privilege Management
7% (81) CWE-362 Race Condition
6% (78) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
5% (67) CWE-787 Out-of-bounds Write
2% (27) CWE-416 Use After Free
2% (27) CWE-59 Improper Link Resolution Before File Access ('Link Following')
2% (26) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (22) CWE-665 Improper Initialization
1% (21) CWE-404 Improper Resource Shutdown or Release
1% (19) CWE-125 Out-of-bounds Read
1% (17) CWE-281 Improper Preservation of Permissions
1% (16) CWE-284 Access Control (Authorization) Issues
1% (15) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (15) CWE-19 Data Handling
1% (14) CWE-668 Exposure of Resource to Wrong Sphere
1% (14) CWE-254 Security Features
0% (10) CWE-399 Resource Management Errors
0% (8) CWE-190 Integer Overflow or Wraparound
0% (6) CWE-426 Untrusted Search Path
0% (6) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
0% (5) CWE-476 NULL Pointer Dereference
0% (5) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:15847 TrueType Font Parsing Vulnerability - MS12-075
oval:org.mitre.oval:def:15975 Windows Briefcase Integer Underflow Vulnerability - MS12-072
oval:org.mitre.oval:def:15528 Windows Briefcase Integer Overflow Vulnerability - MS12-072
oval:org.mitre.oval:def:16117 Revoked Certificate Bypass Vulnerability - MS12-083
oval:org.mitre.oval:def:16067 OpenType Font Parsing Vulnerability - MS12-078
oval:org.mitre.oval:def:16429 MSXML Integer Truncation Vulnerability - MS13-002
oval:org.mitre.oval:def:15458 MSXML XSLT Vulnerability - MS13-002
oval:org.mitre.oval:def:16326 Win32k Improper Message Handling Vulnerability - MS13-005
oval:org.mitre.oval:def:16273 Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerabilit...
oval:org.mitre.oval:def:16373 TCP FIN WAIT Vulnerability - MS13-018
oval:org.mitre.oval:def:16388 Microsoft NFS Server Denial Of Service Vulnerability - MS13-014
oval:org.mitre.oval:def:16441 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16591 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16498 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16563 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16455 Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031)
oval:org.mitre.oval:def:16575 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16257 Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031)
oval:org.mitre.oval:def:16088 Vulnerability in HTTP.sys could allow denial of service - MS13-039
oval:org.mitre.oval:def:16332 DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046
oval:org.mitre.oval:def:16091 Win32k Window Handle Vulnerability - MS13-046
oval:org.mitre.oval:def:17360 Win32k Read AV Vulnerability - CVE-2013-3660 (MS13-053)
oval:org.mitre.oval:def:16837 Vulnerability in Windows Print Spooler Components Could Allow Elevation of Pr...
oval:org.mitre.oval:def:17353 Win32k Memory Allocation Vulnerability- CVE-2013-1300 (MS13-053)
oval:org.mitre.oval:def:17273 Win32k Dereference Vulnerability - CVE-2013-1340 (MS13-053)

SAINT Exploits

Description Link
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here
Windows OLE Automation Array command execution More info here
Microsoft Word and WordPad RTF HTA handler command execution More info here
Windows RRAS Service Remote Code Execution Vulnerability More info here

ExploitDB Exploits

id Description
35236 MS14-064 Microsoft Windows OLE Package Manager Code Execution
35235 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
35216 MS Office 2007 and 2010 - OLE Arbitrary Command Execution
35101 Windows TrackPopupMenu Win32k NULL Pointer Dereference
35055 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
35020 MS14-060 Microsoft Windows OLE Package Manager Code Execution
35019 Windows OLE Package Manager SandWorm Exploit
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)
27050 DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056)
26554 Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
24485 MS13-005 HWND_BROADCAST PoC

OpenVAS Exploits

id Description
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-12-12 Name : Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2...
File : nvt/secpod_ms12-083.nasl
2012-11-14 Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
File : nvt/secpod_ms12-072.nasl
2012-11-14 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-075.nasl
2012-09-28 Name : Google Chrome Windows Kernel Memory Corruption Vulnerability
File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-B-0111 Microsoft Hyper-V Security Bypass Vulnerability (MS15-105)
Severity: Category II - VMSKEY: V0061371
2015-B-0110 Microsoft Active Directory Service Denial of Service Vulnerability (MS15-096)
Severity: Category II - VMSKEY: V0061369
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0167 Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity: Category II - VMSKEY: V0061129
2015-B-0091 Multiple Vulnerabilities in Microsoft Hyper-V (MS15-068)
Severity: Category II - VMSKEY: V0061119
2015-A-0173 Microsoft Windows Netlogon Privilege Escalation Vulnerability (MS15-071)
Severity: Category II - VMSKEY: V0061111
2015-A-0170 Microsoft Remote Desktop Protocol Vulnerability (MS15-067)
Severity: Category I - VMSKEY: V0061107
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0122 Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
Severity: Category II - VMSKEY: V0060961
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56562 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56561 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Microsoft Windows NFS v3 Server heap overflow denial of service attempt
RuleID : 56312 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Microsoft Windows NFS v3 Server heap overflow denial of service attempt
RuleID : 56311 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56302 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56301 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56231 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56230 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows Remote Desktop information disclosure attempt
RuleID : 55994 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-11 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO
2018-11-16 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote host is missing a macOS security update that fixes multiple vulner...
File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO
2018-10-26 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1352.nasl - Type: ACT_GATHER_INFO
2018-10-18 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_14.nasl - Type: ACT_GATHER_INFO
2018-10-10 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2846.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO
2018-09-17 Name: The remote Debian host is missing a security update.
File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO
2018-09-11 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1278.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1279.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The remote Debian host is missing a security update.
File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4272.nasl - Type: ACT_GATHER_INFO