Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2012-09-26 |
Product | Windows Server 2012 | Last view | 2024-11-12 |
Version | - | Type | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2024-11-12 | CVE-2024-49046 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability |
7.8 | 2024-11-12 | CVE-2024-49019 | Active Directory Certificate Services Elevation of Privilege Vulnerability |
7.8 | 2024-11-12 | CVE-2024-43644 | Windows Client-Side Caching Elevation of Privilege Vulnerability |
6.8 | 2024-11-12 | CVE-2024-43643 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
7.8 | 2024-11-12 | CVE-2024-43641 | Windows Registry Elevation of Privilege Vulnerability |
9.8 | 2024-11-12 | CVE-2024-43639 | Windows KDC Proxy Remote Code Execution Vulnerability |
6.8 | 2024-11-12 | CVE-2024-43638 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
6.8 | 2024-11-12 | CVE-2024-43637 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
7.8 | 2024-11-12 | CVE-2024-43636 | Win32k Elevation of Privilege Vulnerability |
8.8 | 2024-11-12 | CVE-2024-43635 | Windows Telephony Service Remote Code Execution Vulnerability |
6.8 | 2024-11-12 | CVE-2024-43634 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
8.8 | 2024-11-12 | CVE-2024-43628 | Windows Telephony Service Remote Code Execution Vulnerability |
8.8 | 2024-11-12 | CVE-2024-43627 | Windows Telephony Service Remote Code Execution Vulnerability |
7.8 | 2024-11-12 | CVE-2024-43626 | Windows Telephony Service Elevation of Privilege Vulnerability |
7.8 | 2024-11-12 | CVE-2024-43623 | Windows NT OS Kernel Elevation of Privilege Vulnerability |
8.8 | 2024-11-12 | CVE-2024-43622 | Windows Telephony Service Remote Code Execution Vulnerability |
8.8 | 2024-11-12 | CVE-2024-43621 | Windows Telephony Service Remote Code Execution Vulnerability |
8.8 | 2024-11-12 | CVE-2024-43620 | Windows Telephony Service Remote Code Execution Vulnerability |
6.5 | 2024-11-12 | CVE-2024-43451 | NTLM Hash Disclosure Spoofing Vulnerability |
7.5 | 2024-11-12 | CVE-2024-43450 | Windows DNS Spoofing Vulnerability |
6.8 | 2024-11-12 | CVE-2024-43449 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
5.5 | 2024-11-12 | CVE-2024-38203 | Windows Package Library Manager Information Disclosure Vulnerability |
8.8 | 2024-10-08 | CVE-2024-43611 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
8.8 | 2024-10-08 | CVE-2024-43608 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
8.8 | 2024-10-08 | CVE-2024-43607 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
19% (217) | CWE-200 | Information Exposure |
10% (120) | CWE-264 | Permissions, Privileges, and Access Controls |
10% (120) | CWE-20 | Improper Input Validation |
7% (87) | CWE-269 | Improper Privilege Management |
7% (81) | CWE-362 | Race Condition |
6% (78) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
5% (67) | CWE-787 | Out-of-bounds Write |
2% (27) | CWE-416 | Use After Free |
2% (27) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
2% (26) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (22) | CWE-665 | Improper Initialization |
1% (21) | CWE-404 | Improper Resource Shutdown or Release |
1% (19) | CWE-125 | Out-of-bounds Read |
1% (17) | CWE-281 | Improper Preservation of Permissions |
1% (16) | CWE-284 | Access Control (Authorization) Issues |
1% (15) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (15) | CWE-19 | Data Handling |
1% (14) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (14) | CWE-254 | Security Features |
0% (10) | CWE-399 | Resource Management Errors |
0% (8) | CWE-190 | Integer Overflow or Wraparound |
0% (6) | CWE-426 | Untrusted Search Path |
0% (6) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
0% (5) | CWE-476 | NULL Pointer Dereference |
0% (5) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:15847 | TrueType Font Parsing Vulnerability - MS12-075 |
oval:org.mitre.oval:def:15975 | Windows Briefcase Integer Underflow Vulnerability - MS12-072 |
oval:org.mitre.oval:def:15528 | Windows Briefcase Integer Overflow Vulnerability - MS12-072 |
oval:org.mitre.oval:def:16117 | Revoked Certificate Bypass Vulnerability - MS12-083 |
oval:org.mitre.oval:def:16067 | OpenType Font Parsing Vulnerability - MS12-078 |
oval:org.mitre.oval:def:16429 | MSXML Integer Truncation Vulnerability - MS13-002 |
oval:org.mitre.oval:def:15458 | MSXML XSLT Vulnerability - MS13-002 |
oval:org.mitre.oval:def:16326 | Win32k Improper Message Handling Vulnerability - MS13-005 |
oval:org.mitre.oval:def:16273 | Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerabilit... |
oval:org.mitre.oval:def:16373 | TCP FIN WAIT Vulnerability - MS13-018 |
oval:org.mitre.oval:def:16388 | Microsoft NFS Server Denial Of Service Vulnerability - MS13-014 |
oval:org.mitre.oval:def:16441 | Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128... |
oval:org.mitre.oval:def:16591 | Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128... |
oval:org.mitre.oval:def:16498 | Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128... |
oval:org.mitre.oval:def:16563 | Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2... |
oval:org.mitre.oval:def:16455 | Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031) |
oval:org.mitre.oval:def:16575 | Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2... |
oval:org.mitre.oval:def:16257 | Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031) |
oval:org.mitre.oval:def:16088 | Vulnerability in HTTP.sys could allow denial of service - MS13-039 |
oval:org.mitre.oval:def:16332 | DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046 |
oval:org.mitre.oval:def:16091 | Win32k Window Handle Vulnerability - MS13-046 |
oval:org.mitre.oval:def:17360 | Win32k Read AV Vulnerability - CVE-2013-3660 (MS13-053) |
oval:org.mitre.oval:def:16837 | Vulnerability in Windows Print Spooler Components Could Allow Elevation of Pr... |
oval:org.mitre.oval:def:17353 | Win32k Memory Allocation Vulnerability- CVE-2013-1300 (MS13-053) |
oval:org.mitre.oval:def:17273 | Win32k Dereference Vulnerability - CVE-2013-1340 (MS13-053) |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability | More info here |
Windows OLE Automation Array command execution | More info here |
Microsoft Word and WordPad RTF HTA handler command execution | More info here |
Windows RRAS Service Remote Code Execution Vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
35236 | MS14-064 Microsoft Windows OLE Package Manager Code Execution |
35235 | MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python |
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
35216 | MS Office 2007 and 2010 - OLE Arbitrary Command Execution |
35101 | Windows TrackPopupMenu Win32k NULL Pointer Dereference |
35055 | Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060) |
35020 | MS14-060 Microsoft Windows OLE Package Manager Code Execution |
35019 | Windows OLE Package Manager SandWorm Exploit |
33213 | Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei) |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
27050 | DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056) |
26554 | Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation |
24485 | MS13-005 HWND_BROADCAST PoC |
OpenVAS Exploits
id | Description |
---|---|
2012-12-12 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-078.nasl |
2012-12-12 | Name : Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2... File : nvt/secpod_ms12-083.nasl |
2012-11-14 | Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528) File : nvt/secpod_ms12-072.nasl |
2012-11-14 | Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (... File : nvt/secpod_ms12-075.nasl |
2012-09-28 | Name : Google Chrome Windows Kernel Memory Corruption Vulnerability File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0216 | Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098) Severity: Category II - VMSKEY: V0061393 |
2015-A-0215 | Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102) Severity: Category II - VMSKEY: V0061391 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-B-0111 | Microsoft Hyper-V Security Bypass Vulnerability (MS15-105) Severity: Category II - VMSKEY: V0061371 |
2015-B-0110 | Microsoft Active Directory Service Denial of Service Vulnerability (MS15-096) Severity: Category II - VMSKEY: V0061369 |
2015-A-0190 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082) Severity: Category II - VMSKEY: V0061299 |
2015-B-0096 | Microsoft WebDAV Information Disclosure Vulnerability (MS15-089) Severity: Category II - VMSKEY: V0061285 |
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-A-0192 | Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085) Severity: Category I - VMSKEY: V0061303 |
2015-A-0193 | Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090) Severity: Category II - VMSKEY: V0061305 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2015-A-0167 | Multiple Vulnerabilities in Microsoft Windows (MS15-069) Severity: Category II - VMSKEY: V0061129 |
2015-B-0091 | Multiple Vulnerabilities in Microsoft Hyper-V (MS15-068) Severity: Category II - VMSKEY: V0061119 |
2015-A-0173 | Microsoft Windows Netlogon Privilege Escalation Vulnerability (MS15-071) Severity: Category II - VMSKEY: V0061111 |
2015-A-0170 | Microsoft Remote Desktop Protocol Vulnerability (MS15-067) Severity: Category I - VMSKEY: V0061107 |
2015-A-0168 | Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072) Severity: Category II - VMSKEY: V0061105 |
2015-A-0169 | Multiple Vulnerabilities in Microsoft OLE (MS15-075) Severity: Category II - VMSKEY: V0061103 |
2015-A-0162 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073) Severity: Category II - VMSKEY: V0061097 |
2015-A-0164 | Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074) Severity: Category II - VMSKEY: V0061095 |
2015-A-0165 | Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1... Severity: Category II - VMSKEY: V0061093 |
2015-A-0125 | Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS... Severity: Category II - VMSKEY: V0060943 |
2015-A-0122 | Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063) Severity: Category II - VMSKEY: V0060961 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56856 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56855 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56854 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56853 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56852 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56851 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56850 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56849 - Type : OS-WINDOWS - Revision : 1 |
2021-01-28 | Cisco RV Series Routers stack buffer overflow attempt RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2 |
2021-01-12 | Microsoft Windows SMB2 SET_INFO information disclosure attempt RuleID : 56571 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56562 - Type : OS-WINDOWS - Revision : 1 |
2021-01-08 | Microsoft Windows SMB authenticated remote code execution attempt RuleID : 56561 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Microsoft Windows NFS v3 Server heap overflow denial of service attempt RuleID : 56312 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Microsoft Windows NFS v3 Server heap overflow denial of service attempt RuleID : 56311 - Type : OS-WINDOWS - Revision : 1 |
2020-12-12 | Windows Network File System denial of service attempt RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56302 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows NFS read procedure remote code execution attempt RuleID : 56301 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56296 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows Common Log Files System driver privilege escalation attempt RuleID : 56295 - Type : FILE-OTHER - Revision : 1 |
2020-12-10 | Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt RuleID : 56290 - Type : OS-WINDOWS - Revision : 6 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56262 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows Win32k elevation of privilege attempt RuleID : 56261 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56231 - Type : OS-WINDOWS - Revision : 1 |
2020-12-08 | Microsoft Windows Kernel Cryptography Driver privilege escalation attempt RuleID : 56230 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows Remote Desktop information disclosure attempt RuleID : 55994 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-11 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO |
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO |
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO |
2018-11-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-3083.nasl - Type: ACT_GATHER_INFO |
2018-10-31 | Name: The remote host is missing a macOS security update that fixes multiple vulner... File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO |
2018-10-26 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1352.nasl - Type: ACT_GATHER_INFO |
2018-10-18 | Name: The remote host is missing a macOS update that fixes multiple security vulner... File: macos_10_14.nasl - Type: ACT_GATHER_INFO |
2018-10-10 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2846.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO |
2018-09-17 | Name: The remote Debian host is missing a security update. File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO |
2018-09-11 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_sep_office.nasl - Type: ACT_GATHER_INFO |
2018-09-04 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1278.nasl - Type: ACT_GATHER_INFO |
2018-09-04 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1279.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO |
2018-08-15 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO |
2018-08-15 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1058.nasl - Type: ACT_GATHER_INFO |
2018-08-15 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4272.nasl - Type: ACT_GATHER_INFO |