This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2012-09-26
Product Windows Server 2012 Last view 2020-07-29
Version r2 Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* 1284
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* 1209
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* 90
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:* 36
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:* 28
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:* 28
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:* 25
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:x64:*:* 8
cpe:2.3:o:microsoft:windows_server_2012:*:gold:*:*:*:*:*:* 2
cpe:2.3:o:microsoft:windows_server_2012:*:r2:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.4 2020-07-29 CVE-2020-15707

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15706

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

6.4 2020-07-29 CVE-2020-15705

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.

6.5 2020-07-14 CVE-2020-1468

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.

7.8 2020-07-14 CVE-2020-1438

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428.

7.8 2020-07-14 CVE-2020-1437

An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows Network Location Awareness Service Elevation of Privilege Vulnerability'.

8.8 2020-07-14 CVE-2020-1436

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'.

8.8 2020-07-14 CVE-2020-1435

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1430

An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows UPnP Device Host Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1354.

7.8 2020-07-14 CVE-2020-1428

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1438.

7.8 2020-07-14 CVE-2020-1427

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438.

5.5 2020-07-14 CVE-2020-1419

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1426.

8.8 2020-07-14 CVE-2020-1416

An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka 'Visual Studio and Visual Studio Code Elevation of Privilege Vulnerability'.

8.8 2020-07-14 CVE-2020-1412

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1410

A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1409

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'.

8.8 2020-07-14 CVE-2020-1408

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'.

7.8 2020-07-14 CVE-2020-1407

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1401.

7.8 2020-07-14 CVE-2020-1406

An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory, aka 'Windows Network List Service Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1402

An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows ActiveX Installer Service Elevation of Privilege Vulnerability'.

7.8 2020-07-14 CVE-2020-1401

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1407.

7.8 2020-07-14 CVE-2020-1400

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1401, CVE-2020-1407.

7.8 2020-07-14 CVE-2020-1399

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.

6.5 2020-07-14 CVE-2020-1397

An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory, aka 'Windows Imaging Component Information Disclosure Vulnerability'.

7.8 2020-07-14 CVE-2020-1396

An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
27% (356) CWE-200 Information Exposure
16% (223) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
14% (193) CWE-269 Improper Privilege Management
13% (172) CWE-264 Permissions, Privileges, and Access Controls
11% (150) CWE-20 Improper Input Validation
1% (26) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (21) CWE-404 Improper Resource Shutdown or Release
1% (19) CWE-284 Access Control (Authorization) Issues
1% (19) CWE-254 Security Features
1% (17) CWE-281 Improper Preservation of Permissions
1% (15) CWE-19 Data Handling
0% (13) CWE-611 Information Leak Through XML External Entity File Disclosure
0% (12) CWE-416 Use After Free
0% (10) CWE-399 Resource Management Errors
0% (9) CWE-362 Race Condition
0% (5) CWE-476 NULL Pointer Dereference
0% (5) CWE-426 Untrusted Search Path
0% (5) CWE-310 Cryptographic Issues
0% (5) CWE-287 Improper Authentication
0% (4) CWE-190 Integer Overflow or Wraparound
0% (3) CWE-415 Double Free
0% (3) CWE-255 Credentials Management
0% (3) CWE-189 Numeric Errors
0% (2) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (2) CWE-502 Deserialization of Untrusted Data

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:15847 TrueType Font Parsing Vulnerability - MS12-075
oval:org.mitre.oval:def:15975 Windows Briefcase Integer Underflow Vulnerability - MS12-072
oval:org.mitre.oval:def:15528 Windows Briefcase Integer Overflow Vulnerability - MS12-072
oval:org.mitre.oval:def:16117 Revoked Certificate Bypass Vulnerability - MS12-083
oval:org.mitre.oval:def:16067 OpenType Font Parsing Vulnerability - MS12-078
oval:org.mitre.oval:def:16429 MSXML Integer Truncation Vulnerability - MS13-002
oval:org.mitre.oval:def:15458 MSXML XSLT Vulnerability - MS13-002
oval:org.mitre.oval:def:16326 Win32k Improper Message Handling Vulnerability - MS13-005
oval:org.mitre.oval:def:16273 Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerabilit...
oval:org.mitre.oval:def:16373 TCP FIN WAIT Vulnerability - MS13-018
oval:org.mitre.oval:def:16388 Microsoft NFS Server Denial Of Service Vulnerability - MS13-014
oval:org.mitre.oval:def:16441 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16591 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16498 Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-128...
oval:org.mitre.oval:def:16563 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16455 Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031)
oval:org.mitre.oval:def:16575 Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2...
oval:org.mitre.oval:def:16257 Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031)
oval:org.mitre.oval:def:16088 Vulnerability in HTTP.sys could allow denial of service - MS13-039
oval:org.mitre.oval:def:16332 DirectX Graphics Kernel Subsystem Double Fetch Vulnerability - MS13-046
oval:org.mitre.oval:def:16091 Win32k Window Handle Vulnerability - MS13-046
oval:org.mitre.oval:def:17360 Win32k Read AV Vulnerability - CVE-2013-3660 (MS13-053)
oval:org.mitre.oval:def:16837 Vulnerability in Windows Print Spooler Components Could Allow Elevation of Pr...
oval:org.mitre.oval:def:17353 Win32k Memory Allocation Vulnerability- CVE-2013-1300 (MS13-053)
oval:org.mitre.oval:def:17273 Win32k Dereference Vulnerability - CVE-2013-1340 (MS13-053)

SAINT Exploits

Description Link
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here
Windows OLE Automation Array command execution More info here
Microsoft Word and WordPad RTF HTA handler command execution More info here
Windows RRAS Service Remote Code Execution Vulnerability More info here

ExploitDB Exploits

id Description
35236 MS14-064 Microsoft Windows OLE Package Manager Code Execution
35235 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
35216 MS Office 2007 and 2010 - OLE Arbitrary Command Execution
35101 Windows TrackPopupMenu Win32k NULL Pointer Dereference
35055 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
35020 MS14-060 Microsoft Windows OLE Package Manager Code Execution
35019 Windows OLE Package Manager SandWorm Exploit
33213 Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)
27050 DirectShow Arbitrary Memory Overwrite Vulnerability (MS13-056)
26554 Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
24485 MS13-005 HWND_BROADCAST PoC

OpenVAS Exploits

id Description
2012-12-12 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-078.nasl
2012-12-12 Name : Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2...
File : nvt/secpod_ms12-083.nasl
2012-11-14 Name : Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
File : nvt/secpod_ms12-072.nasl
2012-11-14 Name : Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (...
File : nvt/secpod_ms12-075.nasl
2012-09-28 Name : Google Chrome Windows Kernel Memory Corruption Vulnerability
File : nvt/gb_google_chrome_mem_crptn_vuln_win.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-B-0111 Microsoft Hyper-V Security Bypass Vulnerability (MS15-105)
Severity: Category II - VMSKEY: V0061371
2015-B-0110 Microsoft Active Directory Service Denial of Service Vulnerability (MS15-096)
Severity: Category II - VMSKEY: V0061369
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0167 Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity: Category II - VMSKEY: V0061129
2015-B-0091 Multiple Vulnerabilities in Microsoft Hyper-V (MS15-068)
Severity: Category II - VMSKEY: V0061119
2015-A-0173 Microsoft Windows Netlogon Privilege Escalation Vulnerability (MS15-071)
Severity: Category II - VMSKEY: V0061111
2015-A-0170 Microsoft Remote Desktop Protocol Vulnerability (MS15-067)
Severity: Category I - VMSKEY: V0061107
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0122 Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
Severity: Category II - VMSKEY: V0060961
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54297 - Type : OS-WINDOWS - Revision : 1
2020-07-14 Microsoft Windows GDI+ printer out of bounds write attempt
RuleID : 54296 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54248 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows win32k.sys remote code execution attempt
RuleID : 54247 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54242 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows CreateDIBitmap privilege escalation attempt
RuleID : 54241 - Type : OS-WINDOWS - Revision : 1
2020-07-09 Microsoft Windows SMBv1 remote code execution attempt
RuleID : 54240 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54216 - Type : OS-WINDOWS - Revision : 1
2020-07-07 Microsoft Windows win32k type confusion attempt
RuleID : 54215 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53984 - Type : OS-WINDOWS - Revision : 1
2020-06-13 Windows print spooler elevation of privilege attempt
RuleID : 53983 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53951 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows fontdrvhost remote code execution attempt
RuleID : 53950 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53933 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k privilege escalation attempt
RuleID : 53932 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 53917 - Type : OS-WINDOWS - Revision : 1
2020-06-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 53916 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows CF_PALETTE privilege escalation attempt
RuleID : 53653 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows CF_PALETTE privilege escalation attempt
RuleID : 53652 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Kernel CSRSS privilege escalation attempt
RuleID : 53630 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Kernel CSRSS privilege escalation attempt
RuleID : 53629 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 53628 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 53627 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Graphics Component privilege escalation attempt
RuleID : 53620 - Type : OS-WINDOWS - Revision : 1
2020-05-14 Microsoft Windows Graphics Component privilege escalation attempt
RuleID : 53619 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-30 Name: The Internet Explorer installation on the remote host is affected by multiple...
File: smb_nt_ms17_jul_internet_explorer.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO
2017-10-20 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms17_apr_3217841.nasl - Type: ACT_GATHER_INFO
2017-10-20 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms17_apr_4014793.nasl - Type: ACT_GATHER_INFO