Executive Summary
Summary | |
---|---|
Title | Microsoft Updates for Multiple Vulnerabilities |
Informations | |||
---|---|---|---|
Name | TA12-164A | First vendor Publication | 2012-06-12 |
Vendor | US-CERT | Last vendor Modification | 2012-06-12 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities. Description The Microsoft Security Bulletin Summary for June 2012 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address the vulnerabilities. Additional details for MS12-042 can be found in US-CERT vulnerability note VU#649219. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for June 2012, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates. |
Original Source
Url : http://www.us-cert.gov/cas/techalerts/TA12-164A.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
14 % | CWE-20 | Improper Input Validation |
9 % | CWE-399 | Resource Management Errors |
9 % | CWE-200 | Information Exposure |
5 % | CWE-362 | Race Condition |
5 % | CWE-264 | Permissions, Privileges, and Access Controls |
5 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
5 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13998 | |||
Oval ID: | oval:org.mitre.oval:def:13998 | ||
Title: | Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege | ||
Description: | Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-3402 | Version: | 7 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14874 | |||
Oval ID: | oval:org.mitre.oval:def:14874 | ||
Title: | Lync Insecure Library Loading Vulnerability (CVE-2012-1849) | ||
Description: | Untrusted search path vulnerability in Microsoft Lync 2010, 2010 Attendee, and 2010 Attendant allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .ocsmeet file, aka "Lync Insecure Library Loading Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1849 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Lync 2010 Microsoft Lync 2010 Attendant Microsoft Lync 2010 Attendee |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14975 | |||
Oval ID: | oval:org.mitre.oval:def:14975 | ||
Title: | insertRow Remote Code Execution Vulnerability (CVE-2012-1880) | ||
Description: | Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "insertRow Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1880 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15026 | |||
Oval ID: | oval:org.mitre.oval:def:15026 | ||
Title: | Null Byte Information Disclosure Vulnerability (CVE-2012-1873) | ||
Description: | Microsoft Internet Explorer 7 through 9 does not properly create and initialize string data, which allows remote attackers to obtain sensitive information from process memory via a crafted HTML document, aka "Null Byte Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1873 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15096 | |||
Oval ID: | oval:org.mitre.oval:def:15096 | ||
Title: | Clipboard Format Atom Name Handling Vulnerability (CVE-2012-1866) | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "Clipboard Format Atom Name Handling Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1866 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15116 | |||
Oval ID: | oval:org.mitre.oval:def:15116 | ||
Title: | Remote Desktop Protocol Vulnerability (CVE-2012-0173) | ||
Description: | The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability," a different vulnerability than CVE-2012-0002. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0173 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15209 | |||
Oval ID: | oval:org.mitre.oval:def:15209 | ||
Title: | BIOS ROM Corruption Vulnerability (CVE-2012-1515) | ||
Description: | VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1515 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15290 | |||
Oval ID: | oval:org.mitre.oval:def:15290 | ||
Title: | TrueType Font Parsing Vulnerability (CVE-2011-3402) | ||
Description: | Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-3402 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Lync 2010 Microsoft Lync 2010 Attendee |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15378 | |||
Oval ID: | oval:org.mitre.oval:def:15378 | ||
Title: | OnRowsInserted Event Remote Code Execution Vulnerability (CVE-2012-1881) | ||
Description: | Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnRowsInserted Event Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1881 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15388 | |||
Oval ID: | oval:org.mitre.oval:def:15388 | ||
Title: | TrueType Font Parsing Vulnerability (CVE-2012-0159) | ||
Description: | Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview; Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Silverlight 4 before 4.1.10329; and Silverlight 5 before 5.1.10411 allow remote attackers to execute arbitrary code via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0159 | Version: | 30 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | Microsoft Silverlight 4 Microsoft Silverlight 5 Microsoft Office 2003 Microsoft Office 2007 Microsoft Office 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15425 | |||
Oval ID: | oval:org.mitre.oval:def:15425 | ||
Title: | Developer Toolbar Remote Code Execution Vulnerability (CVE-2012-1874) | ||
Description: | Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows user-assisted remote attackers to execute arbitrary code by accessing a deleted object, aka "Developer Toolbar Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1874 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15472 | |||
Oval ID: | oval:org.mitre.oval:def:15472 | ||
Title: | Title Element Change Remote Code Execution Vulnerability (CVE-2012-1877) | ||
Description: | Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Title Element Change Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1877 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15496 | |||
Oval ID: | oval:org.mitre.oval:def:15496 | ||
Title: | String Atom Class Name Handling Vulnerability (CVE-2012-1864) | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "String Atom Class Name Handling Vulnerability," a different vulnerability than CVE-2012-1865. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1864 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15510 | |||
Oval ID: | oval:org.mitre.oval:def:15510 | ||
Title: | Font Resource Refcount Integer Overflow Vulnerability (CVE-2012-1867) | ||
Description: | Integer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted TrueType font file that triggers incorrect memory allocation, aka "Font Resource Refcount Integer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1867 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15530 | |||
Oval ID: | oval:org.mitre.oval:def:15530 | ||
Title: | HTML Sanitization Vulnerability - MS12-050 | ||
Description: | The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1858 | Version: | 13 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Communicator 2007 R2 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Lync 2010 Microsoft Lync 2010 Attendee Microsoft Groove Server 2010 Microsoft InfoPath 2007 Microsoft InfoPath 2010 Microsoft SharePoint Foundation 2010 Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 Microsoft SharePoint Services 3.0 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15539 | |||
Oval ID: | oval:org.mitre.oval:def:15539 | ||
Title: | Col Element Remote Code Execution Vulnerability (CVE-2012-1876) | ||
Description: | Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1876 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15579 | |||
Oval ID: | oval:org.mitre.oval:def:15579 | ||
Title: | Center Element Remote Code Execution Vulnerability (CVE-2012-1523) | ||
Description: | Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Center Element Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1523 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15588 | |||
Oval ID: | oval:org.mitre.oval:def:15588 | ||
Title: | insertAdjacentText Remote Code Execution Vulnerability (CVE-2012-1879) | ||
Description: | Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access an undefined memory location, aka "insertAdjacentText Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1879 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15596 | |||
Oval ID: | oval:org.mitre.oval:def:15596 | ||
Title: | User Mode Scheduler Memory Corruption Vulnerability (CVE-2012-0217) | ||
Description: | The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0217 | Version: | 8 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15632 | |||
Oval ID: | oval:org.mitre.oval:def:15632 | ||
Title: | OnBeforeDeactivate Event Remote Code Execution Vulnerability (CVE-2012-1878) | ||
Description: | Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnBeforeDeactivate Event Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1878 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15645 | |||
Oval ID: | oval:org.mitre.oval:def:15645 | ||
Title: | TrueType Font Parsing Vulnerability (CVE-2011-3402) | ||
Description: | Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-3402 | Version: | 30 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 | Product(s): | Microsoft Silverlight 4 Microsoft Silverlight 5 Microsoft Office 2003 Microsoft Office 2007 Microsoft Office 2010 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15647 | |||
Oval ID: | oval:org.mitre.oval:def:15647 | ||
Title: | Win32k.sys Race Condition Vulnerability (CVE-2012-1868) | ||
Description: | Race condition in the thread-creation implementation in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 allows local users to gain privileges via a crafted application, aka "Win32k.sys Race Condition Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1868 | Version: | 3 |
Platform(s): | Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15649 | |||
Oval ID: | oval:org.mitre.oval:def:15649 | ||
Title: | String Atom Class Name Handling Vulnerability (CVE-2012-1865) | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "String Atom Class Name Handling Vulnerability," a different vulnerability than CVE-2012-1864. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1865 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15663 | |||
Oval ID: | oval:org.mitre.oval:def:15663 | ||
Title: | Same ID Property Remote Code Execution Vulnerability (CVE-2012-1875) | ||
Description: | Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Same ID Property Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1875 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 8 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15667 | |||
Oval ID: | oval:org.mitre.oval:def:15667 | ||
Title: | TrueType Font Parsing Vulnerability (CVE-2012-0159) | ||
Description: | Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview; Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Silverlight 4 before 4.1.10329; and Silverlight 5 before 5.1.10411 allow remote attackers to execute arbitrary code via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0159 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Lync 2010 Microsoft Lync 2010 Attendee |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17110 | |||
Oval ID: | oval:org.mitre.oval:def:17110 | ||
Title: | VMware ROM Overwrite Privilege Escalation | ||
Description: | VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1515 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | VMware Workstation VMware Player |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19281 | |||
Oval ID: | oval:org.mitre.oval:def:19281 | ||
Title: | CRITICAL PATCH UPDATE OCTOBER 2012 | ||
Description: | The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-0217 | Version: | 3 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19861 | |||
Oval ID: | oval:org.mitre.oval:def:19861 | ||
Title: | DSA-2508-1 kfreebsd-8 - privilege escalation | ||
Description: | Rafal Wojtczuk from Bromium discovered that FreeBSD wasn't handling correctly uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation to kernel for local users. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2508-1 CVE-2012-0217 | Version: | 5 |
Platform(s): | Debian GNU/kFreeBSD 6.0 | Product(s): | kfreebsd-8 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20625 | |||
Oval ID: | oval:org.mitre.oval:def:20625 | ||
Title: | VMware ESXi and ESX address several security issues | ||
Description: | VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-1515 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Internet Explorer COL SPAN Heap Overflow | More info here |
Internet Explorer Same ID Property vulnerability | More info here |
Microsoft .NET Framework Memory Access Vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
2014-11-17 | Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.1 Bypass ... |
2014-09-29 | Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.0 Bypass ... |
2014-07-01 | Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 4.1.X Bypass |
2013-01-10 | Internet Explorer 8 - Fixed Col Span ID Full ASLR & DEP Bypass |
2012-08-02 | Microsoft Internet Explorer Fixed Table Col Span Heap Overflow |
2012-07-12 | IE9, SharePoint, Lync toStaticHTML HTML Sanitizing Bypass |
2012-06-14 | MS12-037 Internet Explorer Same ID Property Deleted Object Handling Memory Co... |
OpenVAS Exploits
Date | Description |
---|---|
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8) File : nvt/deb_2508_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2501-1 (xen) File : nvt/deb_2501_1.nasl |
2012-08-10 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD16.nasl |
2012-08-06 | Name : Fedora Update for xen FEDORA-2012-11190 File : nvt/gb_fedora_2012_11190_xen_fc16.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2012:0721 centos5 File : nvt/gb_CESA-2012_0721_kernel_centos5.nasl |
2012-07-11 | Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502) File : nvt/secpod_ms12-050.nasl |
2012-06-28 | Name : Fedora Update for xen FEDORA-2012-9399 File : nvt/gb_fedora_2012_9399_xen_fc16.nasl |
2012-06-28 | Name : Fedora Update for xen FEDORA-2012-9430 File : nvt/gb_fedora_2012_9430_xen_fc15.nasl |
2012-06-15 | Name : RedHat Update for kernel RHSA-2012:0721-01 File : nvt/gb_RHSA-2012_0721-01_kernel.nasl |
2012-06-13 | Name : Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167) File : nvt/secpod_ms12-042.nasl |
2012-06-13 | Name : Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939) File : nvt/secpod_ms12-036.nasl |
2012-06-13 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988) File : nvt/secpod_ms12-037.nasl |
2012-06-13 | Name : Microsoft .NET Framework Remote Code Execution Vulnerability (2706726) File : nvt/secpod_ms12-038.nasl |
2012-06-13 | Name : Microsoft Lync Remote Code Execution Vulnerabilities (2707956) File : nvt/secpod_ms12-039.nasl |
2012-06-13 | Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2709162) File : nvt/secpod_ms12-041.nasl |
2012-05-14 | Name : Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X) File : nvt/secpod_ms12-034_macosx.nasl |
2012-05-09 | Name : MS Security Update For Microsoft Office, .NET Framework, and Silverlight (268... File : nvt/secpod_ms12-034.nasl |
2012-04-02 | Name : VMSA-2012-0006 VMware ESXi and ESX address several security issues File : nvt/gb_VMSA-2012-0006.nasl |
2011-12-14 | Name : Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2567053) File : nvt/secpod_ms11-087.nasl |
2011-11-07 | Name : Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability File : nvt/gb_ms_truetype_font_privilege_elevation_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76843 | Microsoft Windows Win32k TrueType Font Handling Privilege Escalation Microsoft Windows contains a flaw related to the Win32k TrueType font parsing engine that may allow a context-dependent attacker to execute arbitrary code via malicious font data contained in a Word document. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-06-14 | IAVM : 2012-B-0059 - Microsoft Dynamics AX Enterprise Portal Elevation of Privilege Vulnerability Severity : Category II - VMSKEY : V0032823 |
2012-06-14 | IAVM : 2012-A-0092 - Microsoft Remote Desktop Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0032826 |
2012-05-10 | IAVM : 2012-A-0079 - Combined Security Update for Microsoft Office Windows .NET Framework and Silv... Severity : Category I - VMSKEY : V0032304 |
2012-04-12 | IAVM : 2012-A-0055 - VMWare ESX 3.5 and ESXi 3.5 Privilege Escalation Vulnerability Severity : Category I - VMSKEY : V0031978 |
2012-04-12 | IAVM : 2012-A-0056 - Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0 Severity : Category I - VMSKEY : V0031979 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | script tag in URI - likely cross-site scripting attempt RuleID : 7070 - Revision : 22 - Type : POLICY-OTHER |
2020-04-16 | Microsoft Internet Explorer center element dynamic manipulation attempt RuleID : 53463 - Revision : 1 - Type : BROWSER-IE |
2020-04-16 | Microsoft Internet Explorer center element dynamic manipulation attempt RuleID : 53462 - Revision : 1 - Type : BROWSER-IE |
2020-04-16 | Microsoft Internet Explorer center element dynamic manipulation attempt RuleID : 53461 - Revision : 1 - Type : BROWSER-IE |
2020-04-16 | Microsoft Internet Explorer center element dynamic manipulation attempt RuleID : 53460 - Revision : 1 - Type : BROWSER-IE |
2020-04-16 | Microsoft Internet Explorer center element dynamic manipulation attempt RuleID : 53459 - Revision : 1 - Type : BROWSER-IE |
2019-08-31 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ... RuleID : 50849 - Revision : 1 - Type : FILE-OTHER |
2019-08-31 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap obfuscated ... RuleID : 50848 - Revision : 1 - Type : FILE-OTHER |
2019-04-13 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o... RuleID : 49423 - Revision : 2 - Type : FILE-OTHER |
2019-04-13 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o... RuleID : 49422 - Revision : 2 - Type : FILE-OTHER |
2019-04-13 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o... RuleID : 49421 - Revision : 2 - Type : FILE-OTHER |
2016-08-31 | Microsoft Internet Explorer 9 CTreeNode use after free attempt RuleID : 39751 - Revision : 1 - Type : BROWSER-IE |
2016-08-31 | Microsoft Internet Explorer 9 CTreeNode use after free attempt RuleID : 39750 - Revision : 1 - Type : BROWSER-IE |
2016-08-31 | Microsoft Internet Explorer 9 CTreeNode use after free attempt RuleID : 39749 - Revision : 1 - Type : BROWSER-IE |
2016-08-31 | Microsoft Internet Explorer 9 CTreeNode use after free attempt RuleID : 39748 - Revision : 1 - Type : BROWSER-IE |
2016-04-05 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 38016 - Revision : 2 - Type : BROWSER-IE |
2016-04-05 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 38015 - Revision : 2 - Type : BROWSER-IE |
2016-04-05 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 38014 - Revision : 1 - Type : BROWSER-IE |
2016-04-05 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 38013 - Revision : 1 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 31471 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 31470 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 31469 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer html table column span width increase memory corr... RuleID : 31428 - Revision : 4 - Type : BROWSER-IE |
2014-01-18 | multi-hop iframe campaign client-side exploit attempt RuleID : 29025 - Revision : 2 - Type : MALWARE-OTHER |
2014-01-18 | multi-hop iframe campaign client-side exploit attempt RuleID : 29024 - Revision : 2 - Type : MALWARE-OTHER |
2014-01-18 | multi-hop iframe campaign client-side exploit attempt RuleID : 29023 - Revision : 2 - Type : MALWARE-OTHER |
2014-01-18 | DNS request for known malware domain kjyg.com RuleID : 29022 - Revision : 2 - Type : BLACKLIST |
2014-01-18 | DNS request for known malware domain apfi.biz RuleID : 29021 - Revision : 2 - Type : BLACKLIST |
2014-01-18 | DNS request for known malware domain 4pu.com RuleID : 29020 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28360 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28359 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28358 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28357 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28356 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28355 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 28354 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 9 memory disclosure attempt RuleID : 27663 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Windows True Type Font maxComponentPoints overflow attempt RuleID : 27576 - Revision : 5 - Type : FILE-OTHER |
2014-01-10 | Blackholev2 exploit kit JNLP request RuleID : 27070 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Blackholev2 exploit kit landing page - specific structure RuleID : 27067 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | iFramer injection - specific structure RuleID : 26617 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Multiple exploit kit successful redirection - jnlp bypass RuleID : 26541 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | iFramer injection - specific structure RuleID : 26540 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java payload detection RuleID : 26512 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Sakura exploit kit redirection structure RuleID : 26511 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf payload detection RuleID : 26510 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Multiple exploit kit java payload detection RuleID : 26509 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page - specific structure RuleID : 26507 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit jar file redirection RuleID : 26506 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar download RuleID : 26256 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit redirection page RuleID : 26254 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit MyApplet class retrieval RuleID : 26229 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit redirection page RuleID : 26228 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 26091 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit Portable Executable download RuleID : 26056 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26055 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26054 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26053 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 26052 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar file download RuleID : 26051 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit SWF file download RuleID : 26050 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 26049 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit PDF exploit RuleID : 26048 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit redirection structure RuleID : 26047 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 26046 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit Portable Executable download RuleID : 25968 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25967 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25966 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25965 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25964 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit SWF file download RuleID : 25963 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25962 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit former location - has been removed RuleID : 25960 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25959 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25958 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25957 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious class file download RuleID : 25956 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar file download RuleID : 25955 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit SWF file download RuleID : 25954 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 25953 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 25952 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25951 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit PDF exploit RuleID : 25950 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25862 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25861 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page RuleID : 25860 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit malicious jar file download RuleID : 25859 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit Java exploit download RuleID : 25858 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit PDF exploit RuleID : 25857 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25598 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25597 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25596 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25595 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25594 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25593 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25576 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25575 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25574 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool Exploit Kit SWF file download RuleID : 25573 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25510 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25509 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25508 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25507 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25506 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25505 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25328 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25327 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit java exploit retrieval RuleID : 25326 - Revision : 10 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit pdf exploit retrieval RuleID : 25325 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page detected RuleID : 25324 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25323 - Revision : 10 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit EOT file download RuleID : 25322 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Microsoft Internet Explorer html table column span width increase memory corr... RuleID : 25246 - Revision : 8 - Type : BROWSER-IE |
2014-01-10 | Cool exploit kit 32-bit font file download RuleID : 25056 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 64-bit font file download RuleID : 25055 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit requesting payload RuleID : 25045 - Revision : 5 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 64-bit font file download RuleID : 24784 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit 32-bit font file download RuleID : 24783 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit outbound request RuleID : 24782 - Revision : 7 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit outbound request RuleID : 24781 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit - PDF Exploit RuleID : 24780 - Revision : 9 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit - PDF Exploit RuleID : 24779 - Revision : 8 - Type : EXPLOIT-KIT |
2014-01-10 | Cool exploit kit landing page - Title RuleID : 24778 - Revision : 6 - Type : EXPLOIT-KIT |
2014-01-10 | Microsoft Internet Explorer html table column span width increase memory corr... RuleID : 24205 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer html table column span width increase memory corr... RuleID : 24204 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer html table column span width increase memory corr... RuleID : 24203 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 23609 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Windows .NET Framework xbap DataObject object pointer attempt RuleID : 23181 - Revision : 8 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft Lync Online wlanapi.dll dll-load exploit attempt RuleID : 23165 - Revision : 8 - Type : SERVER-OTHER |
2014-01-10 | Microsoft Lync Online ncrypt.dll dll-load exploit attempt RuleID : 23164 - Revision : 8 - Type : SERVER-OTHER |
2014-01-10 | Microsoft Lync Online request for wlanapi.dll over SMB attempt RuleID : 23163 - Revision : 6 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Lync Online request for ncrypt.dll over SMB attempt RuleID : 23162 - Revision : 6 - Type : OS-WINDOWS |
2014-01-10 | Microsoft multiple product toStaticHTML XSS attempt RuleID : 23137 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft multiple product toStaticHTML XSS attempt RuleID : 23136 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 9 memory disclosure attempt RuleID : 23128 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Windows .NET xbap STGMEDIUM.unionmember arbitrary number overwrite ... RuleID : 23127 - Revision : 7 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft Internet Explorer insertAdjacentText memory corruption attempt RuleID : 23126 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer DOM manipulation memory corruption attempt RuleID : 23125 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer html table column span width increase memory corr... RuleID : 23124 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer getBoundingClientRect incorrect rebalancing attempt RuleID : 23123 - Revision : 8 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer use after free attempt RuleID : 23122 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer center element dynamic manipulation attempt RuleID : 23121 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer console object use after free attempt RuleID : 23118 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 9 DOM element use after free attempt RuleID : 23117 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 9 CTreeNode use after free attempt RuleID : 23116 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Windows True Type Font maxComponentPoints overflow attempt RuleID : 22087 - Revision : 9 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows TrueType font parsing engine sfac_GetSbitBitmap elevation o... RuleID : 20735 - Revision : 12 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-03 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2012-0006_remote.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0022.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0021.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0020.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Solaris system is missing a security patch from CPU oct2012. File : solaris_oct2012_SRU10_5.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-404.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-403.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-24.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0721-1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0721.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_xen-201206-120606.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0720.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120612_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-07-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2508.nasl - Type : ACT_GATHER_INFO |
2012-07-11 | Name : The remote host is affected by multiple privilege escalation and information ... File : smb_nt_ms12-050.nasl - Type : ACT_GATHER_INFO |
2012-06-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2501.nasl - Type : ACT_GATHER_INFO |
2012-06-28 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_aed44c4ec06711e1b5e0000c299b62e1.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9386.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9399.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9430.nasl - Type : ACT_GATHER_INFO |
2012-06-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0721.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xen-201206-8180.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0721.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote Windows host could allow arbitrary code execution. File : smb_nt_ms12-036.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The Windows kernel is affected by multiple elevation of privilege vulnerabili... File : smb_nt_ms12-042.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote Windows host is affected by multiple privilege escalation vulnerab... File : smb_nt_ms12-041.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : A web application on the remote host has a cross-site scripting vulnerability. File : smb_nt_ms12-040.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : Arbitrary code can be executed on the remote host through Microsoft Lync. File : smb_nt_ms12-039.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The .NET Framework installed on the remote Windows host could allow arbitrary... File : smb_nt_ms12-038.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote host is affected by code execution vulnerabilities. File : smb_nt_ms12-037.nasl - Type : ACT_GATHER_INFO |
2012-05-09 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms12-034.nasl - Type : ACT_GATHER_INFO |
2012-05-09 | Name : A multimedia application framework installed on the remote Mac OS X host is a... File : macosx_ms12-034.nasl - Type : ACT_GATHER_INFO |
2012-03-30 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0006.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote Windows kernel is affected by a remote code execution vulnerability. File : smb_nt_ms11-087.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-03-07 13:21:06 |
|