Security Scan Report Summary 2025
Security Scan Report Summary 2025
December 1, 2025
Summary
This document reports on the results of an automatic security scan. All dates are dis-
played using the timezone Coordinated Universal Time, which is abbreviated UTC. The
task was Windows Scan. The scan started at Tue Nov 25 [Link] 2025 UTC and ended
at Tue Nov 25 [Link] 2025 UTC. The report rst summarises the results found. Then, for
each host, the report describes every issue found. Please consider the advice given in each
description, in order to rectify the issue.
Contents
1 Result Overview 2
1.1 Host Authentications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1
CONTENTS 2
1 Result Overview
This report contains all 827 results selected by the ltering described above. Before ltering
there were 1084 results.
. . . (continued) . . .
Service (Port) Threat Level
4848/tcp High
9200/tcp High
8383/tcp High
1617/tcp High
8443/tcp Medium
3389/tcp Medium
8181/tcp Medium
22/tcp Medium
8282/tcp Medium
3306/tcp Medium
3000/tcp Medium
8020/tcp Medium
general/tcp Medium
135/tcp Medium
4848/tcp Medium
9200/tcp Medium
8022/tcp Medium
8383/tcp Medium
general/icmp Low
22/tcp Low
3306/tcp Low
general/tcp Low
9200/tcp Low
Summary
This routine reports all SSL/TLS cipher suites accepted by a service where attack vectors exists
only on HTTPS services.
Impact
This could allow remote attackers to obtain sensitive information or have other, unspecied
impacts.
Solution:
Solution type: Mitigation
The conguration of this services should be changed so that it does not accept the listed cipher
suites anymore.
Please see the references for more resources supporting you with this task.
Aected Software/OS
All services accepting vulnerable SSL/TLS cipher suites via HTTPS.
Vulnerability Insight
These rules are applied for the evaluation of the vulnerable cipher suites:
- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).
References
cve: CVE-2016-2183
cve: CVE-2016-6329
cve: CVE-2020-12872
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 6
[ return to [Link] ]
Summary
OpenSSH is prone to multiple vulnerabilities.
Impact
Successfully exploiting this issue allows local users to obtain sensitive private-key information,
to gain privileges, conduct a senial-of-service condition and allows remote attackers to execute
arbitrary local PKCS#11 modules.
Solution:
Solution type: VendorFix
Update to version 7.4 or later.
Aected Software/OS
OpenSSH versions before 7.4 on Windows.
Vulnerability Insight
Multiple aws exist due to:
- An 'authle.c' script does not properly consider the eects of realloc on buer contents.
- The shared memory manager (associated with pre-authentication compression) does not ensure
that a bounds check is enforced by all compilers.
- The sshd in OpenSSH creates forwarded Unix-domain sockets as root, when privilege separation
is not used.
- An untrusted search path vulnerability in ssh-agent.c in ssh-agent.
- NULL pointer dereference error due to an out-of-sequence NEWKEYS message.
References
cve: CVE-2016-10009
cve: CVE-2016-10010
cve: CVE-2016-10011
cve: CVE-2016-10012
cve: CVE-2016-10708
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 10
NVT: OpenSSH < 7.3 DoS and User Enumeration Vulnerabilities - Windows
Summary
OpenSSH is prone to denial of service (DoS) and user enumeration vulnerabilities.
Impact
Successfully exploiting this issue allows remote attackers to cause a denial of service (crypt CPU
consumption) and to enumerate users by leveraging the timing dierence between responses when
a large password is provided.
Solution:
Solution type: VendorFix
Update to version 7.3 or later.
Aected Software/OS
OpenSSH versions before 7.3 on Windows.
Vulnerability Insight
Multiple aws exist due to:
- The auth_password function in 'auth-passwd.c' script does not limit password lengths for
password authentication.
- The sshd in OpenSSH, when SHA256 or SHA512 are used for user password hashing uses
BLOWFISH hashing on a static password when the username does not exist and it takes much
longer to calculate SHA256/SHA512 hash than BLOWFISH hash.
References
cve: CVE-2016-6515
cve: CVE-2016-6210
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-0450
cert-bund: WID-SEC-2023-0449
cert-bund: CB-K18/0041
cert-bund: CB-K17/2219
cert-bund: CB-K17/2112
cert-bund: CB-K17/1753
cert-bund: CB-K17/1349
cert-bund: CB-K17/1292
cert-bund: CB-K17/0055
cert-bund: CB-K16/1837
cert-bund: CB-K16/1629
cert-bund: CB-K16/1487
cert-bund: CB-K16/1485
cert-bund: CB-K16/1252
cert-bund: CB-K16/1221
cert-bund: CB-K16/1082
dfn-cert: DFN-CERT-2023-1920
dfn-cert: DFN-CERT-2019-1408
dfn-cert: DFN-CERT-2018-1828
dfn-cert: DFN-CERT-2018-1070
dfn-cert: DFN-CERT-2018-0046
dfn-cert: DFN-CERT-2017-2320
dfn-cert: DFN-CERT-2017-2208
dfn-cert: DFN-CERT-2017-1831
dfn-cert: DFN-CERT-2017-1407
dfn-cert: DFN-CERT-2017-1340
dfn-cert: DFN-CERT-2017-0060
dfn-cert: DFN-CERT-2016-1943
dfn-cert: DFN-CERT-2016-1729
dfn-cert: DFN-CERT-2016-1576
dfn-cert: DFN-CERT-2016-1574
dfn-cert: DFN-CERT-2016-1331
dfn-cert: DFN-CERT-2016-1243
dfn-cert: DFN-CERT-2016-1149
[ return to [Link] ]
2 RESULTS PER HOST 13
Summary
Apache Tomcat is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 9.0.106, 10.1.42, 11.0.8 or later.
Aected Software/OS
Apache Tomcat version 9.0.105 and prior, 10.x through 10.1.41 and 11.0.0-M1 through 11.0.7.
Note: While not explicitly mentioned by the vendor (due to the EOL status of these branches)
it is assumed that the whole 10.x branch and all versions prior to 9.x are aected by these aws.
If you disagree with this assessment and want to accept the risk please create an override for this
result.
Vulnerability Insight
The following aws exist:
- CVE-2025-48976: Denial of service (DoS) in Apache Commons FileUpload
- CVE-2025-48988: DoS in multipart upload
- CVE-2025-49125: Security constraint bypass for pre/post-resources
References
cve: CVE-2025-48976
cve: CVE-2025-48988
cve: CVE-2025-49125
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-2373
cert-bund: WID-SEC-2025-2372
cert-bund: WID-SEC-2025-2371
cert-bund: WID-SEC-2025-2369
cert-bund: WID-SEC-2025-2366
cert-bund: WID-SEC-2025-2362
cert-bund: WID-SEC-2025-2361
cert-bund: WID-SEC-2025-2360
cert-bund: WID-SEC-2025-2359
cert-bund: WID-SEC-2025-2357
cert-bund: WID-SEC-2025-2356
cert-bund: WID-SEC-2025-2355
cert-bund: WID-SEC-2025-2353
cert-bund: WID-SEC-2025-2351
cert-bund: WID-SEC-2025-1562
cert-bund: WID-SEC-2025-1560
cert-bund: WID-SEC-2025-1559
cert-bund: WID-SEC-2025-1335
cert-bund: WID-SEC-2025-1334
dfn-cert: DFN-CERT-2025-3168
dfn-cert: DFN-CERT-2025-2941
dfn-cert: DFN-CERT-2025-2939
dfn-cert: DFN-CERT-2025-2390
dfn-cert: DFN-CERT-2025-2335
dfn-cert: DFN-CERT-2025-2299
dfn-cert: DFN-CERT-2025-2291
dfn-cert: DFN-CERT-2025-2098
dfn-cert: DFN-CERT-2025-2088
dfn-cert: DFN-CERT-2025-2056
. . . continues on next page . . .
2 RESULTS PER HOST 15
Summary
Apache Tomcat is prone to a session xation vulnerability.
Solution:
Solution type: VendorFix
Update to version 9.0.106, 10.1.42, 11.0.8 or later.
Aected Software/OS
Apache Tomcat versions prior to 9.0.106, 10.1.0-M1 through 10.1.41 and 11.0.0-M1 through
11.0.7.
Vulnerability Insight
If the rewrite valve was enabled for a web application, an attacker was able to craft a URL that,
if a victim clicked on it, would cause the victim's interaction with that resource to occur in the
context of the attacker's session.
References
cve: CVE-2025-55668
url: [Link]
cert-bund: WID-SEC-2025-1905
cert-bund: WID-SEC-2025-1826
dfn-cert: DFN-CERT-2025-1588
Summary
Apache Tomcat is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 9.0.90, 10.1.25, 11.0.0-M21 or later.
Aected Software/OS
Apache Tomcat versions prior to 9.0.90, 10.x through 10.1.24 and 11.0.0-M1 through 11.0.0-M20.
. . . continues on next page . . .
2 RESULTS PER HOST 17
Vulnerability Insight
When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP
headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the
use of an incorrect innite timeout which allowed connections to remain open which should have
been closed.
References
cve: CVE-2024-34750
url: [Link]
url: [Link]
,→1
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-0163
cert-bund: WID-SEC-2025-0161
cert-bund: WID-SEC-2025-0148
cert-bund: WID-SEC-2025-0144
cert-bund: WID-SEC-2025-0143
cert-bund: WID-SEC-2024-3197
cert-bund: WID-SEC-2024-3195
cert-bund: WID-SEC-2024-2100
cert-bund: WID-SEC-2024-1905
cert-bund: WID-SEC-2024-1522
dfn-cert: DFN-CERT-2025-2098
dfn-cert: DFN-CERT-2025-1991
dfn-cert: DFN-CERT-2025-1517
dfn-cert: DFN-CERT-2025-0170
dfn-cert: DFN-CERT-2025-0146
dfn-cert: DFN-CERT-2024-2192
dfn-cert: DFN-CERT-2024-2031
. . . continues on next page . . .
2 RESULTS PER HOST 18
Summary
Apache Tomcat is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 9.0.107 or later.
Aected Software/OS
Apache Tomcat version 9.0.106 and prior.
Note: While not explicitly mentioned by the vendor (due to the EOL status of these branches)
it is assumed that all versions prior to 9.x are aected by these aws. If you disagree with this
assessment and want to accept the risk please create an override for this result.
Vulnerability Insight
A race condition on connection close could trigger a JVM crash when using the APR/Native con-
nector leading to a DoS. This was particularly noticeable with client initiated closes of HTTP/2
connections.
References
cve: CVE-2025-52434
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1905
cert-bund: WID-SEC-2025-1468
dfn-cert: DFN-CERT-2025-2957
dfn-cert: DFN-CERT-2025-2390
dfn-cert: DFN-CERT-2025-2299
dfn-cert: DFN-CERT-2025-2056
dfn-cert: DFN-CERT-2025-1991
dfn-cert: DFN-CERT-2025-1789
Summary
Apache Tomcat is prone to is prone to a denial of service (DoS) vulnerability in the HTTP/2
protocol dubbed 'MadeYouReset'.
Solution:
Solution type: VendorFix
Update to version 9.0.108, 10.1.44, 11.0.10 or later.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 20
Vulnerability Insight
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specications
and the internal architectures of some HTTP/2 implementations may result in excessive server
resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly
triggering the server to reset them, using malformed frames or ow control errors, an attacker
can exploit incorrect stream accounting. Streams reset by the server are considered closed at
the protocol level, even though backend processing continues. This allows a client to cause the
server to handle an unbounded number of concurrent streams on a single connection.
References
cve: CVE-2025-8671
cve: CVE-2025-48989
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-2373
cert-bund: WID-SEC-2025-2361
cert-bund: WID-SEC-2025-2360
cert-bund: WID-SEC-2025-2357
cert-bund: WID-SEC-2025-2356
cert-bund: WID-SEC-2025-1830
dfn-cert: DFN-CERT-2025-2957
dfn-cert: DFN-CERT-2025-2390
. . . continues on next page . . .
2 RESULTS PER HOST 21
Summary
Apache Tomcat is prone to multiple denial of service (DoS) vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 9.0.107, 10.1.43, 11.0.9 or later.
Aected Software/OS
Apache Tomcat version 9.0.106 and prior, 10.x through 10.1.42 and 11.0.0-M1 through 11.0.8.
Note: While not explicitly mentioned by the vendor (due to the EOL status of these branches)
it is assumed that the whole 10.x branch and all versions prior to 9.x are aected by these aws.
If you disagree with this assessment and want to accept the risk please create an override for this
result.
Vulnerability Insight
The following aws exist:
- CVE-2025-52520: DoS due to overow in le upload limit
- CVE-2025-53506: DoS via excessive HTTP/2 streams
References
cve: CVE-2025-52520
cve: CVE-2025-53506
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1905
cert-bund: WID-SEC-2025-1468
dfn-cert: DFN-CERT-2025-2390
dfn-cert: DFN-CERT-2025-2335
dfn-cert: DFN-CERT-2025-2299
dfn-cert: DFN-CERT-2025-2219
dfn-cert: DFN-CERT-2025-2168
dfn-cert: DFN-CERT-2025-2088
dfn-cert: DFN-CERT-2025-2056
dfn-cert: DFN-CERT-2025-1991
dfn-cert: DFN-CERT-2025-1789
NVT: Apache Tomcat NIO HTTP connector Information Disclosure Vulnerability - Windows
Summary
Apache Tomcat is prone to an information disclosure vulnerability.
Impact
Successful exploitation will allow remote attackers to gain access to potentially sensitive infor-
mation.
Solution:
Solution type: VendorFix
Upgrade to Apache Tomcat version 9.0.0.M15 or 8.5.9 or 8.0.41 or 7.0.75 or 6.0.50 or later.
Aected Software/OS
Apache Tomcat versions 9.0.0.M1 to 9.0.0.M13, Apache Tomcat versions 8.5.0 to 8.5.8, Apache
Tomcat versions 8.0.0.RC1 to 8.0.39, Apache Tomcat versions 7.0.0 to 7.0.73, and Apache Tomcat
versions 6.0.16 to 6.0.48 on Windows.
Vulnerability Insight
The aw exists due to error handling of the send le code for the NIO HTTP connector in Apache
Tomcat resulting in the current Processor object being added to the Processor cache multiple
times. This in turn means that the same Processor could be used for concurrent requests. Sharing
a Processor can result in information leakage between requests including, not not limited to,
session ID and the response body.
References
cve: CVE-2016-8745
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2022-1375
. . . continues on next page . . .
2 RESULTS PER HOST 24
Summary
Apache Tomcat is prone to an information disclosure vulnerability.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 25
Solution:
Solution type: VendorFix
Upgrade to version 9.0.0.M19, 8.5.13, 8.0.43, 7.0.77, 6.0.53 or later.
Aected Software/OS
Apache Tomcat versions 9.0.0.M1 to 9.0.0.M18, Apache Tomcat versions 8.5.0 to 8.5.12, Apache
Tomcat versions 8.0.0.RC1 to 8.0.42, Apache Tomcat versions 7.0.0 to 7.0.76 and Apache Tomcat
versions 6.0.0 to 6.0.52 on Windows.
Vulnerability Insight
A bug in the handling of the pipelined requests when send le was used resulted in the pipelined
request being lost when send le processing of the previous request completed.
References
cve: CVE-2017-5647
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→dee9190ba48171451a@%[Link]%3E
cert-bund: WID-SEC-2024-0528
cert-bund: CB-K18/0047
cert-bund: CB-K17/1831
cert-bund: CB-K17/1423
cert-bund: CB-K17/1246
cert-bund: CB-K17/1205
cert-bund: CB-K17/1060
cert-bund: CB-K17/1033
cert-bund: CB-K17/0801
. . . continues on next page . . .
2 RESULTS PER HOST 26
Summary
Apache Tomcat is prone to an information disclosure vulnerability.
Impact
Successful exploitation will allow remote attackers to obtain sensitive information from requests
other then their own.
Solution:
Solution type: VendorFix
Upgrade to version 9.0.0.M17, 8.5.11 or later.
Aected Software/OS
Apache Tomcat versions 9.0.0.M11 to 9.0.0.M15 and Apache Tomcat versions 8.5.0 to 8.5.9 on
Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 27
References
cve: CVE-2016-8747
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0426
dfn-cert: DFN-CERT-2017-0433
Summary
Apache Tomcat is prone to a security bypass vulnerability.
Impact
Successful exploitation will allow an attacker to exploit this issue to bypass certain security
restrictions and perform unauthorized actions. This may lead to further attacks.
Solution:
Solution type: VendorFix
Upgrade to version 9.0.0.M21, or 8.5.15, or 8.0.44, or 7.0.78 or later.
Aected Software/OS
Apache Tomcat 9.0.0.M1 to 9.0.0.M20, Apache Tomcat 8.5.0 to 8.5.14, Apache Tomcat 8.0.0.RC1
to 8.0.43 and Apache Tomcat 7.0.0 to 7.0.77 on Windows
Vulnerability Insight
The error page mechanism of the Java Servlet Specication requires that, when an error occurs
and an error page is congured for the error that occurred, the original request and response are
forwarded to the error page. This means that the request is presented to the error page with the
original HTTP method. If the error page is a static le, expected behaviour is to serve content of
the le as if processing a GET request, regardless of the actual HTTP method. Tomcat's Default
Servlet did not do this. Depending on the original request this could lead to unexpected and
undesirable results for static error pages including, if the DefaultServlet is congured to permit
writes, the replacement or removal of the custom error page
References
cve: CVE-2017-5664
url: [Link]
,→8b7896538478d76066@%[Link]%3E
url: [Link]
cert-bund: WID-SEC-2025-1212
cert-bund: WID-SEC-2024-0528
cert-bund: CB-K18/0605
cert-bund: CB-K18/0603
cert-bund: CB-K18/0478
. . . continues on next page . . .
2 RESULTS PER HOST 29
Summary
Apache Tomcat is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 8.5.85, 9.0.71, 10.1.5, 11.0.0-M3 or later.
Aected Software/OS
Apache Tomcat versions through 8.5.84, 9.0.0-M1 through 9.0.70, 10.x through 10.1.4 and 11.0.0-
M1 only.
Vulnerability Insight
Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload to provide the le
upload functionality dened in the Jakarta Servlet specication. Apache Tomcat was, therefore,
also vulnerable to the Apache Commons FileUpload vulnerability CVE-2023-24998 as there was
no limit to the number of request parts processed. This resulted in the possibility of an attacker
triggering a DoS with a malicious upload or series of uploads.
References
cve: CVE-2023-24998
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-0810
cert-bund: WID-SEC-2024-1652
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1637
cert-bund: WID-SEC-2024-1622
cert-bund: WID-SEC-2024-1238
cert-bund: WID-SEC-2024-0890
cert-bund: WID-SEC-2024-0888
cert-bund: WID-SEC-2024-0794
. . . continues on next page . . .
2 RESULTS PER HOST 31
Summary
Apache Tomcat is prone to a security bypass vulnerability.
Impact
Successful exploitation will allow an attacker to bypass certain security restrictions and perform
unauthorized actions.
Solution:
Solution type: VendorFix
Upgrade to Apache Tomcat version 9.0.10 or 8.5.32 or 8.0.53 or 7.0.90 or later. Please see the
references for more information.
Aected Software/OS
Apache Tomcat versions 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52 and 7.0.35 to
7.0.88 on Windows.
References
cve: CVE-2018-8034
url: [Link]
,→80722091057.GA70283@[Link]%3E
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1682
cert-bund: WID-SEC-2024-0528
cert-bund: CB-K19/0907
cert-bund: CB-K19/0616
cert-bund: CB-K19/0320
cert-bund: CB-K18/1005
cert-bund: CB-K18/0809
dfn-cert: DFN-CERT-2019-2418
dfn-cert: DFN-CERT-2019-1627
dfn-cert: DFN-CERT-2019-1237
dfn-cert: DFN-CERT-2019-0951
dfn-cert: DFN-CERT-2019-0451
dfn-cert: DFN-CERT-2019-0147
dfn-cert: DFN-CERT-2018-2165
dfn-cert: DFN-CERT-2018-2142
dfn-cert: DFN-CERT-2018-1753
dfn-cert: DFN-CERT-2018-1471
dfn-cert: DFN-CERT-2018-1443
dfn-cert: DFN-CERT-2018-1262
2 RESULTS PER HOST 34
Summary
Apache Tomcat is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow remote attackers to cause a denial of service (CPU consump-
tion).
Solution:
Solution type: VendorFix
Upgrade to version 7.0.70, or 8.0.36, or 8.5.3, or 9.0.0.M7, or later.
Aected Software/OS
Apache Tomcat 7.x before 7.0.70, 8.0.0.RC1 before 8.0.36, 8.5.x before 8.5.3, and 9.0.0.M1 before
9.0.0.M7.
Vulnerability Insight
The aw is due to an error in the 'MultipartStream' class in Apache Commons Fileupload when
processing multi-part requests.
References
cve: CVE-2016-3092
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-0644
cert-bund: WID-SEC-2022-1537
cert-bund: WID-SEC-2022-1375
cert-bund: CB-K18/0605
cert-bund: CB-K17/1750
cert-bund: CB-K17/1198
cert-bund: CB-K17/1060
cert-bund: CB-K17/0657
cert-bund: CB-K17/0397
cert-bund: CB-K16/1993
cert-bund: CB-K16/1799
cert-bund: CB-K16/1758
cert-bund: CB-K16/1322
cert-bund: CB-K16/1002
cert-bund: CB-K16/0993
dfn-cert: DFN-CERT-2023-0574
dfn-cert: DFN-CERT-2018-2554
dfn-cert: DFN-CERT-2018-0729
dfn-cert: DFN-CERT-2017-1821
dfn-cert: DFN-CERT-2017-1236
dfn-cert: DFN-CERT-2017-1095
dfn-cert: DFN-CERT-2017-0675
dfn-cert: DFN-CERT-2017-0404
dfn-cert: DFN-CERT-2016-2104
dfn-cert: DFN-CERT-2016-1905
dfn-cert: DFN-CERT-2016-1823
dfn-cert: DFN-CERT-2016-1407
dfn-cert: DFN-CERT-2016-1068
dfn-cert: DFN-CERT-2016-1059
Summary
Apache Tomcat is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow an attacker to conduct a denial-of-service condition.
Solution:
Solution type: VendorFix
Upgrade to Apache Tomcat version 9.0.8 or 8.5.31 or 8.0.52 or 7.0.90 or later. Please see the
references for more information.
Aected Software/OS
Apache Tomcat 9.0.0.M9 to 9.0.7 Apache Tomcat 8.5.0 to 8.5.30 Apache Tomcat 8.0.0.RC1 to
8.0.51 Apache Tomcat 7.0.28 to 7.0.86 on Windows.
Vulnerability Insight
The aw exists due to improper handing of overow in the UTF-8 decoder with supplementary
characters.
References
cve: CVE-2018-1336
url: [Link]
,→80722090435.GA60759%[Link]%3E
. . . continues on next page . . .
2 RESULTS PER HOST 37
NVT: Apache Tomcat HTTP Request Line Information Disclosure Vulnerability - Windows
Summary
Apache Tomcat is prone to an information disclosure vulnerability.
Impact
Successful exploitation will allow remote attackers to poison a web-cache, perform an XSS attack
and/or obtain sensitive information from requests other then their own.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 38
Aected Software/OS
Apache Tomcat versions 9.0.0.M1 to 9.0.0.M11, Apache Tomcat versions 8.5.0 to 8.5.6, Apache
Tomcat versions 8.0.0.RC1 to 8.0.38, Apache Tomcat versions 7.0.0 to 7.0.72, and Apache Tomcat
versions 6.0.0 to 6.0.47 on Windows.
Vulnerability Insight
The code that parsed the HTTP request line permitted invalid characters. This could be ex-
ploited, in conjunction with a proxy that also permitted the invalid characters but with a dierent
interpretation, to inject data into the HTTP response.
References
cve: CVE-2016-6816
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→information-disclosure
cert-bund: WID-SEC-2025-0215
cert-bund: WID-SEC-2024-0528
cert-bund: CB-K17/1746
cert-bund: CB-K17/1060
cert-bund: CB-K17/1033
cert-bund: CB-K17/0444
cert-bund: CB-K17/0397
cert-bund: CB-K17/0198
cert-bund: CB-K17/0133
cert-bund: CB-K17/0090
cert-bund: CB-K16/1976
cert-bund: CB-K16/1927
. . . continues on next page . . .
2 RESULTS PER HOST 39
[ return to [Link] ]
NVT: Oracle MySQL Server <= 5.5.49 / 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpu-
jul2016) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 40
Aected Software/OS
Oracle MySQL Server versions 5.5.49 and prior, 5.6 through 5.6.30 and 5.7 through 5.7.12.
Vulnerability Insight
Multiple unspecied errors exist in the 'MySQL Server' component via unknown vectors.
References
cve: CVE-2016-3477
cve: CVE-2016-3521
cve: CVE-2016-3615
cve: CVE-2016-5440
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
advisory-id: cpujul2016
cert-bund: CB-K16/1755
cert-bund: CB-K16/1742
cert-bund: CB-K16/1448
cert-bund: CB-K16/1146
cert-bund: CB-K16/1122
cert-bund: CB-K16/1100
dfn-cert: DFN-CERT-2016-1859
dfn-cert: DFN-CERT-2016-1849
dfn-cert: DFN-CERT-2016-1540
dfn-cert: DFN-CERT-2016-1217
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-1169
2 RESULTS PER HOST 41
NVT: Oracle MySQL Server <= 5.7.34 / 8.0 <= 8.0.25 Security Update (cpujul2021) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.35, 8.0.26 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.34 and prior and 8.0 through 8.0.25.
References
cve: CVE-2021-22901
cve: CVE-2019-17543
cve: CVE-2021-2389
cve: CVE-2021-2390
. . . continues on next page . . .
2 RESULTS PER HOST 42
NVT: Oracle MySQL Server <= 5.7.38 / 8.0 <= 8.0.29 Security Update (cpujul2022) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.39, 8.0.30 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.38 and prior and 8.0 through 8.0.29.
References
. . . continues on next page . . .
2 RESULTS PER HOST 44
Summary
Oracle MySQL is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to have an impact on
condentiality, integrity and availability.
Solution:
Solution type: VendorFix
Apply the latest patch from vendor. Please see the references for more information.
Aected Software/OS
Oracle MySQL version 5.5.59 and earlier, 5.6.39 and earlier, 5.7.21 and earlier on Windows
Vulnerability Insight
Multiple aws exist due to
- Multiple errors in the 'Client programs' component of MySQL Server.
- An error in the 'Server: Locking' component of MySQL Server.
. . . continues on next page . . .
2 RESULTS PER HOST 47
References
cve: CVE-2018-2761
cve: CVE-2018-2771
cve: CVE-2018-2781
cve: CVE-2018-2773
cve: CVE-2018-2817
cve: CVE-2018-2813
cve: CVE-2018-2755
cve: CVE-2018-2819
cve: CVE-2018-2818
url: [Link]
cert-bund: WID-SEC-2023-1594
cert-bund: CB-K18/0608
dfn-cert: DFN-CERT-2019-1047
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-1265
dfn-cert: DFN-CERT-2018-0913
dfn-cert: DFN-CERT-2018-0723
Summary
Oracle MySQL is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to have impact on avail-
ability, condentiality and integrity.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier on Windows
Vulnerability Insight
Multiple aws exist due to multiple unspecied errors in the 'Server: DML', 'Server: Optimizer',
'Server: Thread Pooling', 'Client mysqldump', 'Server: Security: Privileges' components of the
application.
References
cve: CVE-2017-3309
cve: CVE-2017-3308
cve: CVE-2017-3329
cve: CVE-2017-3456
. . . continues on next page . . .
2 RESULTS PER HOST 49
NVT: Oracle MySQL Server <= 5.7.33 / 8.0 <= 8.0.23 Security Update (cpuapr2021) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.34, 8.0.24 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.33 and prior and 8.0 through 8.0.23.
References
cve: CVE-2021-3449
cve: CVE-2021-3450
cve: CVE-2021-23840
cve: CVE-2021-23841
cve: CVE-2021-2307
cve: CVE-2021-2304
cve: CVE-2021-2180
cve: CVE-2021-2194
cve: CVE-2021-2166
cve: CVE-2021-2179
cve: CVE-2021-2226
cve: CVE-2021-2169
. . . continues on next page . . .
2 RESULTS PER HOST 51
Summary
Oracle MySQL is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote attackers to cause the aected
application to crash, resulting in a denial-of-service condition.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.54 and earlier, 5.6.20 and earlier on Windows
Vulnerability Insight
The aw exists due to some unspecied error in the 'Server: C API' component due to failure
to handle exceptional conditions.
References
cve: CVE-2017-3302
url: [Link]
url: [Link]
cert-bund: CB-K18/0224
cert-bund: CB-K17/1604
cert-bund: CB-K17/1298
cert-bund: CB-K17/1239
cert-bund: CB-K17/0657
cert-bund: CB-K17/0423
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1675
dfn-cert: DFN-CERT-2017-1341
dfn-cert: DFN-CERT-2017-1282
dfn-cert: DFN-CERT-2017-0675
dfn-cert: DFN-CERT-2017-0430
NVT: Oracle MySQL Server <= 5.6.48 Security Update (cpujul2020) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.6.49 or later.
. . . continues on next page . . .
2 RESULTS PER HOST 55
Aected Software/OS
Oracle MySQL Server versions 5.6.48 and prior.
References
cve: CVE-2020-1967
cve: CVE-2020-14539
cve: CVE-2020-14559
url: [Link]
advisory-id: cpujul2020
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2023-3080
cert-bund: CB-K21/1088
cert-bund: CB-K21/0070
cert-bund: CB-K20/1023
cert-bund: CB-K20/1017
cert-bund: CB-K20/0711
cert-bund: CB-K20/0708
cert-bund: CB-K20/0357
dfn-cert: DFN-CERT-2021-2192
dfn-cert: DFN-CERT-2021-0830
dfn-cert: DFN-CERT-2021-0826
dfn-cert: DFN-CERT-2021-0444
dfn-cert: DFN-CERT-2021-0140
dfn-cert: DFN-CERT-2020-2295
dfn-cert: DFN-CERT-2020-2286
dfn-cert: DFN-CERT-2020-2006
dfn-cert: DFN-CERT-2020-1827
dfn-cert: DFN-CERT-2020-1788
dfn-cert: DFN-CERT-2020-1508
dfn-cert: DFN-CERT-2020-0956
dfn-cert: DFN-CERT-2020-0930
dfn-cert: DFN-CERT-2020-0841
dfn-cert: DFN-CERT-2020-0824
. . . continues on next page . . .
2 RESULTS PER HOST 56
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to disclose potentially sensitive information, manip-
ulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server version 5.5.40 and earlier, and 5.6.21 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Server:-
Security:Encryption, InnoDB:DML, Replication, and Security:Privileges:Foreign Key.
References
cve: CVE-2015-0411
cve: CVE-2014-6568
cve: CVE-2015-0382
cve: CVE-2015-0381
cve: CVE-2015-0374
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1193
cert-bund: CB-K15/0964
cert-bund: CB-K15/0567
cert-bund: CB-K15/0415
cert-bund: CB-K15/0073
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-1016
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2015-0427
dfn-cert: DFN-CERT-2015-0074
NVT: Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpuoct2023) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.43, 8.0.34 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.42 and prior and 8.x through 8.0.33.
References
advisory-id: cpuoct2023
cve: CVE-2023-2650
cve: CVE-2023-0464
cve: CVE-2023-0465
cve: CVE-2023-0466
cve: CVE-2023-1255
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0120
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2024-0053
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-2690
cert-bund: WID-SEC-2023-2674
cert-bund: WID-SEC-2023-1794
cert-bund: WID-SEC-2023-1781
cert-bund: WID-SEC-2023-1614
cert-bund: WID-SEC-2023-1432
cert-bund: WID-SEC-2023-1323
cert-bund: WID-SEC-2023-1130
cert-bund: WID-SEC-2023-1053
cert-bund: WID-SEC-2023-0782
. . . continues on next page . . .
2 RESULTS PER HOST 59
NVT: Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpuapr2023) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.42, 8.0.33 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.41 and prior and 8.x through 8.0.32.
References
cve: CVE-2023-0215
cve: CVE-2022-43551
cve: CVE-2023-21980
cve: CVE-2022-4304
cve: CVE-2022-4450
cve: CVE-2023-0286
url: [Link]
advisory-id: cpuapr2023
cert-bund: WID-SEC-2025-1365
cert-bund: WID-SEC-2024-3377
cert-bund: WID-SEC-2024-2086
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0114
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2229
cert-bund: WID-SEC-2023-2031
. . . continues on next page . . .
2 RESULTS PER HOST 61
NVT: Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.30 Security Update (cpuapr2023) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.42, 8.0.31 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.41 and prior and 8.x through 8.0.30.
References
cve: CVE-2023-21912
url: [Link]
advisory-id: cpuapr2023
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2023-1033
dfn-cert: DFN-CERT-2023-1058
dfn-cert: DFN-CERT-2023-1037
dfn-cert: DFN-CERT-2023-0885
NVT: Oracle MySQL Server <= 8.0.39, 8.1 <= 8.4.2, 9.0 <= 9.0.1 Security Update (cpuoct2024)
- Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 8.0.40, 8.4.3, 9.0.2 or later.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 64
References
cve: CVE-2024-5535
cve: CVE-2024-6119
cve: CVE-2024-21230
cve: CVE-2024-7264
cve: CVE-2024-21196
cve: CVE-2024-21194
cve: CVE-2024-21199
cve: CVE-2024-21218
cve: CVE-2024-21236
cve: CVE-2024-21239
cve: CVE-2024-21198
cve: CVE-2024-21219
cve: CVE-2024-21203
cve: CVE-2024-21197
cve: CVE-2024-21201
cve: CVE-2024-21241
cve: CVE-2024-21193
cve: CVE-2024-21213
cve: CVE-2024-21231
cve: CVE-2024-21237
url: [Link]
advisory-id: cpuoct2024
cert-bund: WID-SEC-2025-1560
cert-bund: WID-SEC-2025-0823
cert-bund: WID-SEC-2025-0814
cert-bund: WID-SEC-2025-0612
cert-bund: WID-SEC-2025-0225
cert-bund: WID-SEC-2025-0166
cert-bund: WID-SEC-2025-0148
cert-bund: WID-SEC-2025-0143
cert-bund: WID-SEC-2025-0001
. . . continues on next page . . .
2 RESULTS PER HOST 65
NVT: Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpujan2022) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.37, 8.0.28 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.36 and prior and 8.0 through 8.0.27.
References
cve: CVE-2021-22946
cve: CVE-2022-21367
cve: CVE-2022-21270
cve: CVE-2022-21304
cve: CVE-2022-21344
cve: CVE-2022-21303
cve: CVE-2022-21245
cve: CVE-2021-22947
url: [Link]
advisory-id: cpujan2022
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2023-2229
. . . continues on next page . . .
2 RESULTS PER HOST 67
NVT: Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujul2016) - Windows
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 68
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.45 and prior and 5.6 through 5.6.26.
Vulnerability Insight
An unspecied error exists in the 'MySQL Server' component via unknown vectors related to
the 'Option' sub-component.
References
cve: CVE-2016-3471
url: [Link]
url: [Link]
advisory-id: cpujul2016
cert-bund: CB-K16/1122
cert-bund: CB-K16/1100
dfn-cert: DFN-CERT-2016-1192
. . . continues on next page . . .
2 RESULTS PER HOST 69
NVT: Oracle MySQL Server <= 5.7.37 / 8.0 <= 8.0.28 Security Update (cpuapr2022) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.38, 8.0.29 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.37 and prior and 8.0 through 8.0.28.
References
cve: CVE-2022-0778
. . . continues on next page . . .
2 RESULTS PER HOST 70
NVT: Oracle MySQL Server <= 5.5.39 / 5.6 <= 5.6.20 Security Update (cpuoct2014) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to disclose potentially sensitive information, gain
escalated privileges, manipulate certain data, cause a DoS (Denial of Service), and compromise
a vulnerable system.
Solution:
Solution type: VendorFix
Update to version 5.5.40, 5.6.21 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5.39 and prior and 5.6 through 5.6.20.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to C API SSL
CERTIFICATE HANDLING, SERVER:DML, SERVER:SSL:yaSSL, SERVER:OPTIMIZER,
SERVER:INNODB DML FOREIGN KEYS.
References
cve: CVE-2014-6507
cve: CVE-2014-6491
cve: CVE-2014-6500
cve: CVE-2014-6469
cve: CVE-2014-6555
cve: CVE-2014-6559
cve: CVE-2014-6494
cve: CVE-2014-6496
cve: CVE-2014-6464
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 73
Summary
Oracle MySQL is prone to a denial of service (DoS) vulnerability.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 74
Solution:
Solution type: VendorFix
Upgrade to Oracle MySQL version 5.6.21 or 5.7.5 or later.
Aected Software/OS
Oracle MySQL version before 5.6.21 and 5.7.x before 5.7.5 on Windows
Vulnerability Insight
Multiple errors exist as,
- In sql-common/client.c script 'mysql_prune_stmt_list' function, the for loop adds elements
to pruned_list without removing it from the existing list.
- If application gets disconnected just before it tries to prepare a new statement,
'mysql_prune_stmt_list' tries to detach all previously prepared statements.
References
cve: CVE-2017-3302
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K18/0224
cert-bund: CB-K17/1604
cert-bund: CB-K17/1298
cert-bund: CB-K17/1239
cert-bund: CB-K17/0657
cert-bund: CB-K17/0423
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1675
dfn-cert: DFN-CERT-2017-1341
dfn-cert: DFN-CERT-2017-1282
dfn-cert: DFN-CERT-2017-0675
. . . continues on next page . . .
2 RESULTS PER HOST 75
NVT: Oracle MySQL Server <= 5.7.29 / 8.0 <= 8.0.19 Security Update (cpuapr2021) - Windows
Summary
Oracle MySQL Server is prone to a vulnerability in the parser.
Solution:
Solution type: VendorFix
Update to version 5.7.30, 8.0.20 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.29 and prior and 8.0 through 8.0.19.
References
cve: CVE-2021-2144
. . . continues on next page . . .
2 RESULTS PER HOST 76
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an remote attacker to gain elevated privileges on the aected
system, also could allow buer overow attacks.
Solution:
Solution type: VendorFix
Upgrade to Oracle MySQL Server 5.5.52 or later.
Aected Software/OS
Oracle MySQL Server 5.5.x to 5.5.51 on windows
Vulnerability Insight
Multiple errors exist. Please see the references for more information.
References
url: [Link]
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server Server 5.5.44 and earlier, and 5.6.25 and earlier
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 78
References
cve: CVE-2015-4879
cve: CVE-2015-4819
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1483
cert-bund: CB-K16/1122
cert-bund: CB-K16/0791
cert-bund: CB-K16/0493
cert-bund: CB-K16/0246
cert-bund: CB-K16/0245
cert-bund: CB-K15/1844
cert-bund: CB-K15/1600
cert-bund: CB-K15/1554
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0845
dfn-cert: DFN-CERT-2016-0532
dfn-cert: DFN-CERT-2016-0266
dfn-cert: DFN-CERT-2016-0265
dfn-cert: DFN-CERT-2015-1946
dfn-cert: DFN-CERT-2015-1692
dfn-cert: DFN-CERT-2015-1638
NVT: Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) -
Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.46 and prior, 5.6 through 5.6.27 and version 5.7.9.
Vulnerability Insight
Unspecied errors exist in the 'MySQL Server' component via unknown vectors.
References
cve: CVE-2016-0609
cve: CVE-2016-0608
cve: CVE-2016-0606
cve: CVE-2016-0600
. . . continues on next page . . .
2 RESULTS PER HOST 80
NVT: Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Update (cpu-
jan2019) - Windows
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 81
Impact
Successful exploitation of this vulnerability can result in unauthorized access to critical data or
complete access to all MySQL Server accessible data and unauthorized ability to cause a hang
or frequently repeatable crash (complete DOS) of MySQL Server.
Solution:
Solution type: VendorFix
Updates are available. Apply the necessary patch from the referenced link.
Aected Software/OS
Oracle MySQL Server versions 5.6.42 and prior, 5.7 through 5.7.24 and 8.0 through 8.0.13.
Vulnerability Insight
The attacks range in variety and diculty. Most of them allow an attacker with network access
via multiple protocols to compromise the MySQL Server.
For further information refer to the ocial advisory via the referenced link.
References
cve: CVE-2019-2534
cve: CVE-2019-2529
cve: CVE-2019-2482
cve: CVE-2019-2455
cve: CVE-2019-2503
. . . continues on next page . . .
2 RESULTS PER HOST 82
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote attackers to conduct a denial-of-
service attack and partially modify data.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.58 and earlier, 5.6.38 and earlier, 5.7.19 and earlier on Windows
Vulnerability Insight
The aw exists due to an error in 'Server:Partition' component.
References
cve: CVE-2018-2562
url: [Link]
cert-bund: CB-K18/0480
cert-bund: CB-K18/0392
cert-bund: CB-K18/0265
cert-bund: CB-K18/0096
dfn-cert: DFN-CERT-2019-1047
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-1265
dfn-cert: DFN-CERT-2018-0733
dfn-cert: DFN-CERT-2018-0515
dfn-cert: DFN-CERT-2018-0424
dfn-cert: DFN-CERT-2018-0286
dfn-cert: DFN-CERT-2018-0101
2 RESULTS PER HOST 85
NVT: Oracle MySQL Server <= 5.5.51 / 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update
(cpuoct2016) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Impact
Successful exploitation of these vulnerabilities will allow remote authenticated attackers to cause
denial of service conditions and gain elevated privileges.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.51 and prior, 5.6 through 5.6.32 and 5.7 through 5.7.14.
Vulnerability Insight
Multiple aws exist due to multiple unspecied errors in the 'Server:GIS', 'Server:Federated',
'Server:Optimizer', 'Server:Types', 'Server:Error Handling' and 'Server:MyISAM' components.
References
cve: CVE-2016-3492
cve: CVE-2016-5626
cve: CVE-2016-5629
cve: CVE-2016-5616
cve: CVE-2016-5617
cve: CVE-2016-8283
cve: CVE-2016-6663
cve: CVE-2016-6664
url: [Link]
advisory-id: cpuoct2016
cert-bund: CB-K18/0224
cert-bund: CB-K17/1298
cert-bund: CB-K17/0139
cert-bund: CB-K16/1979
cert-bund: CB-K16/1846
cert-bund: CB-K16/1755
cert-bund: CB-K16/1714
cert-bund: CB-K16/1624
dfn-cert: DFN-CERT-2020-1473
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1341
dfn-cert: DFN-CERT-2017-0138
dfn-cert: DFN-CERT-2016-2089
dfn-cert: DFN-CERT-2016-1950
dfn-cert: DFN-CERT-2016-1859
dfn-cert: DFN-CERT-2016-1790
dfn-cert: DFN-CERT-2016-1714
[ return to [Link] ]
Summary
Ruby on Rails is prone to a remote code execution (RCE) vulnerability.
Impact
Successful exploitation would allow an attacker to execute arbitrary code on the target machine.
Solution:
Solution type: VendorFix
Update to version 5.0.1 or later.
Aected Software/OS
Ruby on Rails through version 5.0.0.
Vulnerability Insight
An attacker may exploit this vulnerability by sending a specially crafted 'render' call.
References
cve: CVE-2020-8163
url: [Link]
cert-bund: CB-K20/0472
dfn-cert: DFN-CERT-2020-1733
dfn-cert: DFN-CERT-2020-1582
Summary
Ruby on Rails is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow a remote attacker to read arbitrary les by leveraging an ap-
plication's unrestricted use of the render method, to cause a denial of service.
Solution:
Solution type: VendorFix
Update to version [Link], [Link], [Link] or later.
Aected Software/OS
Ruby on Rails before [Link], Ruby on Rails 4.0.x and 4.1.x before [Link] and Ruby on Rails
4.2.x before [Link] on Windows.
Vulnerability Insight
Multiple aws are due to:
- Directory traversal vulnerability in Action View.
- The script 'actionpack/lib/action_dispatch/http/mime_type.rb' does not properly restrict use
of the MIME type cache.
- The http_basic_authenticate_with method in 'actionpack/lib/action_controller/metal/http_authentication.rb'
does not use a constant-time algorithm for verifying credentials.
References
cve: CVE-2016-0752
cve: CVE-2016-0751
cve: CVE-2015-7576
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1085
cert-bund: CB-K17/0517
cert-bund: CB-K17/0278
cert-bund: CB-K16/0625
cert-bund: CB-K16/0522
cert-bund: CB-K16/0419
cert-bund: CB-K16/0238
. . . continues on next page . . .
2 RESULTS PER HOST 89
NVT: Ruby on Rails Action Pack DoS Vulnerability (Jan 2016) - Windows
Summary
Ruby on Rails is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow a remote attacker to cause a denial of service condition.
Solution:
Solution type: VendorFix
Update to version [Link] or later.
Aected Software/OS
Ruby on Rails 4.x before [Link] on Windows.
Vulnerability Insight
The aw is due to an error in 'actionpack/lib/action_dispatch/routing/route_set.rb' script.
NVT: Ruby on Rails Action Pack RCE Vulnerability (Feb 2016) - Windows
Summary
Ruby on Rails is prone to a remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow a remote attacker to control the arguments of the render method
in a controller or a view, resulting in the possibility of executing arbitrary ruby code.
Solution:
Solution type: VendorFix
Update to version [Link], [Link], [Link] or later.
Aected Software/OS
Ruby on Rails before [Link], Ruby on Rails 4.x before [Link] and Ruby on Rails 4.2.x before
[Link] on Windows.
Vulnerability Insight
The aw is due to an improper sanitization of user supplied inputs to the 'render' method in a
controller or view by 'Action Pack'.
References
cve: CVE-2016-2098
url: [Link]
url: [Link]
url: [Link]
,→AJ
cert-bund: WID-SEC-2022-2271
cert-bund: CB-K17/1730
cert-bund: CB-K16/0625
cert-bund: CB-K16/0522
cert-bund: CB-K16/0426
cert-bund: CB-K16/0419
cert-bund: CB-K16/0372
dfn-cert: DFN-CERT-2017-1809
dfn-cert: DFN-CERT-2016-0674
dfn-cert: DFN-CERT-2016-0566
dfn-cert: DFN-CERT-2016-0468
dfn-cert: DFN-CERT-2016-0458
dfn-cert: DFN-CERT-2016-0404
[ return to [Link] ]
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-010.
Impact
Successful exploitation will allow remote attackers to gain the ability to execute code on the
target server, also could lead to information disclosure from the server.
. . . continues on next page . . .
2 RESULTS PER HOST 92
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2016
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012 R2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
Vulnerability Insight
Multiple aws exist due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server
handles certain requests.
References
cve: CVE-2017-0143
cve: CVE-2017-0144
cve: CVE-2017-0145
cve: CVE-2017-0146
cve: CVE-2017-0147
cve: CVE-2017-0148
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0435
. . . continues on next page . . .
2 RESULTS PER HOST 93
[ return to [Link] ]
Summary
Various application or web servers / products are prone to an information disclosure vulnerability.
Impact
Based on the information provided in this le an attacker might be able to gather additional info
and/or sensitive data about the application / the application / web server.
Solution:
Solution type: VendorFix
The following vendor xes are known:
- Update to Payara Platform Enterprise 5.31.0, Payara Platform Community 5.2021.7 or later.
For other products please contact the vendor for more information on possible xes.
Aected Software/OS
The following products are known to be aected:
- Payara Platform Enterprise / Community
Other products might be aected as well.
Vulnerability Insight
The servlet specication prohibits servlet containers from serving resources in the '/WEB-INF'
and '/META-INF' directories of a web application archive directly to clients.
This means that URLs like:
[Link]
will return an error message, rather than the contents of the deployment descriptor.
However, some application or web servers / products are prone to a vulnerability that exposes
this information if the client requests a URL like this instead:
[Link]
[Link]
(note the './/' before 'WEB-INF').
References
cve: CVE-2021-41381
url: [Link]
,→[Link]
url: [Link]
,→-[Link]
[ return to [Link] ]
Summary
This host is missing an important security update according to Microsoft KB5022338
Impact
Successful exploitation will allow an attacker to elevate privileges, execute arbitrary commands,
disclose information and conduct DoS attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
References
cve: CVE-2023-21546
cve: CVE-2023-21543
cve: CVE-2023-21548
cve: CVE-2023-21555
cve: CVE-2023-21556
cve: CVE-2023-21561
cve: CVE-2023-21679
cve: CVE-2023-21730
cve: CVE-2023-21527
cve: CVE-2023-21532
cve: CVE-2023-21537
cve: CVE-2023-21541
cve: CVE-2023-21542
cve: CVE-2023-21549
cve: CVE-2023-21552
cve: CVE-2023-21557
cve: CVE-2023-21560
cve: CVE-2023-21563
cve: CVE-2023-21675
cve: CVE-2023-21678
cve: CVE-2023-21680
cve: CVE-2023-21681
cve: CVE-2023-21682
cve: CVE-2023-21726
cve: CVE-2023-21728
cve: CVE-2023-21732
cve: CVE-2023-21746
cve: CVE-2023-21748
cve: CVE-2023-21750
cve: CVE-2023-21757
cve: CVE-2023-21774
cve: CVE-2023-21525
cve: CVE-2023-21765
. . . continues on next page . . .
2 RESULTS PER HOST 97
NVT: Microsoft Windows Kernel-Mode Driver Privilege Escalation and RCE Vulnerabilities
(3000061)
Summary
This host is missing a critical security update according to Microsoft Bulletin MS14-058.
Impact
Successful exploitation will allow attacker to gain escalated privilege and compromise a user's
system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 98
References
cve: CVE-2014-4113
cve: CVE-2014-4148
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/1291
dfn-cert: DFN-CERT-2014-1351
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-093.
Impact
Successful exploitation will allow remote attackers to corrupt memory and potentially execute
arbitrary code in the context of the current user.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 99
Vulnerability Insight
The error exists due to multiple improper handling of memory objects.
References
cve: CVE-2015-2502
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1215
dfn-cert: DFN-CERT-2015-1283
Summary
This host is missing a critical security update according to Microsoft KB4489878
Impact
Successful exploitation will allow an attacker to execute arbitrary code on a victim system, obtain
information to further compromise the user's system, gain elevated privileges, bypass security
features and cause denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
Multiple aws exist in,
- Event Viewer from showing Network Interface Cards events and
- Various Windows components.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2019-0601
cve: CVE-2019-0603
cve: CVE-2019-0609
cve: CVE-2019-0614
cve: CVE-2019-0617
cve: CVE-2019-0665
cve: CVE-2019-0666
cve: CVE-2019-0667
cve: CVE-2019-0680
cve: CVE-2019-0683
cve: CVE-2019-0690
cve: CVE-2019-0702
cve: CVE-2019-0703
cve: CVE-2019-0704
cve: CVE-2019-0746
cve: CVE-2019-0754
cve: CVE-2019-0755
cve: CVE-2019-0756
cve: CVE-2019-0759
cve: CVE-2019-0761
cve: CVE-2019-0762
cve: CVE-2019-0763
cve: CVE-2019-0765
cve: CVE-2019-0767
cve: CVE-2019-0772
cve: CVE-2019-0774
cve: CVE-2019-0775
cve: CVE-2019-0780
cve: CVE-2019-0782
cve: CVE-2019-0783
. . . continues on next page . . .
2 RESULTS PER HOST 101
NVT: Microsoft SMBv1 Server Authenticated Remote Code Execution Vulnerability (3185879)
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-114.
Impact
Successful exploitation will allow attacker to take complete control of an aected system. An
attacker could then install, programs, view, change, or delete data or create new accounts with
full user rights.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 102
Vulnerability Insight
An authenticated remote code execution vulnerability exists in Windows that is caused when
Server Message Block (SMB) improperly handles certain logging activities, resulting in memory
corruption.
References
cve: CVE-2016-3345
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1406
dfn-cert: DFN-CERT-2016-1483
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-011.
Impact
Successful exploitation will allow an attacker to take control of the aected system, also to obtain
information to further compromise the user's system.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 103
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2016
Vulnerability Insight
Multiple aws exist due to:
- The way Windows Uniscribe handles objects in memory.
- When Windows Uniscribe improperly discloses the contents of its memory.
References
cve: CVE-2017-0072
cve: CVE-2017-0083
cve: CVE-2017-0084
cve: CVE-2017-0085
cve: CVE-2017-0086
cve: CVE-2017-0087
cve: CVE-2017-0088
cve: CVE-2017-0089
cve: CVE-2017-0090
cve: CVE-2017-0091
cve: CVE-2017-0092
cve: CVE-2017-0111
cve: CVE-2017-0112
cve: CVE-2017-0113
cve: CVE-2017-0114
cve: CVE-2017-0115
cve: CVE-2017-0116
cve: CVE-2017-0117
cve: CVE-2017-0118
cve: CVE-2017-0119
. . . continues on next page . . .
2 RESULTS PER HOST 104
Summary
This host is missing an important security update according to Microsoft KB4480970
Impact
Successful exploitation will allow an attacker to execute arbitrary code on a victim system, obtain
information to further compromise the user's system and gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple awss exists due to:
- Windows Jet Database Engine improperly handles objects in memory.
- Windows Runtime improperly handles objects in memory.
- Windows kernel improperly handles objects in memory.
- An error in the Microsoft XmlDocument class that could allow an attacker to escape from the
AppContainer sandbox in the browser.
- MSHTML engine improperly validates input.
- Windows improperly handles authentication requests.
- An elevation of privilege exists in Windows COM Desktop Broker.
References
cve: CVE-2019-0536
cve: CVE-2019-0538
. . . continues on next page . . .
2 RESULTS PER HOST 106
Summary
This host is missing a critical security update according to Microsoft KB4530734
Impact
Successful exploitation will allow an attacker to execute arbitrary code, elevate privileges, gain
access to sensitive information, cause denial of service and bypass security restrictions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- Win32k component fails to properly handle objects in memory.
- win32k component improperly provides kernel information.
- Windows kernel improperly handles objects in memory.
- Windows improperly handles COM object creation.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2019-1453
cve: CVE-2019-1458
cve: CVE-2019-1465
cve: CVE-2019-1466
cve: CVE-2019-1467
cve: CVE-2019-1468
cve: CVE-2019-1469
cve: CVE-2019-1470
cve: CVE-2019-1474
cve: CVE-2019-1478
cve: CVE-2019-1480
cve: CVE-2019-1481
cve: CVE-2019-1484
cve: CVE-2019-1485
cve: CVE-2019-1488
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: CB-K19/1075
cert-bund: CB-K19/1063
dfn-cert: DFN-CERT-2019-2603
dfn-cert: DFN-CERT-2019-2601
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-147.
Impact
Successful exploitation will allow an attacker to take control of the aected system. An attacker
could then:
- install programs
- view, change, or delete data
- or create new accounts with full user rights.
. . . continues on next page . . .
2 RESULTS PER HOST 110
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2016
Vulnerability Insight
The aw exists due to the way Windows Uniscribe handles objects in the memory.
References
cve: CVE-2016-7274
url: [Link]
url: [Link]
cert-bund: CB-K16/1959
dfn-cert: DFN-CERT-2016-2066
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-026.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code. Failed exploit
attempts will result in a denial-of-service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to the Windows Adobe Type Manager Library improperly handles specially
crafted OpenType fonts.
References
cve: CVE-2016-0121
cve: CVE-2016-0120
url: [Link]
url: [Link]
cert-bund: CB-K16/0383
dfn-cert: DFN-CERT-2016-0412
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 112
Impact
Successful exploitation will allow an attacker to execute arbitrary code, elevate privileges by
escaping a sandbox, gain access to sensitive information, run processes and delete les and
folders in an elevated context.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- Windows Event Viewer ([Link]) improperly parses XML input containing a reference
to an external entity.
- Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a
guest operating system.
- Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input.
- Windows GDI component improperly discloses the contents of its memory.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2017-8533
cve: CVE-2019-0713
cve: CVE-2019-0722
cve: CVE-2019-0888
cve: CVE-2019-0904
cve: CVE-2019-0905
cve: CVE-2019-0906
. . . continues on next page . . .
2 RESULTS PER HOST 113
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-144.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code in the context of
the current user, also could gain the same user rights as the current user, and obtain information
to further compromise the user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Internet Explorer version 9.x/10.x/11.x.
Vulnerability Insight
Multiple aws exist due to:
- The way that the aected components handle objects in memory.
- Microsoft browsers improperly accesses objects in memory.
- Microsoft browsers fail to correctly apply Same Origin Policy for scripts running inside Web
Workers.
References
cve: CVE-2016-7202
cve: CVE-2016-7278
cve: CVE-2016-7279
cve: CVE-2016-7281
cve: CVE-2016-7282
cve: CVE-2016-7283
cve: CVE-2016-7284
cve: CVE-2016-7287
url: [Link]
url: [Link]
cert-bund: CB-K16/1949
cert-bund: CB-K16/1948
cert-bund: CB-K16/1744
dfn-cert: DFN-CERT-2016-2060
dfn-cert: DFN-CERT-2016-2059
dfn-cert: DFN-CERT-2016-1847
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-006.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges, gain access to
potentially sensitive information, execute arbitrary code in the context of the current user and
conduct spoong attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 116
Vulnerability Insight
Multiple aws exist due to:
- Multiple errors in the components handling objects in memory.
- Microsoft browsers improperly access objects in memory.
- An error in Microsoft browser which does not properly parse HTTP responses.
- Multiple errors in JScript and VBScript engines rendering when handling objects in memory.
- An error in Internet Explorer which does not properly enforce cross-domain policies.
References
cve: CVE-2017-0008
cve: CVE-2017-0009
cve: CVE-2017-0012
cve: CVE-2017-0018
cve: CVE-2017-0033
cve: CVE-2017-0037
cve: CVE-2017-0040
cve: CVE-2017-0049
cve: CVE-2017-0059
cve: CVE-2017-0130
cve: CVE-2017-0149
cve: CVE-2017-0154
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0439
cert-bund: CB-K17/0436
cert-bund: CB-K17/0338
dfn-cert: DFN-CERT-2017-0450
dfn-cert: DFN-CERT-2017-0444
dfn-cert: DFN-CERT-2017-0348
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 117
Impact
Successful exploitation will allow an attacker to elevate privilege, execute arbitrary code and
conduct DoS attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- A Remote Code Execution Vulnerability in Windows Point-to-Point Tunneling Protocol.
- An elevation of privilege vulnerability in Active Directory Domain Services.
- A Denial of Service Vulnerability in Windows TCP/IP Driver.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-22035
cve: CVE-2022-24504
cve: CVE-2022-30198
cve: CVE-2022-33634
cve: CVE-2022-33635
cve: CVE-2022-33645
cve: CVE-2022-35770
cve: CVE-2022-37975
cve: CVE-2022-37976
cve: CVE-2022-37977
. . . continues on next page . . .
2 RESULTS PER HOST 118
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-132.
Impact
Successful exploitation will allow an attacker to install programs, view, change, or delete data,
or create new accounts with full user rights, and to obtain information to further compromise
the user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- the ATMFD component improperly discloses the contents of its memory.
- the Windows Animation Manager improperly handles objects in memory.
- the Windows font library improperly handles specially crafted embedded fonts.
- the Windows Media Foundation improperly handles objects in memory.
References
cve: CVE-2016-7210
cve: CVE-2016-7205
cve: CVE-2016-7217
cve: CVE-2016-7256
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 120
Summary
This host is missing a critical security update according to Microsoft security updates KB4018271.
Impact
Successful exploitation will allow attacker to trick a user by redirecting the user to a specially
crafted website, loading of unsecure content (HTTP) from secure locations (HTTPS) and to
execute arbitrary code in the context of the current [Link] the current user is logged on with
administrative user rights, an attacker who successfully exploited the vulnerability could take
control of an aected system. An attacker could then install programs, view, change, or delete
data or create new accounts with full user rights.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Internet Explorer version 9.x, 10.x and 11.x.
Vulnerability Insight
Multiple aws exist due to:
- An error in the way JavaScript scripting engines handle objects in memory in Microsoft
browsers.
- An error when Microsoft browsers render SmartScreen Filter.
- An error when Internet Explorer improperly accesses objects in memory.
. . . continues on next page . . .
2 RESULTS PER HOST 121
References
cve: CVE-2017-0228
cve: CVE-2017-0064
cve: CVE-2017-0222
cve: CVE-2017-0226
cve: CVE-2017-0231
cve: CVE-2017-0238
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→-0222
url: [Link]
,→-0064
url: [Link]
,→-0226
url: [Link]
,→-0228
url: [Link]
,→-0231
url: [Link]
,→-0238
cert-bund: CB-K17/1378
cert-bund: CB-K17/0786
cert-bund: CB-K17/0781
dfn-cert: DFN-CERT-2017-1437
dfn-cert: DFN-CERT-2017-0810
dfn-cert: DFN-CERT-2017-0809
2 RESULTS PER HOST 122
Summary
This host is missing a critical security update according to Microsoft KB4493472
Impact
Successful exploitation will allow an attacker to execute arbitrary code on a victim system, obtain
information to further compromise the user's system, gain elevated privileges, bypass security
features and cause denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist in,
- The IOleCvt interface improperly renders ASP webpage content.
- Windows Jet Database Engine improperly handles objects in memory.
- Windows GDI component improperly discloses the contents of its memory.
- The win32k component improperly provides kernel information.
- Speculative execution side-channel vulnerabilities.
- Error in Various Windows components.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2017-5753
cve: CVE-2017-5715
. . . continues on next page . . .
2 RESULTS PER HOST 123
Summary
This host is missing an important security update according to Microsoft advisory (2868725).
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 128
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012
Vulnerability Insight
The aw is due to security issue in RC4 stream cipher used in Transport Layer Security(TLS)
and Secure Socket Layer(SSL).
References
url: [Link]
url: [Link]
Summary
7zip is prone to an authentication bypass vulnerability.
Solution:
Solution type: VendorFix
Upgrade to 7zip version 18.03 or later.
. . . continues on next page . . .
2 RESULTS PER HOST 129
Aected Software/OS
7zip through version 18.01.
Vulnerability Insight
7-Zip through 18.01 on Windows implements the Large memory pages option by calling the
LsaAddAccountRights function to add the SeLockMemoryPrivilege privilege to the user's ac-
count, which makes it easier for attackers to bypass intended access restrictions by using this
privilege in the context of a sandboxed process.
References
cve: CVE-2018-10172
url: [Link]
,→25&page=1#b240
Summary
This host is missing a critical security update according to Microsoft KB4462923
Impact
Successful exploitation will allow an attacker to run arbitrary code, bypass security restrictions,
gain the same user rights as the current user, obtain information to further compromise the user's
system, improperly discloses le information and escalate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
Multiple aws exist due to:
- Windows Win32k component fails to properly handle objects in memory.
- Windows Hyper-V on a host server fails to properly validate input from an authenticated user
on a guest operating system.
- Microsoft XML Core Services MSXML parser improperly processes user input.
- Internet Explorer improperly accesses objects in memory.
- Filter Manager improperly handles objects in memory.
- Windows TCP/IP stack improperly handles fragmented IP packets.
- Windows Media Player improperly discloses le information.
- Windows Graphics Device Interface (GDI) improperly handles objects in memory.
- DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory.
- Windows kernel improperly handles objects in memory.
- Windows Theme API does not properly decompress les.
- NTFS improperly checks access.
References
cve: CVE-2018-8320
cve: CVE-2018-8330
cve: CVE-2018-8333
cve: CVE-2018-8411
cve: CVE-2018-8413
cve: CVE-2018-8423
cve: CVE-2018-8432
cve: CVE-2018-8453
cve: CVE-2018-8460
cve: CVE-2018-8472
cve: CVE-2018-8481
cve: CVE-2018-8482
cve: CVE-2018-8486
cve: CVE-2018-8489
cve: CVE-2018-8491
cve: CVE-2018-8494
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: CB-K18/0992
. . . continues on next page . . .
2 RESULTS PER HOST 131
Summary
This host is missing a critical security update according to Microsoft KB4457144.
Impact
Successful exploitation will allow an attacker to crash the aected system, execute arbitrary code
on the host operating system, disclose contents of System memory and also read privileged data
across trust boundaries.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit/x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- Denial of service vulnerability (named 'FragmentSmack').
- Hyper-V on a host server fails to properly validate guest operating system user input.
- Windows [Link] kernel-mode driver fails to properly handle objects in memory.
- Browser scripting engine improperly handle object types.
- Windows font library improperly handles specially crafted embedded fonts.
- Windows kernel improperly handles objects in memory.
- Microsoft JET Database Engine improperly handles objects in memory.
- Windows Kernel API improperly handles registry objects in memory.
- Windows kernel fails to properly initialize a memory address.
- MSXML parser improperly processes user input.
- Windows GDI component improperly handles objects in memory.
- Windows GDI component improperly discloses the contents of its memory.
. . . continues on next page . . .
2 RESULTS PER HOST 132
References
cve: CVE-2018-5391
cve: CVE-2018-8271
cve: CVE-2018-8315
cve: CVE-2018-8332
cve: CVE-2018-8336
cve: CVE-2018-8392
cve: CVE-2018-8393
cve: CVE-2018-8410
cve: CVE-2018-8419
cve: CVE-2018-8420
cve: CVE-2018-8422
cve: CVE-2018-8424
cve: CVE-2018-8433
cve: CVE-2018-8434
cve: CVE-2018-8440
cve: CVE-2018-8442
cve: CVE-2018-8443
cve: CVE-2018-8446
cve: CVE-2018-8447
cve: CVE-2018-8452
cve: CVE-2018-8457
cve: CVE-2018-8468
cve: CVE-2018-8470
cve: CVE-2018-8475
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-0508
cert-bund: CB-K18/0913
cert-bund: CB-K18/0854
dfn-cert: DFN-CERT-2019-1026
dfn-cert: DFN-CERT-2019-0562
dfn-cert: DFN-CERT-2019-0544
dfn-cert: DFN-CERT-2019-0453
. . . continues on next page . . .
2 RESULTS PER HOST 133
Summary
This host is missing a critical security update according to Microsoft KB4343900
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 134
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- A new speculative execution side channel vulnerability known as L1 Terminal Fault.
- Internet Explorer improperly validates hyperlinks before loading executable libraries.
- Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.
- NDIS fails to check the length of a buer prior to copying memory to it.
- Windows font library improperly handles specially crafted embedded fonts.
- An improper processing for a .LNK le.
- 'Microsoft COM for Windows' fails to properly handle serialized objects.
- Microsoft browsers improperly allow cross-frame interaction.
- Microsoft browsers allowing sandbox escape.
- Microsoft Edge improperly handles redirect requests and specic HTML content.
- Microsoft .NET Framework improperly access information in multi-tenant environments.
- WebAudio Library improperly handles audio requests.
- Windows GDI component improperly discloses the contents of its memory.
- Windows PDF Library improperly handles objects in memory.
- Windows Shell does not properly validate le paths.
References
cve: CVE-2018-3615
cve: CVE-2018-3620
cve: CVE-2018-3646
cve: CVE-2018-8316
cve: CVE-2018-8339
cve: CVE-2018-8341
cve: CVE-2018-8342
cve: CVE-2018-8343
. . . continues on next page . . .
2 RESULTS PER HOST 135
Summary
This host is missing an important security update according to Microsoft KB5034831
Impact
Successful exploitation will allow an attacker to elevate privileges, execute arbitrary commands,
disclose information, conduct spoong and denial of service attacks on an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1.
Vulnerability Insight
Multiple aws exist due to,
- Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability.
- Windows Printing Service Spoong Vulnerability.
- Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2024-21420
cve: CVE-2024-21406
cve: CVE-2024-21375
cve: CVE-2024-21370
cve: CVE-2024-21368
cve: CVE-2024-21366
cve: CVE-2024-21365
cve: CVE-2024-21361
cve: CVE-2024-21360
cve: CVE-2024-21359
cve: CVE-2024-21358
cve: CVE-2024-21357
cve: CVE-2024-21356
cve: CVE-2024-21355
cve: CVE-2024-21354
cve: CVE-2024-21352
. . . continues on next page . . .
2 RESULTS PER HOST 138
Summary
This host is missing a critical security update according to Microsoft KB4103718
Impact
Successful exploitation will allow attackers to gain the same user rights as the current user, run
arbitrary code, disclose sensitive information and run processes in an elevated context and it
may lead to further compromise of the system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- Microsoft browsers improperly access objects in memory.
- The Win32k component fails to properly handle objects in memory.
- Windows kernel fails to properly handle objects in memory.
- The VBScript engine improperly handles objects in memory.
- The scripting engine improperly handles objects in memory in Microsoft browsers.
- Windows Common Log File System (CLFS) driver improperly handles objects in memory.
- Chakra improperly discloses the contents of its memory.
- Windows Hyper-V on a host server fails to properly validate input from an authenticated user
on a guest operating system.
- Windows 'its://' protocol handler unnecessarily sends trac to a remote site in order to deter-
mine the zone of a provided URL.
- An error in Credential Security Support Provider protocol (CredSSP).
References
cve: CVE-2018-0954
cve: CVE-2018-0955
cve: CVE-2018-0959
cve: CVE-2018-1022
. . . continues on next page . . .
2 RESULTS PER HOST 140
Summary
This host is missing a critical security update according to Microsoft KB4093118
Impact
Successful exploitation will allow an attacker to take control of the aected system, obtain
information to further compromise the user's system, execute arbitrary code, retrieve the memory
address of a kernel object, cause a target system to stop responding.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 142
Vulnerability Insight
Multiple aws exist due to:
- When the Windows font library improperly handles specially crafted embedded fonts.
- When Internet Explorer improperly accesses objects in memory.
- When the Windows kernel fails to properly initialize a memory address.
- When the scripting engine does not properly handle objects in memory in Internet Explorer.
- In Windows Adobe Type Manager Font Driver (ATMFD.
- In the Windows kernel that could allow an attacker to retrieve information that could lead to
a Kernel Address Space Layout Randomization (ASLR) bypass.
- In the way that Windows SNMP Service handles malformed SNMP traps.
- When the Windows kernel improperly handles objects in memory.
- In the way that the VBScript engine handles objects in memory.
- In the way that Windows handles objects in memory.
- In Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP
and sends specially crafted requests.
- In the Microsoft JET Database Engine that could allow remote code execution on an aected
system.
References
cve: CVE-2018-0870
cve: CVE-2018-0887
cve: CVE-2018-8116
cve: CVE-2018-0960
cve: CVE-2018-0967
cve: CVE-2018-0969
cve: CVE-2018-0970
cve: CVE-2018-0971
cve: CVE-2018-0972
cve: CVE-2018-0973
cve: CVE-2018-0974
cve: CVE-2018-0975
cve: CVE-2018-0976
cve: CVE-2018-0981
cve: CVE-2018-0987
cve: CVE-2018-0988
cve: CVE-2018-0989
cve: CVE-2018-0991
cve: CVE-2018-1003
. . . continues on next page . . .
2 RESULTS PER HOST 143
Summary
This host is missing a critical security update according to Microsoft KB4561643
Impact
Successful exploitation will allow an attacker to execute arbitrary code, elevate privileges, disclose
sensitive information, conduct spoong and denial of service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
References
cve: CVE-2020-1160
cve: CVE-2020-1194
cve: CVE-2020-1196
cve: CVE-2020-1207
cve: CVE-2020-1208
cve: CVE-2020-1212
cve: CVE-2020-1213
cve: CVE-2020-1214
cve: CVE-2020-1215
cve: CVE-2020-1216
cve: CVE-2020-1219
cve: CVE-2020-1220
cve: CVE-2020-1230
cve: CVE-2020-1236
cve: CVE-2020-1239
cve: CVE-2020-1246
cve: CVE-2020-1247
cve: CVE-2020-1251
cve: CVE-2020-1253
cve: CVE-2020-1254
cve: CVE-2020-1255
cve: CVE-2020-1260
cve: CVE-2020-1262
cve: CVE-2020-1263
cve: CVE-2020-1270
cve: CVE-2020-1271
cve: CVE-2020-1272
cve: CVE-2020-1281
. . . continues on next page . . .
2 RESULTS PER HOST 145
Summary
This host is missing a critical security update according to Microsoft KB4516065
Impact
Successful exploitation will allow an attacker to execute arbitrary code on a victim system,
obtain information to further compromise the user's system, gain elevated privileges and disclose
sensitive information.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 146
Vulnerability Insight
Multiple aws exist due to:
- Windows Remote Desktop Client improperly handles connection requests.
- VBScript engine improperly handles objects in memory.
- Windows Common Log File System (CLFS) driver improperly handles objects in memory.
- [Link] (Winsock) improperly handles objects in memory.
- DirectX improperly handles objects in memory.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2018-12126
cve: CVE-2018-12127
cve: CVE-2018-12130
cve: CVE-2019-0787
cve: CVE-2019-11091
cve: CVE-2019-1208
cve: CVE-2019-1214
cve: CVE-2019-1215
cve: CVE-2019-1216
cve: CVE-2019-1219
cve: CVE-2019-1220
cve: CVE-2019-1221
cve: CVE-2019-1235
cve: CVE-2019-1236
cve: CVE-2019-1240
cve: CVE-2019-1241
cve: CVE-2019-1242
cve: CVE-2019-1243
cve: CVE-2019-1244
cve: CVE-2019-1245
cve: CVE-2019-1246
cve: CVE-2019-1247
cve: CVE-2019-1248
cve: CVE-2019-1249
cve: CVE-2019-1250
cve: CVE-2019-1252
cve: CVE-2019-1256
cve: CVE-2019-1267
. . . continues on next page . . .
2 RESULTS PER HOST 147
Summary
This host is missing a critical security update according to Microsoft KB4577051
Impact
Successful exploitation will allow an attacker to execute arbitrary code, elevate privileges, conduct
DoS condition and disclose sensitive information.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 149
References
cve: CVE-2020-0648
cve: CVE-2020-0664
cve: CVE-2020-0718
cve: CVE-2020-0761
cve: CVE-2020-0782
cve: CVE-2020-0790
cve: CVE-2020-0836
cve: CVE-2020-0838
cve: CVE-2020-0856
cve: CVE-2020-0878
cve: CVE-2020-0911
cve: CVE-2020-0912
cve: CVE-2020-0921
cve: CVE-2020-0922
cve: CVE-2020-1012
cve: CVE-2020-1013
cve: CVE-2020-1030
cve: CVE-2020-1031
cve: CVE-2020-1038
cve: CVE-2020-1039
cve: CVE-2020-1052
cve: CVE-2020-1074
cve: CVE-2020-1083
cve: CVE-2020-1091
cve: CVE-2020-1097
cve: CVE-2020-1115
cve: CVE-2020-1228
cve: CVE-2020-1245
cve: CVE-2020-1250
cve: CVE-2020-1252
cve: CVE-2020-1256
cve: CVE-2020-1285
cve: CVE-2020-1376
. . . continues on next page . . .
2 RESULTS PER HOST 150
Summary
This host is missing a critical security update according to Microsoft KB4580345
Impact
Successful exploitation will allow an attacker to execute arbitrary code, elevate privileges and
disclose sensitive information.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
References
cve: CVE-2020-16863
cve: CVE-2020-16887
cve: CVE-2020-16889
cve: CVE-2020-16891
cve: CVE-2020-16897
cve: CVE-2020-16900
cve: CVE-2020-16902
cve: CVE-2020-16912
cve: CVE-2020-16914
cve: CVE-2020-16916
cve: CVE-2020-16920
cve: CVE-2020-16922
cve: CVE-2020-16923
cve: CVE-2020-16924
cve: CVE-2020-16935
cve: CVE-2020-16936
cve: CVE-2020-16939
cve: CVE-2020-16940
cve: CVE-2020-16972
cve: CVE-2020-16973
cve: CVE-2020-16974
cve: CVE-2020-16975
cve: CVE-2020-16976
url: [Link]
cert-bund: CB-K20/0979
dfn-cert: DFN-CERT-2020-2244
2 RESULTS PER HOST 152
Summary
This host is missing a critical security update according to Microsoft KB5001335
Impact
Successful exploitation will allow an attacker to perform remote code execution, conduct a denial-
of-service condition, gain access to potentially sensitive data, bypass security restrictions, conduct
spoong and elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- Multiple errors in Windows Installer.
- An error in RPC Endpoint Mapper Service.
- An error in Microsoft Internet Messaging API.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2021-26413
cve: CVE-2021-26415
cve: CVE-2021-27089
cve: CVE-2021-27091
. . . continues on next page . . .
2 RESULTS PER HOST 153
Summary
This host is missing an important security update according to Microsoft KB5015861
Impact
Successful exploitation will allow an attacker to elevate privileges, execute arbitrary commands,
disclose information, bypass security restrictions and conduct DoS attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Windows Fax Service.
- A Remote Code Execution Vulnerability in Windows Graphics Component.
- A Denial of Service Vulnerability in Windows Security Account Manager.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-21845
. . . continues on next page . . .
2 RESULTS PER HOST 155
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 156
Impact
Successful exploitation will allow an attacker to elevate privileges, execute arbitrary commands,
disclose information and conduct DoS attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Local Security Authority Subsystem Service.
- A Remote Code Execution Vulnerability in Windows Hyper-V.
- A Denial of Service Vulnerability in Windows Kernel.
The aw in the Microsoft Windows Support Diagnostic Tool (MSDT) and tracked via CVE-
2022-30190 is dubbed 'Follina'.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-21123
cve: CVE-2022-21125
cve: CVE-2022-21127
cve: CVE-2022-21166
cve: CVE-2022-30135
cve: CVE-2022-30140
cve: CVE-2022-30141
cve: CVE-2022-30142
. . . continues on next page . . .
2 RESULTS PER HOST 157
Summary
This host is missing a critical security update according to Microsoft KB4507449
Impact
Successful exploitation will allow an attacker to execute arbitrary code on a victim system, obtain
information to further compromise the user's system and gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 159
Vulnerability Insight
Multiple aws exist as,
- Remote Desktop Services improperly handles clipboard redirection.
- Scripting Engine improperly handles objects in memory in Microsoft browsers.
- Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allow
signing of SAML tokens with arbitrary symmetric keys.
- Windows GDI component improperly handles objects in memory.
- An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default
setting.
- Kernel Information Disclosure Vulnerability (SWAPGS Attack).
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2019-0683
cve: CVE-2019-0887
cve: CVE-2019-1001
cve: CVE-2019-1004
cve: CVE-2019-1006
cve: CVE-2019-1056
cve: CVE-2019-1059
cve: CVE-2019-1063
cve: CVE-2019-1071
cve: CVE-2019-1073
cve: CVE-2019-1082
cve: CVE-2019-1085
cve: CVE-2019-1088
cve: CVE-2019-1089
cve: CVE-2019-1093
cve: CVE-2019-1094
cve: CVE-2019-1095
cve: CVE-2019-1096
cve: CVE-2019-1097
cve: CVE-2019-1098
cve: CVE-2019-1099
cve: CVE-2019-1100
cve: CVE-2019-1101
cve: CVE-2019-1102
cve: CVE-2019-1104
cve: CVE-2019-1108
. . . continues on next page . . .
2 RESULTS PER HOST 160
Summary
This host is missing a critical security update according to Microsoft KB4038777
Impact
Successful exploitation will allow an attacker to gain access to potentially sensitive information,
perform a man-in-the-middle attack and force a user's computer to unknowingly route trac
through the attacker's computer, execute arbitrary code on the target, embed an ActiveX control
marked safe for initialization, take complete control of the aected system and read arbitrary
les on the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An error when Windows Hyper-V on a host operating system fails to properly validate input
from an authenticated user on a guest operating system.
- An issue when the Windows kernel fails to properly initialize a memory address.
- An error when the Windows kernel improperly handles objects in memory.
- An error in Microsoft's implementation of the Bluetooth stack.
- An error in the way that Microsoft browser JavaScript engines render content when handling
objects in memory.
- An error when Windows Uniscribe improperly discloses the contents of its memory.
- An error due to the way Windows Uniscribe handles objects in memory.
- An error when Microsoft browsers improperly access objects in memory.
- An error when Internet Explorer improperly handles specic HTML content.
. . . continues on next page . . .
2 RESULTS PER HOST 162
References
cve: CVE-2017-0161
cve: CVE-2017-8719
cve: CVE-2017-8720
cve: CVE-2017-8628
cve: CVE-2017-8733
cve: CVE-2017-8736
cve: CVE-2017-8675
cve: CVE-2017-8676
cve: CVE-2017-8741
cve: CVE-2017-8677
cve: CVE-2017-8678
cve: CVE-2017-8747
cve: CVE-2017-8748
cve: CVE-2017-8679
cve: CVE-2017-8680
cve: CVE-2017-8681
cve: CVE-2017-8749
cve: CVE-2017-8750
cve: CVE-2017-8682
cve: CVE-2017-8683
cve: CVE-2017-8684
cve: CVE-2017-8685
cve: CVE-2017-8687
cve: CVE-2017-8688
cve: CVE-2017-8696
cve: CVE-2017-8699
cve: CVE-2017-8707
. . . continues on next page . . .
2 RESULTS PER HOST 163
Summary
This host is missing a critical security update according to Microsoft KB5020000
Impact
Successful exploitation will allow an attacker to disclose sensitive information, perform remote
code execution, cause denial of service condition and elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability.
- An elevation of privilege vulnerability in Windows Kerberos RC4-HMAC.
- Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-23824
cve: CVE-2022-37966
cve: CVE-2022-37967
cve: CVE-2022-37992
cve: CVE-2022-38023
. . . continues on next page . . .
2 RESULTS PER HOST 165
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 166
Impact
Successful exploitation will allow an attacker to perform remote code execution, gain access to
potentially sensitive data, conduct spoong and elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Windows Common Log File System Driver.
- A security feature bypass vulnerability in Kerberos AppContainer.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2021-31183
cve: CVE-2021-31979
cve: CVE-2021-33745
cve: CVE-2021-33746
cve: CVE-2021-33749
cve: CVE-2021-33750
cve: CVE-2021-33752
cve: CVE-2021-33754
cve: CVE-2021-33756
cve: CVE-2021-33757
cve: CVE-2021-33764
. . . continues on next page . . .
2 RESULTS PER HOST 167
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to disclose information and cause partial denial of
service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u421 and prior on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2023-42950: An error in the WebKitGTK component of Oracle Java SE.
- CVE-2024-25062: An error in the libxml2 component of Oracle Java SE.
References
cve: CVE-2023-42950
cve: CVE-2024-25062
url: [Link]
cert-bund: WID-SEC-2024-3377
cert-bund: WID-SEC-2024-3195
cert-bund: WID-SEC-2024-3189
cert-bund: WID-SEC-2024-1656
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1638
cert-bund: WID-SEC-2024-1637
cert-bund: WID-SEC-2024-1307
cert-bund: WID-SEC-2024-1226
cert-bund: WID-SEC-2024-0869
cert-bund: WID-SEC-2024-0280
dfn-cert: DFN-CERT-2025-1798
dfn-cert: DFN-CERT-2025-1710
dfn-cert: DFN-CERT-2025-1316
dfn-cert: DFN-CERT-2025-0473
dfn-cert: DFN-CERT-2025-0294
dfn-cert: DFN-CERT-2024-2991
. . . continues on next page . . .
2 RESULTS PER HOST 169
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to disclose information and cause partial denial of
service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u421 and prior on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2023-42950: An error in the WebKitGTK component of Oracle Java SE.
- CVE-2024-25062: An error in the libxml2 component of Oracle Java SE.
References
cve: CVE-2023-42950
cve: CVE-2024-25062
url: [Link]
cert-bund: WID-SEC-2024-3377
cert-bund: WID-SEC-2024-3195
cert-bund: WID-SEC-2024-3189
cert-bund: WID-SEC-2024-1656
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1638
cert-bund: WID-SEC-2024-1637
cert-bund: WID-SEC-2024-1307
cert-bund: WID-SEC-2024-1226
cert-bund: WID-SEC-2024-0869
cert-bund: WID-SEC-2024-0280
dfn-cert: DFN-CERT-2025-1798
dfn-cert: DFN-CERT-2025-1710
dfn-cert: DFN-CERT-2025-1316
dfn-cert: DFN-CERT-2025-0473
dfn-cert: DFN-CERT-2025-0294
dfn-cert: DFN-CERT-2024-2991
dfn-cert: DFN-CERT-2024-2739
dfn-cert: DFN-CERT-2024-2738
dfn-cert: DFN-CERT-2024-1865
dfn-cert: DFN-CERT-2024-1846
dfn-cert: DFN-CERT-2024-1510
dfn-cert: DFN-CERT-2024-1504
dfn-cert: DFN-CERT-2024-1250
dfn-cert: DFN-CERT-2024-1092
dfn-cert: DFN-CERT-2024-0732
dfn-cert: DFN-CERT-2024-0716
dfn-cert: DFN-CERT-2024-0377
Summary
This host is missing a critical security update according to Microsoft KB5005633
Impact
Successful exploitation will allow an attacker to disclose sensitive information, perform remote
code execution, cause denial of service condition, conduct spoong and elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An error in Windows Ancillary Function Driver for WinSock.
- An elevation of privilege vulnerability in Windows Event Tracing.
- A error in Microsoft MSHTML.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2021-26435
cve: CVE-2021-36955
cve: CVE-2021-36959
cve: CVE-2021-36960
cve: CVE-2021-36961
cve: CVE-2021-36962
cve: CVE-2021-36963
cve: CVE-2021-36964
cve: CVE-2021-36965
cve: CVE-2021-36968
cve: CVE-2021-36969
cve: CVE-2021-38628
cve: CVE-2021-38629
cve: CVE-2021-38630
. . . continues on next page . . .
2 RESULTS PER HOST 172
Summary
This host is missing a critical security update (monthly rollup) according to Microsoft
KB4019264.
Impact
Successful exploitation will allow an attacker to execute code or elevate user privileges, take
control of the aected system, bypass security restrictions, conduct denial-of-service condition,
gain access to potentially sensitive information and spoof content by tricking a user by redirecting
the user to a specially crafted website.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
This monthly rollup,
- Addressed issue where applications that use [Link] stop working after installing security
update 4015550.
- Deprecated SHA-1 Microsoft Edge and Internet Explorer 11 for SSL/TLS Server Authentica-
tion.
- Updated Internet Explorer 11's New Tab Page with an integrated newsfeed.
- Includes security updates to Microsoft Graphics Component, Microsoft Windows DNS, Win-
dows COM, Windows Server, Windows kernel, and Internet Explorer.
References
cve: CVE-2017-0064
cve: CVE-2017-0077
cve: CVE-2017-0171
cve: CVE-2017-0175
cve: CVE-2017-0190
cve: CVE-2017-0213
cve: CVE-2017-0214
cve: CVE-2017-0220
cve: CVE-2017-0222
cve: CVE-2017-0231
cve: CVE-2017-0242
cve: CVE-2017-0244
cve: CVE-2017-0245
cve: CVE-2017-0246
cve: CVE-2017-0258
cve: CVE-2017-0263
cve: CVE-2017-0267
cve: CVE-2017-0268
cve: CVE-2017-0269
cve: CVE-2017-0270
cve: CVE-2017-0271
cve: CVE-2017-0272
cve: CVE-2017-0273
cve: CVE-2017-0274
cve: CVE-2017-0275
cve: CVE-2017-0276
. . . continues on next page . . .
2 RESULTS PER HOST 174
Summary
This host is missing a monthly rollup according to Microsoft security update KB4015549.
Impact
Successful exploitation will allow an attacker to execute code or elevate user privileges, take
control of the aected system, and access information from one domain and inject it into another
domain.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
This security update includes improvements and resolves the following security vulnerabilities
in Windows: scripting engine, Hyper-V, libjpeg image-processing library, Adobe Type Manager
Font Driver, Win32K, Microsoft Outlook, Internet Explorer, Graphics Component, Windows
kernel-mode drivers and Lightweight Directory Access Protocol.
References
cve: CVE-2013-6629
cve: CVE-2017-0058
cve: CVE-2017-0155
cve: CVE-2017-0156
cve: CVE-2017-0158
cve: CVE-2017-0163
. . . continues on next page . . .
2 RESULTS PER HOST 176
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 178
Impact
Successful exploitation will allow attackers to execute arbitrary code in the context of the cur-
rently logged-in user. Failed exploit attempts will likely result in denial of service conditions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
Vulnerability Insight
The aw occurs when windows improperly handles objects in memory.
References
cve: CVE-2016-3228
url: [Link]
url: [Link]
cert-bund: CB-K16/0914
dfn-cert: DFN-CERT-2016-0969
Summary
This host is missing a critical security update according to Microsoft KB5006743
Impact
Successful exploitation will allow an attacker to disclose sensitive information, perform remote
code execution, cause denial of service condition, conduct spoong and elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An error in Windows exFAT File System.
- An error in Windows Fast FAT File System Driver.
- A error in Windows Remote Procedure Call Runtime.
- An error in Windows Media Audio Decoder.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2021-26442
cve: CVE-2021-36953
cve: CVE-2021-36970
cve: CVE-2021-38662
cve: CVE-2021-38663
cve: CVE-2021-40443
cve: CVE-2021-40449
cve: CVE-2021-40455
cve: CVE-2021-40460
cve: CVE-2021-40465
cve: CVE-2021-40466
. . . continues on next page . . .
2 RESULTS PER HOST 180
Summary
This host is missing a critical security update according to Microsoft KB5007236
Impact
Successful exploitation will allow an attacker to disclose sensitive information, perform remote
code execution and elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Active Directory Domain Services.
. . . continues on next page . . .
2 RESULTS PER HOST 181
References
cve: CVE-2021-38631
cve: CVE-2021-38665
cve: CVE-2021-38666
cve: CVE-2021-41367
cve: CVE-2021-41370
cve: CVE-2021-41371
cve: CVE-2021-41377
cve: CVE-2021-41379
cve: CVE-2021-42275
cve: CVE-2021-42278
cve: CVE-2021-42282
cve: CVE-2021-42283
cve: CVE-2021-42285
cve: CVE-2021-42287
cve: CVE-2021-42291
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: CB-K21/1226
cert-bund: CB-K21/1169
dfn-cert: DFN-CERT-2021-2328
Summary
This host is missing a critical security update according to Microsoft KB5009610
Impact
Successful exploitation will allow an attacker to elevate privileges, disclose sensitive information,
conduct remote code execution, bypass security restrictions, conduct DoS attacks and conduct
spoong attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Active Directory Domain Services.
- An elevation of privilege vulnerability in Virtual Machine IDE Drive.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-21833
cve: CVE-2022-21834
cve: CVE-2022-21835
cve: CVE-2022-21836
cve: CVE-2022-21838
cve: CVE-2022-21843
cve: CVE-2022-21848
cve: CVE-2022-21850
cve: CVE-2022-21851
cve: CVE-2022-21857
cve: CVE-2022-21859
cve: CVE-2022-21862
cve: CVE-2022-21880
cve: CVE-2022-21883
cve: CVE-2022-21884
cve: CVE-2022-21885
cve: CVE-2022-21889
. . . continues on next page . . .
2 RESULTS PER HOST 183
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to compromise Oracle Java SE, which can result in
unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 184
Aected Software/OS
Oracle Java SE 8u401 and prior on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21003: An error in the JavaFX component of Oracle Java SE.
- CVE-2024-21005: An error in the JavaFX component of Oracle Java SE.
Please see the references for more information on the vulnerabilities.
References
cve: CVE-2023-41993
cve: CVE-2024-21003
cve: CVE-2024-21005
cve: CVE-2024-21002
cve: CVE-2024-21004
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-0001
cert-bund: WID-SEC-2024-0895
cert-bund: WID-SEC-2023-2705
cert-bund: WID-SEC-2023-2454
cert-bund: WID-SEC-2023-2453
cert-bund: WID-SEC-2023-2452
cert-bund: WID-SEC-2023-2427
cert-bund: WID-SEC-2023-2424
dfn-cert: DFN-CERT-2025-1798
dfn-cert: DFN-CERT-2024-1413
dfn-cert: DFN-CERT-2024-1005
dfn-cert: DFN-CERT-2024-1004
dfn-cert: DFN-CERT-2023-2645
dfn-cert: DFN-CERT-2023-2334
dfn-cert: DFN-CERT-2023-2333
dfn-cert: DFN-CERT-2023-2297
dfn-cert: DFN-CERT-2023-2296
dfn-cert: DFN-CERT-2023-2246
dfn-cert: DFN-CERT-2023-2245
2 RESULTS PER HOST 185
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-061.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with elevated priv-
ileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Flaw exists due to when windows improperly handles specially crafted Remote Procedure Call
(RPC) requests.
References
cve: CVE-2016-0178
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 186
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to compromise Oracle Java SE, which can result in
unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE 8u401 and prior on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21003: An error in the JavaFX component of Oracle Java SE.
- CVE-2024-21005: An error in the JavaFX component of Oracle Java SE.
Please see the references for more information on the vulnerabilities.
References
cve: CVE-2023-41993
cve: CVE-2024-21003
cve: CVE-2024-21005
. . . continues on next page . . .
2 RESULTS PER HOST 187
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-005.
Impact
Successful exploitation will allow an attacker to bypass Address Space Layout Randomization
(ASLR) protection mechanisms and gain access to sensitive informationand to execute arbitrary
code in the context of the currently logged-in user.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 188
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- A security feature bypass vulnerability exists in the way Windows graphics device interface
handles objects in memory.
- An error in the way Windows handles objects in memory.
References
cve: CVE-2016-0009
cve: CVE-2016-0008
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0057
dfn-cert: DFN-CERT-2016-0064
Summary
This host is missing an important security update according to Microsoft KB5011552
Impact
Successful exploitation will allow an attacker to elevate privileges, disclose sensitive information,
conduct remote code execution, bypass security restrictions, and conduct DoS attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Windows Fax and Scan Service.
- An elevation of privilege vulnerability in Windows ALPC.
- An elevation of privilege vulnerability in Windows Installer.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-21973
cve: CVE-2022-21990
cve: CVE-2022-23253
cve: CVE-2022-23281
cve: CVE-2022-23283
cve: CVE-2022-23285
cve: CVE-2022-23290
cve: CVE-2022-23293
cve: CVE-2022-23296
cve: CVE-2022-23297
cve: CVE-2022-23298
cve: CVE-2022-23299
cve: CVE-2022-24454
cve: CVE-2022-24459
. . . continues on next page . . .
2 RESULTS PER HOST 190
Summary
This host is missing a critical security update according to Microsoft KB4598279
Impact
Successful exploitation will allow an attacker to perform remote code execution and elevate
privilege.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An error in Active Template Library.
- An error in Windows CSC Service.
- An error in TPM Device Driver.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2021-1649
cve: CVE-2021-1652
cve: CVE-2021-1653
cve: CVE-2021-1654
cve: CVE-2021-1655
cve: CVE-2021-1656
cve: CVE-2021-1657
cve: CVE-2021-1658
cve: CVE-2021-1659
cve: CVE-2021-1660
cve: CVE-2021-1661
cve: CVE-2021-1664
cve: CVE-2021-1665
cve: CVE-2021-1666
cve: CVE-2021-1667
cve: CVE-2021-1668
cve: CVE-2021-1671
cve: CVE-2021-1673
cve: CVE-2021-1674
cve: CVE-2021-1676
cve: CVE-2021-1678
cve: CVE-2021-1679
cve: CVE-2021-1688
cve: CVE-2021-1693
cve: CVE-2021-1694
cve: CVE-2021-1695
cve: CVE-2021-1696
cve: CVE-2021-1699
cve: CVE-2021-1700
cve: CVE-2021-1701
cve: CVE-2021-1702
cve: CVE-2021-1704
cve: CVE-2021-1706
cve: CVE-2021-1708
cve: CVE-2021-1709
url: [Link]
cert-bund: CB-K21/0028
dfn-cert: DFN-CERT-2021-0063
2 RESULTS PER HOST 192
Summary
This host is missing a critical security update according to Microsoft KB4550964
Impact
Successful exploitation allows an attacker to execute arbitrary code on a victim system, disclose
sensitive information, conduct denial-of-service condition and gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to
- An error when the Windows kernel improperly handles objects in memory.
- Multiple errors in the way Microsoft Graphics Components handle objects in memory.
- Multiple errors when the Windows Jet Database Engine improperly handles objects in memory.
- An error in Windows DNS when it fails to properly handle queries.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2020-0687
cve: CVE-2020-0821
cve: CVE-2020-0889
cve: CVE-2020-0895
cve: CVE-2020-0938
. . . continues on next page . . .
2 RESULTS PER HOST 193
Summary
This host is missing a critical security update according to Microsoft KB5005010. The aw is
dubbed 'PrintNightmare'.
Impact
Successful exploitation allow attackers to execute arbitrary code with SYSTEM privileges on a
vulnerable system.
Solution:
Solution type: Workaround
The vendor has released updates.
In addition to installing the updates users are recommended to either disable the Print Spooler
service, or to Disable inbound remote printing through Group Policy.
Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2019
- Microsoft Windows Server 2016
- Microsoft Windows 7 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2008 x32
- Microsoft Windows Server 2008 R2 x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
Vulnerability Insight
The aw is due to the Microsoft Windows Print Spooler service which fails to restrict access to
functionality that allows users to add printers and related drivers.
References
cve: CVE-2021-34527
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
,→34527-windows-print-spooler-vulnerability/
cert-bund: CB-K21/0708
dfn-cert: DFN-CERT-2021-1437
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-
010(WannaCrypt)
Impact
Successful exploitation will allow remote attackers to gain the ability to execute code on the
target server, also could lead to information disclosure from the server.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows XP SP2 x64
- Microsoft Windows XP SP3 x86
- Microsoft Windows 8 x86/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
. . . continues on next page . . .
2 RESULTS PER HOST 196
Vulnerability Insight
Multiple aws exist due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server
handles certain requests(WannaCrypt).
References
cve: CVE-2017-0143
cve: CVE-2017-0144
cve: CVE-2017-0145
cve: CVE-2017-0146
cve: CVE-2017-0147
cve: CVE-2017-0148
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→annacrypt-attacks
cert-bund: CB-K17/0435
dfn-cert: DFN-CERT-2017-0448
NVT: Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 197
Impact
Successful exploitation could allow remote attackers to execute arbitrary code as the logged-on
user.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
- Microsoft Expression Web 2
- Microsoft Oce Word Viewer
- Microsoft Oce Compatibility
- Microsoft Oce 2003 Service Pack 3 and prior
- Microsoft Oce 2007 Service Pack 3 and prior
- Microsoft Expression Web Service Pack 1 and prior
- Microsoft Groove Server 2007 Service Pack 3 and prior
- Microsoft SharePoint Server 2007 Service Pack 3 and prior
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Microsoft XML Core Services attempts to access an object in memory that has not been initial-
ized, which allows an attacker to corrupt memory.
References
cve: CVE-2012-1889
. . . continues on next page . . .
2 RESULTS PER HOST 198
Summary
This host is missing a critical security update according to Microsoft KB4556399
Impact
Successful exploitation will allow an attacker to gain escalated privileges, conduct a denial-of-
service condition and run arbitrary code in the context of the current user. If the current user is
logged on with administrative user rights, an attacker could take control of the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft
Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
Multiple aws exist due to:
- Microsoft .NET Framework fails to check the source markup of a le.
- Microsoft .NET Framework improperly handles web requests.
- An error in how .NET Framework activates COM objects.
References
cve: CVE-2020-1108
cve: CVE-2020-0605
cve: CVE-2020-1066
url: [Link]
cert-bund: CB-K20/0456
cert-bund: CB-K20/0048
dfn-cert: DFN-CERT-2020-1091
dfn-cert: DFN-CERT-2020-1032
dfn-cert: DFN-CERT-2020-1009
dfn-cert: DFN-CERT-2020-1008
dfn-cert: DFN-CERT-2020-0087
Summary
This host is missing a critical security update according to Microsoft KB4540688
Impact
Successful exploitation allows an attacker to execute arbitrary code, elevate privileges, disclose
sensitive information and conduct tampering attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
References
cve: CVE-2020-0645
cve: CVE-2020-0684
cve: CVE-2020-0768
cve: CVE-2020-0769
cve: CVE-2020-0770
cve: CVE-2020-0771
cve: CVE-2020-0772
cve: CVE-2020-0773
cve: CVE-2020-0774
cve: CVE-2020-0778
cve: CVE-2020-0779
cve: CVE-2020-0781
cve: CVE-2020-0783
cve: CVE-2020-0785
cve: CVE-2020-0787
cve: CVE-2020-0788
cve: CVE-2020-0791
cve: CVE-2020-0802
cve: CVE-2020-0803
cve: CVE-2020-0804
cve: CVE-2020-0806
cve: CVE-2020-0814
cve: CVE-2020-0822
cve: CVE-2020-0824
cve: CVE-2020-0830
cve: CVE-2020-0832
cve: CVE-2020-0833
cve: CVE-2020-0842
cve: CVE-2020-0843
cve: CVE-2020-0844
cve: CVE-2020-0845
. . . continues on next page . . .
2 RESULTS PER HOST 201
NVT: Microsoft Windows XML Core Services Remote Code Execution Vulnerability (3148541)
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-040.
Impact
Successful exploitation will allow remote attackers to run malicious code remotely to take control
of the user's system.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 202
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
Vulnerability Insight
Flaw exists due to some unspecied error when XML Core services parser processes user input.
References
cve: CVE-2016-0147
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0546
dfn-cert: DFN-CERT-2016-0589
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-055.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 203
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- Windows GDI component improperly discloses the contents of its memory.
- Windows Imaging Component fails to properly handle objects in the memory.
- Windows GDI component fails to properly handle objects in memory.
References
cve: CVE-2016-0168
cve: CVE-2016-0169
cve: CVE-2016-0170
cve: CVE-2016-0184
cve: CVE-2016-0195
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0701
dfn-cert: DFN-CERT-2016-0759
2 RESULTS PER HOST 204
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-039.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code and gain elevated
privileges on the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
Multiple aws exist due to:
- An error in kernel-mode driver which fails to properly handle objects in memory.
- An error in windows font library which improperly handles specially crafted embedded fonts.
References
cve: CVE-2016-0143
cve: CVE-2016-0145
. . . continues on next page . . .
2 RESULTS PER HOST 205
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-065.
Impact
Successful exploitation will allow remote attackers to corrupt memory and potentially execute
arbitrary code in the context of the current user.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x/10.x/11.x and VBScript 5.8 on
8.x/9.x/10.x/11.x.
Vulnerability Insight
Multiple aws are due to improper handling memory objects when accessing it and does not
properly validate permissions under specic conditions.
References
cve: CVE-2015-1729
cve: CVE-2015-1733
cve: CVE-2015-1767
cve: CVE-2015-2372
cve: CVE-2015-2383
cve: CVE-2015-2384
cve: CVE-2015-2385
cve: CVE-2015-2389
cve: CVE-2015-2390
cve: CVE-2015-2391
cve: CVE-2015-2397
cve: CVE-2015-2398
cve: CVE-2015-2401
cve: CVE-2015-2402
cve: CVE-2015-2403
cve: CVE-2015-2404
cve: CVE-2015-2388
cve: CVE-2015-2406
cve: CVE-2015-2408
cve: CVE-2015-2410
cve: CVE-2015-2411
cve: CVE-2015-2412
cve: CVE-2015-2413
cve: CVE-2015-2414
cve: CVE-2015-2419
cve: CVE-2015-2421
cve: CVE-2015-2422
cve: CVE-2015-2425
cve: CVE-2015-1738
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1014
cert-bund: CB-K15/1013
dfn-cert: DFN-CERT-2015-1062
dfn-cert: DFN-CERT-2015-1060
2 RESULTS PER HOST 207
Summary
This host is missing a critical security update according to Microsoft KB4537820
Impact
Successful exploitation will allow an attacker to run arbitrary code, elevate privileges and disclose
sensitive information
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to
- Windows Common Log File System (CLFS) driver fails to properly handle objects in memory.
- Windows Search Indexer improperly handles objects in memory.
- Cryptography Next Generation (CNG) service improperly handles objects in memory.
- Windows Error Reporting manager improperly handles hard links.
- Windows Function Discovery Service improperly handles objects in memory.
Please see the references for more information on the vulnerabilities.
References
cve: CVE-2020-0655
cve: CVE-2020-0657
cve: CVE-2020-0658
cve: CVE-2020-0662
. . . continues on next page . . .
2 RESULTS PER HOST 208
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-146.
Impact
Successful exploitation will allow an attacker to take control of the aected system. An attacker
could then:
- install programs
- view, change, or delete data
- or create new accounts with full user rights.
Users whose accounts are congured to have fewer user rights on the system could be less im-
pacted than users who operate with administrative user rights.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
. . . continues on next page . . .
2 RESULTS PER HOST 210
Vulnerability Insight
Multiple aws are due to:
- the windows GDI component improperly discloses the contents of its memory.
- the Windows Graphics component improperly handles objects in the memory.
References
cve: CVE-2016-7257
cve: CVE-2016-7272
cve: CVE-2016-7273
url: [Link]
url: [Link]
cert-bund: CB-K16/1959
cert-bund: CB-K16/1956
dfn-cert: DFN-CERT-2016-2066
dfn-cert: DFN-CERT-2016-2062
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability, integrity and
condentiality.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 211
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'JavaFX' and 'Deployment' components.
References
cve: CVE-2021-3517
cve: CVE-2021-35560
cve: CVE-2021-3522
url: [Link]
cert-bund: WID-SEC-2023-1614
cert-bund: WID-SEC-2023-1152
cert-bund: WID-SEC-2023-0395
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-1113
cert-bund: WID-SEC-2022-0196
cert-bund: CB-K22/0239
cert-bund: CB-K22/0061
cert-bund: CB-K21/1082
cert-bund: CB-K21/0647
cert-bund: CB-K21/0450
dfn-cert: DFN-CERT-2023-2306
dfn-cert: DFN-CERT-2022-0899
dfn-cert: DFN-CERT-2022-0213
dfn-cert: DFN-CERT-2022-0121
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2022-0024
dfn-cert: DFN-CERT-2021-2530
dfn-cert: DFN-CERT-2021-2438
dfn-cert: DFN-CERT-2021-2195
dfn-cert: DFN-CERT-2021-2194
dfn-cert: DFN-CERT-2021-1802
dfn-cert: DFN-CERT-2021-1690
dfn-cert: DFN-CERT-2021-1102
dfn-cert: DFN-CERT-2021-1058
dfn-cert: DFN-CERT-2021-1049
. . . continues on next page . . .
2 RESULTS PER HOST 212
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability, integrity and
condentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'JavaFX' and 'Deployment' components.
References
cve: CVE-2021-3517
cve: CVE-2021-35560
cve: CVE-2021-3522
url: [Link]
cert-bund: WID-SEC-2023-1614
cert-bund: WID-SEC-2023-1152
. . . continues on next page . . .
2 RESULTS PER HOST 213
Summary
This host is missing an important security update according to Microsoft KB5021291
Impact
Successful exploitation will allow an attacker to elevate privileges, disclose sensitive information,
conduct remote code execution, bypass security restrictions, and conduct DoS attacks.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 214
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Windows Fax Compose Form.
- An elevation of privilege vulnerability in Windows Graphics Component.
- A Remote Code Execution vulnerability in Windows Contacts.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-41074
cve: CVE-2022-41077
cve: CVE-2022-41121
cve: CVE-2022-44666
cve: CVE-2022-44667
cve: CVE-2022-44668
cve: CVE-2022-44670
cve: CVE-2022-44673
cve: CVE-2022-44675
cve: CVE-2022-44676
cve: CVE-2022-44678
cve: CVE-2022-44681
cve: CVE-2022-44697
cve: CVE-2022-41076
cve: CVE-2022-41094
url: [Link]
cert-bund: WID-SEC-2022-2307
cert-bund: WID-SEC-2022-2303
dfn-cert: DFN-CERT-2022-2854
dfn-cert: DFN-CERT-2022-2847
2 RESULTS PER HOST 215
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u251 ([Link]) and earlier.
Vulnerability Insight
The aw exists due to an error in the 'JavaFX' component.
References
cve: CVE-2020-14664
url: [Link]
cert-bund: WID-SEC-2022-1522
cert-bund: CB-K20/0715
dfn-cert: DFN-CERT-2020-1531
2 RESULTS PER HOST 216
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-042.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code with kernel-mode
privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x64 Edition Service Pack 1 and prior
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows 2K3 x32 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aws are due to an:
- Error in the User Mode Scheduler (UMS) when handling a particular system request can be
exploited to execute arbitrary code.
- Error in incorrect protection of BIOS ROM can be exploited to execute arbitrary code.
References
cve: CVE-2012-0217
cve: CVE-2012-1515
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→12-042
. . . continues on next page . . .
2 RESULTS PER HOST 217
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attackers to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u261 ([Link]) and earlier, 8u251 ([Link]) and earlier, 11.0.7 and
earlier, 14.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, 2D, JAXP and JSSE.
References
cve: CVE-2020-14583
cve: CVE-2020-14593
cve: CVE-2020-14621
cve: CVE-2020-14577
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1522
cert-bund: WID-SEC-2022-1285
cert-bund: CB-K20/1075
cert-bund: CB-K20/0715
cert-bund: CB-K20/0706
dfn-cert: DFN-CERT-2021-0949
dfn-cert: DFN-CERT-2020-2571
dfn-cert: DFN-CERT-2020-1762
dfn-cert: DFN-CERT-2020-1531
dfn-cert: DFN-CERT-2020-1529
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 219
Aected Software/OS
Oracle Java SE version 10.0 through 10.0.1 and [Link] and earlier, [Link] and earlier on
Windows
Vulnerability Insight
The aw is due to an unspecied error in the JavaFX component.
References
cve: CVE-2018-2941
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2018-1405
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Vulnerability Insight
The aw is due to an unspecied error in the JavaFX component.
References
cve: CVE-2018-2941
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2018-1405
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to gain elevated privileges
and modify user data.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 221
Vulnerability Insight
Multiple aws exist due to
- Multiple errors in the Deployment component.
- An error in the Installer component.
- An error in Hotspot component.
References
cve: CVE-2018-2582
cve: CVE-2018-2639
cve: CVE-2018-2638
cve: CVE-2018-2627
url: [Link]
cert-bund: CB-K18/0636
cert-bund: CB-K18/0091
dfn-cert: DFN-CERT-2018-0816
dfn-cert: DFN-CERT-2018-0645
dfn-cert: DFN-CERT-2018-0102
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to gain elevated privileges
and modify user data.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 222
Aected Software/OS
Oracle Java SE version [Link] and earlier, 9.0.1 and earlier on Windows
Vulnerability Insight
Multiple aws exist due to
- Multiple errors in the Deployment component.
- An error in the Installer component.
- An error in Hotspot component.
References
cve: CVE-2018-2582
cve: CVE-2018-2639
cve: CVE-2018-2638
cve: CVE-2018-2627
url: [Link]
cert-bund: CB-K18/0636
cert-bund: CB-K18/0091
dfn-cert: DFN-CERT-2018-0816
dfn-cert: DFN-CERT-2018-0645
dfn-cert: DFN-CERT-2018-0102
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier, 9.0.1
and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to:
- Multiple errors in 'Libraries' sub-component.
- Multiple errors in 'JNDI' sub-component.
- An error in 'JMX' sub-component.
- Multiple errors in 'AWT' sub-component.
- An error in 'JCE' sub-component.
- An error in 'JGSS' sub-component.
- An error in 'I18n' sub-component.
- An error in 'LDAP' sub-component.
References
cve: CVE-2018-2677
cve: CVE-2018-2599
cve: CVE-2018-2603
cve: CVE-2018-2641
cve: CVE-2018-2602
cve: CVE-2018-2629
cve: CVE-2018-2678
cve: CVE-2018-2663
cve: CVE-2018-2633
cve: CVE-2018-2588
cve: CVE-2018-2637
cve: CVE-2018-2618
cve: CVE-2018-2579
url: [Link]
cert-bund: CB-K18/0882
cert-bund: CB-K18/0808
. . . continues on next page . . .
2 RESULTS PER HOST 224
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to conduct a denial of
service condition, access data, partially modify data and gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier, 9.0.1
and earlier on Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 225
References
cve: CVE-2018-2677
cve: CVE-2018-2599
cve: CVE-2018-2603
cve: CVE-2018-2641
cve: CVE-2018-2602
cve: CVE-2018-2629
cve: CVE-2018-2678
cve: CVE-2018-2663
cve: CVE-2018-2633
cve: CVE-2018-2588
cve: CVE-2018-2637
cve: CVE-2018-2618
cve: CVE-2018-2579
url: [Link]
cert-bund: CB-K18/0882
cert-bund: CB-K18/0808
cert-bund: CB-K18/0715
cert-bund: CB-K18/0714
cert-bund: CB-K18/0689
cert-bund: CB-K18/0636
cert-bund: CB-K18/0091
dfn-cert: DFN-CERT-2019-0618
dfn-cert: DFN-CERT-2018-1915
dfn-cert: DFN-CERT-2018-1746
dfn-cert: DFN-CERT-2018-1703
dfn-cert: DFN-CERT-2018-1364
dfn-cert: DFN-CERT-2018-1078
dfn-cert: DFN-CERT-2018-1073
dfn-cert: DFN-CERT-2018-1000
dfn-cert: DFN-CERT-2018-0816
. . . continues on next page . . .
2 RESULTS PER HOST 226
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attackers to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u261 ([Link]) and earlier, 8u251 ([Link]) and earlier, 11.0.7 and
earlier, 14.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, 2D, JAXP and JSSE.
References
cve: CVE-2020-14583
cve: CVE-2020-14593
cve: CVE-2020-14621
cve: CVE-2020-14577
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 227
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier on Windows
Vulnerability Insight
The aw is due to an unspecied error in the 'Windows DLL' component.
References
cve: CVE-2018-2942
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2018-1405
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.7.0 to [Link] and 1.8.0 to [Link] and 11 on Windows.
Vulnerability Insight
The aw exists due to an error in the Hotspot component.
References
. . . continues on next page . . .
2 RESULTS PER HOST 229
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.7.0 to [Link] and 1.8.0 to [Link] and 11 on Windows.
Vulnerability Insight
The aw exists due to an error in the Hotspot component.
References
cve: CVE-2018-3169
. . . continues on next page . . .
2 RESULTS PER HOST 230
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u251 ([Link]) and earlier, 8u241 ([Link]) and earlier, 11.0.6 and
earlier, 14.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Concurrency, Lightweight HTTP
Server, Serialization and Security.
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-011.
Impact
Successful exploitation will allow context-dependent to execute arbitrary code. Failed exploit
attempts will result in a denial-of-service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
The aw is due to remote code execution vulnerability in the way Group Policy receives and
applies policy data if a domain-joined system is connected to a domain controller
References
cve: CVE-2015-0008
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0171
dfn-cert: DFN-CERT-2015-0175
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 233
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier on Windows
Vulnerability Insight
The aw is due to an unspecied error in the 'Windows DLL' component.
References
cve: CVE-2018-2942
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2018-1405
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Aected Software/OS
Oracle Java SE version 7u251 ([Link]) and earlier, 8u241 ([Link]) and earlier, 11.0.6 and
earlier, 14.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Concurrency, Lightweight HTTP
Server, Serialization and Security.
References
cve: CVE-2020-2803
cve: CVE-2020-2805
cve: CVE-2020-2781
cve: CVE-2020-2830
cve: CVE-2020-2800
cve: CVE-2020-2773
cve: CVE-2020-2756
cve: CVE-2020-2757
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K21/0279
cert-bund: CB-K20/0319
cert-bund: CB-K20/0312
dfn-cert: DFN-CERT-2021-0543
dfn-cert: DFN-CERT-2021-0352
dfn-cert: DFN-CERT-2021-0332
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-2571
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-1425
dfn-cert: DFN-CERT-2020-0778
dfn-cert: DFN-CERT-2020-0771
2 RESULTS PER HOST 235
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to gain elevated privileges, cause partial denial of
service conditions, partially modify and access data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.6.0 through [Link], 1.7.0 through [Link], 1.8.0 through [Link]
and 11.
Vulnerability Insight
Multiple aws are due to errors in components 'JNDI', 'Deployment (libpng)', 'Security', 'Net-
working' and 'JSSE'.
References
cve: CVE-2018-3149
cve: CVE-2018-13785
cve: CVE-2018-3136
cve: CVE-2018-3139
cve: CVE-2018-3180
cve: CVE-2018-14048
url: [Link]
advisory-id: cpuoct2018
. . . continues on next page . . .
2 RESULTS PER HOST 236
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to gain elevated privileges, cause partial denial of
service conditions, partially modify and access data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.6.0 through [Link], 1.7.0 through [Link], 1.8.0 through [Link]
and 11.
References
cve: CVE-2018-3149
cve: CVE-2018-13785
cve: CVE-2018-3136
cve: CVE-2018-3139
cve: CVE-2018-3180
cve: CVE-2018-14048
url: [Link]
advisory-id: cpuoct2018
cert-bund: CB-K19/1121
cert-bund: CB-K19/0175
cert-bund: CB-K19/0016
cert-bund: CB-K18/1010
dfn-cert: DFN-CERT-2022-1175
dfn-cert: DFN-CERT-2020-0353
dfn-cert: DFN-CERT-2019-1110
dfn-cert: DFN-CERT-2019-0900
dfn-cert: DFN-CERT-2019-0618
dfn-cert: DFN-CERT-2019-0413
dfn-cert: DFN-CERT-2019-0406
dfn-cert: DFN-CERT-2019-0076
dfn-cert: DFN-CERT-2019-0059
dfn-cert: DFN-CERT-2018-2379
dfn-cert: DFN-CERT-2018-2107
dfn-cert: DFN-CERT-2018-1417
dfn-cert: DFN-CERT-2018-1361
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to gain elevated privileges, cause partial denial of
service conditions, partially modify and access data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.6.0 through [Link], 1.7.0 through [Link], 1.8.0 through [Link]
and 11.
Vulnerability Insight
Multiple aws are due to errors in components 'JNDI', 'Deployment (libpng)', 'Security', 'Net-
working' and 'JSSE'.
References
cve: CVE-2018-3149
cve: CVE-2018-13785
cve: CVE-2018-3136
cve: CVE-2018-3139
cve: CVE-2018-3180
cve: CVE-2018-14048
url: [Link]
advisory-id: cpuoct2018
cert-bund: CB-K19/1121
cert-bund: CB-K19/0175
cert-bund: CB-K19/0016
cert-bund: CB-K18/1010
dfn-cert: DFN-CERT-2022-1175
dfn-cert: DFN-CERT-2020-0353
dfn-cert: DFN-CERT-2019-1110
dfn-cert: DFN-CERT-2019-0900
dfn-cert: DFN-CERT-2019-0618
. . . continues on next page . . .
2 RESULTS PER HOST 239
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u251 ([Link]) and earlier, 8u241 ([Link]) and earlier, 11.0.6 and
earlier, 14.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Concurrency, Lightweight HTTP
Server, Serialization and Security.
References
cve: CVE-2020-2803
cve: CVE-2020-2805
cve: CVE-2020-2781
cve: CVE-2020-2830
cve: CVE-2020-2800
cve: CVE-2020-2773
cve: CVE-2020-2756
cve: CVE-2020-2757
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K21/0279
cert-bund: CB-K20/0319
cert-bund: CB-K20/0312
dfn-cert: DFN-CERT-2021-0543
dfn-cert: DFN-CERT-2021-0352
dfn-cert: DFN-CERT-2021-0332
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-2571
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-1425
dfn-cert: DFN-CERT-2020-0778
dfn-cert: DFN-CERT-2020-0771
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to access sensitive data.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 241
Aected Software/OS
Oracle Java SE version 10.0 through 10.0.1 and [Link] and earlier on Windows
Vulnerability Insight
The aw is due to an unspecied error in the Java SE Security component.
References
cve: CVE-2018-2964
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2018-1902
dfn-cert: DFN-CERT-2018-1675
dfn-cert: DFN-CERT-2018-1405
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 242
Aected Software/OS
Oracle Java SE version 7u251 ([Link]) and earlier, 8u241 ([Link]) and earlier, 11.0.6 and
earlier, 14.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Concurrency, Lightweight HTTP
Server, Serialization and Security.
References
cve: CVE-2020-2803
cve: CVE-2020-2805
cve: CVE-2020-2781
cve: CVE-2020-2830
cve: CVE-2020-2800
cve: CVE-2020-2773
cve: CVE-2020-2756
cve: CVE-2020-2757
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K21/0279
cert-bund: CB-K20/0319
cert-bund: CB-K20/0312
dfn-cert: DFN-CERT-2021-0543
dfn-cert: DFN-CERT-2021-0352
dfn-cert: DFN-CERT-2021-0332
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-2571
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-1425
dfn-cert: DFN-CERT-2020-0778
dfn-cert: DFN-CERT-2020-0771
2 RESULTS PER HOST 243
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to access sensitive data.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 10.0 through 10.0.1 and [Link] and earlier on Windows
Vulnerability Insight
The aw is due to an unspecied error in the Java SE Security component.
References
cve: CVE-2018-2964
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2018-1902
dfn-cert: DFN-CERT-2018-1675
dfn-cert: DFN-CERT-2018-1405
2 RESULTS PER HOST 244
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u251 ([Link]) and earlier, 8u241 ([Link]) and earlier, 11.0.6 and
earlier, 14.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Concurrency, Lightweight HTTP
Server, Serialization and Security.
References
cve: CVE-2020-2803
cve: CVE-2020-2805
cve: CVE-2020-2781
cve: CVE-2020-2830
cve: CVE-2020-2800
cve: CVE-2020-2773
cve: CVE-2020-2756
cve: CVE-2020-2757
. . . continues on next page . . .
2 RESULTS PER HOST 245
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw exists due to an error in the JavaFX component.
References
cve: CVE-2018-3209
url: [Link]
cert-bund: CB-K18/1010
dfn-cert: DFN-CERT-2018-2107
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to aect condentiality and integrity via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier, 10.0 on
Windows.
Vulnerability Insight
Multiple aws are due to multiple unspecied errors in 'Hotspot', 'Security', 'AWT', 'JMX' and
'Serialization' Java SE components
References
cve: CVE-2018-2814
cve: CVE-2018-2798
cve: CVE-2018-2797
cve: CVE-2018-2795
cve: CVE-2018-2790
cve: CVE-2018-2794
cve: CVE-2018-2815
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0821
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-1470
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-0724
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to aect condentiality and integrity via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 248
Vulnerability Insight
Multiple aws are due to multiple unspecied errors in 'Hotspot', 'Security', 'AWT', 'JMX' and
'Serialization' Java SE components
References
cve: CVE-2018-2814
cve: CVE-2018-2798
cve: CVE-2018-2797
cve: CVE-2018-2795
cve: CVE-2018-2790
cve: CVE-2018-2794
cve: CVE-2018-2815
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0821
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-1470
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-0724
Summary
Oracle Java SE is prone to a privilege escalation vulnerability.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw exists due to an error in the JavaFX component.
References
cve: CVE-2018-3209
url: [Link]
cert-bund: CB-K18/1010
dfn-cert: DFN-CERT-2018-2107
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 250
Aected Software/OS
Oracle Java SE version 8u251 ([Link]) and earlier.
Vulnerability Insight
The aw exists due to an error in the 'JavaFX' component.
References
cve: CVE-2020-14664
url: [Link]
cert-bund: WID-SEC-2022-1522
cert-bund: CB-K20/0715
dfn-cert: DFN-CERT-2020-1531
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-012.
Impact
Successful exploitation will allow an attacker to bypass security, obtain sensitive information,
run arbitrary code, cause the aected system to stop responding until it is manually restarted,
take control of the aected system. An attacker could then:
- install programs
- view, change, or delete data
- create new accounts with full user rights.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 251
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2016
Vulnerability Insight
Multiple aws are due to:
- The Device Guard does not properly validate certain elements of a signed PowerShell script.
- An improper handling of certain requests sent by a malicious SMB server to the client.
- Microsoft Windows fails to properly validate input before loading certain dynamic link library
(DLL) les.
- Windows dnsclient fails to properly handle requests.
- A DCOM object in [Link] congured to run as the interactive user fails to properly
authenticate the client.
- iSNS Server service fails to properly validate input from the client, leading to an integer overow.
References
cve: CVE-2017-0007
cve: CVE-2017-0016
cve: CVE-2017-0039
cve: CVE-2017-0057
cve: CVE-2017-0100
cve: CVE-2017-0104
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 252
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u241 ([Link]) and earlier, 8u231 ([Link]) and earlier, 11.0.5 and
earlier, 13.0.1.
Vulnerability Insight
Multiple aws are due to errors in components Serialization, JavaFX (libxslt), Networking, Li-
braries and Security.
References
. . . continues on next page . . .
2 RESULTS PER HOST 253
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 254
Aected Software/OS
Oracle Java SE version 7u241 ([Link]) and earlier, 8u231 ([Link]) and earlier, 11.0.5 and
earlier, 13.0.1.
Vulnerability Insight
Multiple aws are due to errors in components Serialization, JavaFX (libxslt), Networking, Li-
braries and Security.
References
cve: CVE-2020-2604
cve: CVE-2020-2601
cve: CVE-2020-2593
cve: CVE-2020-2654
cve: CVE-2020-2590
cve: CVE-2020-2583
url: [Link]
cert-bund: WID-SEC-2023-0234
cert-bund: WID-SEC-2023-0016
cert-bund: CB-K20/1075
cert-bund: CB-K20/0224
cert-bund: CB-K20/0139
cert-bund: CB-K20/0039
cert-bund: CB-K20/0027
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-1762
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-1561
dfn-cert: DFN-CERT-2020-1425
dfn-cert: DFN-CERT-2020-1276
dfn-cert: DFN-CERT-2020-0338
dfn-cert: DFN-CERT-2020-0283
dfn-cert: DFN-CERT-2020-0246
dfn-cert: DFN-CERT-2020-0097
dfn-cert: DFN-CERT-2020-0095
2 RESULTS PER HOST 255
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-072
Impact
Successful exploitation will allow an attacker to potentially escalate permissions or perform ad-
ditional privileged actions on the target machine.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
An elevation of privilege aw exists when Microsoft Windows processes group policy updates.
References
cve: CVE-2016-3223
url: [Link]
url: [Link]
cert-bund: CB-K16/0914
. . . continues on next page . . .
2 RESULTS PER HOST 256
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-007.
Impact
Successful exploitation will allow an attacker to gain access to the remote host as another user,
possibly with elevated privileges and to take complete control of an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- A security feature bypass vulnerability exists in Windows Remote Desktop Protocol, that is
caused when Windows hosts running RDP services fail to prevent remote logon to accounts that
have no passwords set.
- Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input
before loading dynamic link library (DLL) les.
References
cve: CVE-2016-0014
cve: CVE-2016-0015
cve: CVE-2016-0016
cve: CVE-2016-0018
cve: CVE-2016-0019
cve: CVE-2016-0020
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0057
dfn-cert: DFN-CERT-2016-0064
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to gain unauthorized access to critical data and take
control of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 258
References
cve: CVE-2025-30749
cve: CVE-2025-50106
cve: CVE-2025-30754
url: [Link]
cert-bund: WID-SEC-2025-1850
cert-bund: WID-SEC-2025-1569
dfn-cert: DFN-CERT-2025-3170
dfn-cert: DFN-CERT-2025-2550
dfn-cert: DFN-CERT-2025-2158
dfn-cert: DFN-CERT-2025-2099
dfn-cert: DFN-CERT-2025-2048
dfn-cert: DFN-CERT-2025-1900
dfn-cert: DFN-CERT-2025-1899
Summary
This host is missing a critical security update according to Microsoft KB4284826
Impact
Successful exploitation will allow an attacker to obtain information to further compromise the
user's system, run processes in an elevated context, inject code into a trusted PowerShell process,
execute arbitrary code, read privileged data, force the browser to send restricted data, install
programs and create a denial of service condition.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 259
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to errors,
- When Internet Explorer improperly accesses objects in memory.
- When the Windows kernel improperly handles objects in memory.
- When Windows improperly handles objects in memory.
- When the (Human Interface Device) HID Parser Library driver improperly handles objects in
memory.
- When NTFS improperly checks access.
- When Windows Media Foundation improperly handles objects in memory.
- In the way that the scripting engine handles objects in memory in Internet Explorer.
- When the Windows kernel fails to properly handle objects in memory.
- In Windows Domain Name System (DNS) DNSAPI.
- In the way that the Windows Code Integrity Module performs hashing.
References
cve: CVE-2018-0978
cve: CVE-2018-1036
cve: CVE-2018-1040
cve: CVE-2018-8169
cve: CVE-2018-8205
cve: CVE-2018-8207
cve: CVE-2018-8224
cve: CVE-2018-8225
cve: CVE-2018-8249
cve: CVE-2018-8251
cve: CVE-2018-8267
url: [Link]
cert-bund: CB-K18/0726
cert-bund: CB-K18/0724
dfn-cert: DFN-CERT-2018-1141
dfn-cert: DFN-CERT-2018-1137
2 RESULTS PER HOST 260
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to gain unauthorized access to critical data and take
control of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u451 and prior, 11.0.x through 11.0.27, 17.0.x through 17.0.15, 21.0.x
through 21.0.7 and 24.0.x through 24.0.1 on Windows
References
cve: CVE-2025-30749
cve: CVE-2025-50106
cve: CVE-2025-30754
url: [Link]
cert-bund: WID-SEC-2025-1850
cert-bund: WID-SEC-2025-1569
dfn-cert: DFN-CERT-2025-3170
dfn-cert: DFN-CERT-2025-2550
dfn-cert: DFN-CERT-2025-2158
dfn-cert: DFN-CERT-2025-2099
dfn-cert: DFN-CERT-2025-2048
dfn-cert: DFN-CERT-2025-1900
. . . continues on next page . . .
2 RESULTS PER HOST 261
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-087
Impact
Successful exploitation will allow an attacker to execute arbitrary code and take control of an
aected system, also allows local users to gain privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 for 32-bit/64-bit
Vulnerability Insight
Multiple aws exist due to
- When the Windows Print Spooler service improperly allows arbitrary writing to the le system.
- An improper validation of print drivers while installing a printer from servers.
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-106.
Impact
Successful exploitation will allow remote attackers to corrupt memory and potentially execute
arbitrary code in the context of the current user.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Internet Explorer version 7.x/8.x/9.x/10.x/11.x.
Vulnerability Insight
Multiple aws are due to:
- Multiple improper handling memory objects,
- Improper permissions validation, allowing a script to be run with elevated privileges.
- An error in 'CAttrArray' object implementation.
References
cve: CVE-2015-2482
cve: CVE-2015-6042
cve: CVE-2015-6044
cve: CVE-2015-6046
cve: CVE-2015-6047
cve: CVE-2015-6048
cve: CVE-2015-6049
cve: CVE-2015-6050
cve: CVE-2015-6051
cve: CVE-2015-6052
cve: CVE-2015-6053
cve: CVE-2015-6055
cve: CVE-2015-6056
cve: CVE-2015-6059
cve: CVE-2015-6184
url: [Link]
url: [Link]
cert-bund: CB-K15/1507
cert-bund: CB-K15/1504
dfn-cert: DFN-CERT-2015-1586
dfn-cert: DFN-CERT-2015-1583
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attacker to have an impact on
condentiality, integrity and availability
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 264
Aected Software/OS
Oracle Java SE version 7u211([Link]) and earlier, 8u202([Link]) and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in '2D' component of the Java SE
References
cve: CVE-2019-2698
cve: CVE-2019-2697
url: [Link]
,→l#AppendixJAVA
cert-bund: CB-K19/0658
cert-bund: CB-K19/0552
cert-bund: CB-K19/0317
dfn-cert: DFN-CERT-2019-1523
dfn-cert: DFN-CERT-2019-1107
dfn-cert: DFN-CERT-2019-0915
dfn-cert: DFN-CERT-2019-0887
dfn-cert: DFN-CERT-2019-0773
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 265
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u211([Link]) and earlier, 8u202([Link]) and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in '2D' component of the Java SE
References
cve: CVE-2019-2698
cve: CVE-2019-2697
url: [Link]
,→l#AppendixJAVA
cert-bund: CB-K19/0658
cert-bund: CB-K19/0552
cert-bund: CB-K19/0317
dfn-cert: DFN-CERT-2019-1523
dfn-cert: DFN-CERT-2019-1107
dfn-cert: DFN-CERT-2019-0915
dfn-cert: DFN-CERT-2019-0887
dfn-cert: DFN-CERT-2019-0773
NVT: Microsoft Edge and Internet Explorer Type Confusion RCE Vulnerability
Summary
Microsoft Edge or Internet Explorer is prone to a remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow an attacker to execute arbitrary code in the context of the
currently logged-in user. Failed attacks will cause denial of service conditions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012R2
- Microsoft Windows 10 Version 1511, 1607 x32/x64
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
Vulnerability Insight
The aw exists due to a type confusion issue in the 'Lay-
out::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement' function
in [Link].
References
cve: CVE-2017-0037
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0439
cert-bund: CB-K17/0436
cert-bund: CB-K17/0338
dfn-cert: DFN-CERT-2017-0450
dfn-cert: DFN-CERT-2017-0444
dfn-cert: DFN-CERT-2017-0348
2 RESULTS PER HOST 267
Summary
This host is missing a critical security update according to Microsoft KB4592471
Impact
Successful exploitation will allow an attacker to elevate privileges and disclose sensitive informa-
tion.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An error in the Backup Engine allows a local authenticated malicious user to gain elevated
privileges on the system.
- An error in Kerberos Security Feature.
- An error in the GDI+ component.
- An error in the SMBv2 component. Please see the references for more information about the
vulnerabilities.
References
cve: CVE-2020-16958
cve: CVE-2020-16959
cve: CVE-2020-16960
. . . continues on next page . . .
2 RESULTS PER HOST 268
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-090.
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode, and obtain
information to further compromise the user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 269
Vulnerability Insight
Multiple aws exist due to:
- When the Windows kernel-mode driver fails to properly handle objects in memory.
- When the Windows GDI component improperly discloses kernel memory addresses.
References
cve: CVE-2016-3249
cve: CVE-2016-3250
cve: CVE-2016-3251
cve: CVE-2016-3252
cve: CVE-2016-3254
cve: CVE-2016-3286
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1057
dfn-cert: DFN-CERT-2016-1125
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 270
Impact
Successful exploitation will allow an attacker to execute arbitrary code, obtain information to
further compromise the user's system, gain elevated privileges and break out of the Edge App-
Container sandbox and run processes in an elevated context.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist in Microsoft Scripting Engine, Windows Input and Composition, Windows
Media, Windows Storage and Filesystems, and Windows Server.
Please see the references for more information on the vulnerabilities.
References
cve: CVE-2020-0607
cve: CVE-2020-0608
cve: CVE-2020-0611
cve: CVE-2020-0615
cve: CVE-2020-0620
cve: CVE-2020-0625
cve: CVE-2020-0626
cve: CVE-2020-0627
cve: CVE-2020-0628
cve: CVE-2020-0629
cve: CVE-2020-0630
cve: CVE-2020-0631
. . . continues on next page . . .
2 RESULTS PER HOST 271
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-007.
Impact
Successful exploitation could allow remote attackers to cause a DoS (Denial of Service).
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2012/R2
Vulnerability Insight
The aw is due to an error within the RADIUS implementation related to Internet Authentication
Service (IAS) and Network Policy Server (NPS).
References
cve: CVE-2015-0015
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0038
dfn-cert: DFN-CERT-2015-0036
NVT: Microsoft Windows OLE Object Handling Code Execution Vulnerabilities (3011443)
Summary
This host is missing a critical security update according to Microsoft Bulletin MS14-064.
Impact
Successful exploitation will allow remote attacker to execute arbitrary code and compromise a
user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 273
References
cve: CVE-2014-6332
cve: CVE-2014-6352
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/1402
cert-bund: CB-K14/1321
dfn-cert: DFN-CERT-2014-1473
dfn-cert: DFN-CERT-2014-1390
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-044.
Impact
Successful exploitation will allow attackers to execute malicious code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 274
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
Vulnerability Insight
The aw is due to Microsoft Windows OLE fails to properly validate user input.
References
cve: CVE-2016-0153
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0546
dfn-cert: DFN-CERT-2016-0589
Summary
7zip is prone to a RAR Denial of Service Vulnerability.
Solution:
Solution type: VendorFix
Upgrade to 7zip version 18.05 or later.
. . . continues on next page . . .
2 RESULTS PER HOST 275
Aected Software/OS
7zip through version 18.03.
Vulnerability Insight
Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage
of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation
fault) or execute arbitrary code via a crafted RAR archive.
References
cve: CVE-2018-10115
url: [Link]
,→25&page=1#b240
cert-bund: CB-K18/0647
dfn-cert: DFN-CERT-2018-1416
dfn-cert: DFN-CERT-2018-0853
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-013.
Impact
Successful exploitation will allow an attacker to perform remote code execution, gain access to
potentially sensitive information and gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 276
Aected Software/OS
- Microsoft Windows 8 x86/x64
- Microsoft Windows XP SP2 x64 / SP3 x86
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10/1511/1607 x32/x64
- Microsoft Windows Server 2012/2012R2/2016
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to
- The way the Windows Graphics Device Interface (GDI) handles objects in memory.
- The Windows GDI component improperly discloses the contents of its memory.
- The way that the Color Management Module ([Link]) handles objects in memory.
References
cve: CVE-2017-0001
cve: CVE-2017-0005
cve: CVE-2017-0025
cve: CVE-2017-0047
cve: CVE-2017-0060
cve: CVE-2017-0062
cve: CVE-2017-0073
cve: CVE-2017-0061
cve: CVE-2017-0063
cve: CVE-2017-0038
cve: CVE-2017-0108
cve: CVE-2017-0014
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0443
cert-bund: CB-K17/0441
dfn-cert: DFN-CERT-2017-0454
dfn-cert: DFN-CERT-2017-0451
2 RESULTS PER HOST 277
Summary
This host is missing an important security update according to Microsoft KB4570506
Impact
Successful exploitation will allow an attacker to gain access to restricted les and take control of
an aected system
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft
Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
Multiple aws exist due to
- An error when [Link] or .NET web applications running on IIS improperly allow access to
cached les.
- An error when Microsoft .NET Framework processes input.
References
cve: CVE-2020-1476
cve: CVE-2020-1046
url: [Link]
cert-bund: CB-K20/0811
dfn-cert: DFN-CERT-2020-1773
2 RESULTS PER HOST 278
Summary
This host is missing a critical security update according to Microsoft KB4579977
Impact
Successful exploitation will allow an attacker to gain access to sensitive information and run
arbitrary code in the context of the process responsible for deserialization of the XML content.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft
Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
Multiple aws exist due to:
- An error in .NET Framework when the software fails to check the source markup of XML le
input.
- An error when the .NET Framework improperly handles objects in memory.
References
cve: CVE-2020-1147
cve: CVE-2020-16937
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: CB-K20/0983
. . . continues on next page . . .
2 RESULTS PER HOST 279
Summary
This host is missing a critical security update according to Microsoft KB4566517
Impact
Successful exploitation will allow an attacker to run arbitrary code in the context of the process
responsible for deserialization of the XML content.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft
Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
The aw exists due to an error in .NET Framework when the software fails to check the source
markup of XML le input.
References
. . . continues on next page . . .
2 RESULTS PER HOST 280
Summary
This host is missing a critical security update according to Microsoft KB4471318
Impact
Successful exploitation will allow attackers to run arbitrary code, elevate privileges and obtain
information to further compromise the user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- Windows kernel improperly handles objects in memory.
- Internet Explorer VBScript execution policy does not properly restrict VBScript under specic
conditions.
- Scripting engine improperly handles objects in memory in Internet Explorer.
- Windows kernel-mode driver fails to properly handle objects in memory.
- Internet Explorer improperly accesses objects in memory.
- Windows GDI component improperly discloses the contents of its memory.
. . . continues on next page . . .
2 RESULTS PER HOST 281
References
cve: CVE-2018-8477
cve: CVE-2018-8514
cve: CVE-2018-8611
cve: CVE-2018-8619
cve: CVE-2018-8621
cve: CVE-2018-8622
cve: CVE-2018-8625
cve: CVE-2018-8631
cve: CVE-2018-8639
cve: CVE-2018-8641
cve: CVE-2018-8643
cve: CVE-2018-8595
cve: CVE-2018-8596
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: CB-K18/1171
cert-bund: CB-K18/1166
dfn-cert: DFN-CERT-2018-2523
dfn-cert: DFN-CERT-2018-2520
Summary
This host is missing a critical security update according to Microsoft KB4338818
Impact
Successful exploitation will allow an attacker to bypass security, cause a target system to stop
responding, execute arbitrary code in the context of the current user and elevate privileges on
an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to errors,
- When Internet Explorer improperly accesses objects in memory.
- When Windows improperly handles File Transfer Protocol (FTP) connections.
- When the scripting engine improperly handles objects in memory in Internet Explorer.
- When Windows kernel-mode driver fails to properly handle objects in memory.
- When Windows Domain Name System (DNS) [Link] fails to properly handle DNS re-
sponses.
- When Microsoft WordPad improperly handles embedded OLE objects.
- When Windows fails a check, allowing a sandbox escape.
- Involving side channel speculative execution, known as Lazy FP State Restore.
References
cve: CVE-2018-8282
cve: CVE-2018-0949
cve: CVE-2018-8206
cve: CVE-2018-8242
cve: CVE-2018-8287
cve: CVE-2018-8288
cve: CVE-2018-8291
cve: CVE-2018-8296
cve: CVE-2018-8304
cve: CVE-2018-8307
cve: CVE-2018-8308
cve: CVE-2018-8309
. . . continues on next page . . .
2 RESULTS PER HOST 283
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 284
Impact
Successful exploitation will allow attackers to cause denial of service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
Flaw is due to an error within the TCP/IP stack when handling ICMPv6 packets.
References
cve: CVE-2013-3183
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-1468
Summary
This host is missing a critical security update according to Microsoft KB4074598
Impact
Successful exploitation will allow an attacker who successfully exploited the vulnerability to run
arbitrary code in the context of the current user, read data that was not intended to be disclosed,
gain the same user rights as the current user, obtain information to further compromise the user's
system, spoof content, perform phishing attacks, or otherwise manipulate content of a document.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- The software fails to properly handle objects in memory.
- The Microsoft Windows Embedded OpenType (EOT) font engine fails to properly parse spe-
cially crafted embedded fonts.
- The scripting engine improperly handles objects in memory.
- The Windows Common Log File System (CLFS) driver improperly handles objects in memory.
- The VBScript improperly discloses the contents of its memory.
- The Windows Kernel handles objects in memory.
- The Windows kernel fails to properly initialize a memory address.
- Microsoft has deprecated the Document Signing functionality in XPS Viewer.
References
cve: CVE-2018-0742
cve: CVE-2018-0755
cve: CVE-2018-0757
cve: CVE-2018-0760
cve: CVE-2018-0761
cve: CVE-2018-0810
. . . continues on next page . . .
2 RESULTS PER HOST 286
Summary
This host is missing an important security update according to Microsoft KB4056897
Impact
Successful exploitation will allow an attacker to execute arbitrary code and take control of an
aected system, elevate their user rights, gain access to sensitive data, bypass certain security
checks, impersonate processes, interject cross-process communication, interrupt system function-
ality and conduct bounds check bypass, branch target injection, rogue data cache load.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
Multiple aws exist due to:
- Multiple errors in Windows Adobe Type Manager Font Driver ([Link]) when it fails to
properly handle objects in memory.
- An error in the Windows GDI component which improperly discloses kernel memory addresses.
- An error in the Microsoft Server Message Block (SMB) Server when an attacker with valid
credentials attempts to open a specially crafted le over the SMB protocol on the same machine.
- An error in the way that the Windows Kernel API enforces permissions.
- An error in the Windows kernel that could allow an attacker to retrieve information that could
lead to a Kernel Address Space Layout Randomization (ASLR) bypass.
- An error in the way that the Color Management Module ([Link]) handles objects in memory.
- Multiple errors leading to 'speculative execution side-channel attacks' that aect many modern
processors and operating systems including Intel, AMD, and ARM.
References
cve: CVE-2018-0741
cve: CVE-2018-0747
cve: CVE-2018-0748
cve: CVE-2018-0749
cve: CVE-2018-0750
cve: CVE-2018-0754
cve: CVE-2018-0788
cve: CVE-2017-5753
cve: CVE-2017-5715
cve: CVE-2017-5754
url: [Link]
cert-bund: WID-SEC-2025-1212
cert-bund: WID-SEC-2024-2008
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-0103
cert-bund: WID-SEC-2022-1228
cert-bund: WID-SEC-2022-0532
cert-bund: CB-K20/0324
cert-bund: CB-K19/0774
cert-bund: CB-K18/1140
cert-bund: CB-K18/0898
cert-bund: CB-K18/0654
. . . continues on next page . . .
2 RESULTS PER HOST 288
Summary
This host is missing a critical security update according to Microsoft KB4048957
Impact
Successful exploitation will allow an attacker to read data that was not intended to be disclosed,
and obtain information to further compromise the user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 292
Vulnerability Insight
Multiple aws exist as,
- This security update includes improvements and resolves the following issues: Addressed issue
where applications based on the Microsoft JET Database Engine (Microsoft Access 2007 and
older or non-Microsoft applications) fail when creating or opening Microsoft Excel .xls les.
- Security updates to Microsoft Windows Search Component, Microsoft Graphics Component,
Windows kernel-mode drivers, Windows Media Player, and Windows kernel.
References
cve: CVE-2017-11869
cve: CVE-2017-11768
cve: CVE-2017-11788
cve: CVE-2017-11880
cve: CVE-2017-11791
cve: CVE-2017-11827
cve: CVE-2017-11834
cve: CVE-2017-11835
cve: CVE-2017-11837
cve: CVE-2017-11838
cve: CVE-2017-11843
cve: CVE-2017-11846
cve: CVE-2017-11847
cve: CVE-2017-11848
cve: CVE-2017-11849
cve: CVE-2017-11851
cve: CVE-2017-11852
cve: CVE-2017-11853
cve: CVE-2017-11855
cve: CVE-2017-11856
cve: CVE-2017-11858
cve: CVE-2017-11831
cve: CVE-2017-11832
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 293
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-008
Impact
Successful exploitation will allow an authenticated user to execute code with elevated privileges
that would allow them to install programs.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 294
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 10 x32/x64
Vulnerability Insight
Multiple aws are due to improper validation of reparse points being set by sandbox applications
References
cve: CVE-2016-0006
cve: CVE-2016-0007
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0057
dfn-cert: DFN-CERT-2016-0064
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-031
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 295
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
Vulnerability Insight
The aw is due to an imporper sanitization of handles in memory.
References
cve: CVE-2016-0087
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0383
dfn-cert: DFN-CERT-2016-0412
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-060
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 296
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
The aw exists when the Windows kernel fails to properly handle parsing of certain symbolic
links.
References
cve: CVE-2016-0180
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0701
dfn-cert: DFN-CERT-2016-0759
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-101.
Impact
Successful exploitation will allow attackers to bypass certain security restrictions and perform
unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- An elevation of privilege vulnerability exists when Windows Netlogon improperly establishes a
secure communications channel to a domain controller.
- An elevation of privilege vulnerability exists in Windows when Kerberos improperly handles a
password change request and falls back to NT LAN Manager (NTLM) Authentication Protocol
as the default authentication protocol.
References
cve: CVE-2016-3237
cve: CVE-2016-3300
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 298
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-130.
Impact
Successful exploitation will allow an attacker to run arbitrary code with elevated system privileges
or run a specially crafted application.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
Vulnerability Insight
Multiple aws exist due to
- The Windows Input Method Editor (IME) improperly handles DLL loading.
- The Windows Task Scheduler improperly schedule a new task.
- The Windows image le loading functionality does not properly handle malformed image les.
References
cve: CVE-2016-7221
cve: CVE-2016-7222
cve: CVE-2016-7212
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1747
dfn-cert: DFN-CERT-2016-1852
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-014.
Impact
Successful exploitation will allow an attacker to execute arbitrary code in kernel mode, to cause
denial of service conditions, to bypass authentication and can launch further attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 300
Vulnerability Insight
Multiple aws are due to:
- Windows kernel improperly handles objects in memory.
- Windows improperly validates input before loading dynamic link library (DLL) les.
- Insucient validation of input by Microsoft Sync Framework.
- Kerberos fails to check the password change of a user signing into a workstation.
- A security feature bypass vulnerability exists in Windows Remote Desktop Protocol, that is
caused when Windows hosts running RDP services fail to prevent remote logon to accounts that
have no passwords set.
- Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input
before loading dynamic link library (DLL) les.
References
cve: CVE-2016-0040
cve: CVE-2016-0041
cve: CVE-2016-0042
cve: CVE-2016-0044
cve: CVE-2016-0049
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0222
cert-bund: CB-K16/0220
dfn-cert: DFN-CERT-2016-0249
dfn-cert: DFN-CERT-2016-0242
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-014.
Impact
Successful exploitation will allow an attacker to execute arbitrary code in kernel mode, to cause
denial of service conditions, to bypass authentication and can launch further attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- Windows kernel improperly handles objects in memory.
- Windows improperly validates input before loading dynamic link library (DLL) les.
- Insucient validation of input by Microsoft Sync Framework.
- Kerberos fails to check the password change of a user signing into a workstation.
- A security feature bypass vulnerability exists in Windows Remote Desktop Protocol, that is
caused when Windows hosts running RDP services fail to prevent remote logon to accounts that
have no passwords set.
- Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input
before loading dynamic link library (DLL) les.
References
cve: CVE-2016-0040
cve: CVE-2016-0041
. . . continues on next page . . .
2 RESULTS PER HOST 302
Summary
This host has IExpress bundled with Microsoft Windows and is prone to an untrusted search
path vulnerability.
Impact
Successful exploitation will allow an attacker to execute arbitrary code with the privilege of the
user invoking a vulnerable self-extracting archive le.
Solution:
Solution type: Workaround
As a workaround save self-extracting archive les into a newly created directory, and conrm
there are no unrelated les in the directory and make sure there are no suspicious les in the
directory where self-extracting archive les are saved.
Aected Software/OS
IExpress bundled with Microsoft Windows
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 303
References
cve: CVE-2018-0598
url: [Link]
url: [Link]
,→vulnerability
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-106.
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode, to retrieve
information from a targeted system, also could take control of the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 304
Vulnerability Insight
Multiple aws are due to:
- The way that certain Windows kernel-mode drivers handle objects in memory.
- The way that the Windows Graphics Device Interface handles objects in memory.
References
cve: CVE-2016-3348
cve: CVE-2016-3349
cve: CVE-2016-3354
cve: CVE-2016-3355
cve: CVE-2016-3356
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1406
dfn-cert: DFN-CERT-2016-1483
Summary
This host is missing a critical security update according to Microsoft Bulletin MS13-053.
Impact
Successful exploitation will allow remote attackers to cause a buer overow and execute arbitrary
code with kernel privileges.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 305
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to:
- Unspecied errors within the Windows kernel-mode driver ([Link]) when processing certain
objects and can be exploited to cause a crash or execute arbitrary code with the kernel privilege.
- An error exists within the GDI+ subsystem.
References
cve: CVE-2013-1300
cve: CVE-2013-1340
cve: CVE-2013-1345
cve: CVE-2013-3129
cve: CVE-2013-3167
cve: CVE-2013-3172
cve: CVE-2013-3173
cve: CVE-2013-3660
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 306
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-075.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with elevated per-
missions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012 R2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
Vulnerability Insight
An elevation of privilege aw exists in the Microsoft Server Message Block (SMB) when an
attacker forwards an authentication request intended for another service running on the same
machine.
References
cve: CVE-2016-3225
url: [Link]
url: [Link]
cert-bund: CB-K16/0914
dfn-cert: DFN-CERT-2016-0969
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-018.
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode. An attacker
could then:
- install programs
- view, change, or delete data
- create new accounts with full user rights.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 308
Vulnerability Insight
Multiple aws exist when the Windows kernel-mode driver fails to properly handle objects in
memory.
References
cve: CVE-2017-0024
cve: CVE-2017-0026
cve: CVE-2017-0056
cve: CVE-2017-0078
cve: CVE-2017-0079
cve: CVE-2017-0080
cve: CVE-2017-0081
cve: CVE-2017-0082
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0443
dfn-cert: DFN-CERT-2017-0451
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-123.
Impact
Successful exploitation will allow an attacker could run arbitrary code in kernel mode. An
attacker could then install programs view, change, or delete data, or create new accounts with
full user rights, and take control over the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
Vulnerability Insight
Multiple aws exist due to:
- The kernel-mode driver fails to properly handle objects in memory.
- The Windows Transaction Manager improperly handles objects in memory.
References
cve: CVE-2016-3266
cve: CVE-2016-3376
cve: CVE-2016-7185
cve: CVE-2016-7211
cve: CVE-2016-3341
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 310
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-135
Impact
Successful exploitation will allow an attacker to retrieve the memory address of a kernel object,
run arbitrary code in kernel mode and to log on to an aected system and runs a specially crafted
application that could exploit the vulnerabilities and take control of an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws exist due to:
- A kernel Address Space Layout Randomization (ASLR) bypass error.
- The windows kernel-mode driver fails to properly handle objects in memory.
. . . continues on next page . . .
2 RESULTS PER HOST 311
References
cve: CVE-2016-7214
cve: CVE-2016-7215
cve: CVE-2016-7218
cve: CVE-2016-7246
cve: CVE-2016-7255
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1747
dfn-cert: DFN-CERT-2016-1852
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-135.
Impact
Successful exploitation will allow an attacker to execute arbitrary code in kernel mode with
elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 312
Vulnerability Insight
Multiple aws are due to:
- Multiple local privilege escalation vulnerabilities.
- Multiple remote code execution vulnerabilities when the Windows font library improperly
handles specially crafted embedded fonts
References
cve: CVE-2015-6171
cve: CVE-2015-6173
cve: CVE-2015-6174
cve: CVE-2015-6175
cve: CVE-2015-6106
cve: CVE-2015-6107
cve: CVE-2015-6108
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1804
dfn-cert: DFN-CERT-2015-1903
2 RESULTS PER HOST 313
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-017
Impact
Successful exploitation will allow an attacker to gain elevated privileges on a targeted system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2016
Vulnerability Insight
Multiple aws exist as,
- Windows kernel API enforces permissions.
- Windows Transaction Manager improperly handles objects in memory.
References
cve: CVE-2017-0050
. . . continues on next page . . .
2 RESULTS PER HOST 314
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-111
Impact
Successful exploitation will allow local attackers to hijack the session of another user and to gain
access to information that is not intended for the user and to impersonate processes, interject
cross-process communication, or interrupt sslystem functionality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
. . . continues on next page . . .
2 RESULTS PER HOST 315
Vulnerability Insight
Multiple aws exist due to:
- The kernel API improperly allows a user to access sensitive registry information.
- The kernel API improperly enforces permissions.
- Windows improperly handles session objects
References
cve: CVE-2016-3305
cve: CVE-2016-3306
cve: CVE-2016-3371
cve: CVE-2016-3372
cve: CVE-2016-3373
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1406
dfn-cert: DFN-CERT-2016-1483
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-151
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2016
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws exist due to:
- The Windows Graphics Component improperly handles objects in memory.
- The Windows kernel-mode driver fails to properly handle objects in memory.
References
cve: CVE-2016-7259
cve: CVE-2016-7260
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1959
dfn-cert: DFN-CERT-2016-2066
2 RESULTS PER HOST 317
Summary
This host is missing a critical security update according to Microsoft KB4100480
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode which will
empower them to install programs, view, change, delete data or create new accounts with full
user rights.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
The aw exists due to Windows kernel failing to properly handle objects in memory.
References
cve: CVE-2018-1038
url: [Link]
url: [Link]
cert-bund: CB-K18/0558
dfn-cert: DFN-CERT-2018-0609
2 RESULTS PER HOST 318
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-032.
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
The aw exists in Windows when the Secondary Logon Service fails to properly manage request
handles in memory.
References
cve: CVE-2016-0099
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 319
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-149.
Impact
Successful exploitation will allow attackers to obtain information to further compromise the
user's system, run arbitrary code with elevated system privileges. An attacker could then install
programs, view, change, or delete data or create new accounts with full user rights.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2016
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
Vulnerability Insight
Multiple aws exist due to:
- The windows Crypto driver running in kernel mode improperly handles objects in memory.
. . . continues on next page . . .
2 RESULTS PER HOST 320
References
cve: CVE-2016-7219
cve: CVE-2016-7292
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1959
dfn-cert: DFN-CERT-2016-2066
Summary
This host is missing a moderate security update according to Microsoft Bulletin MS14-078.
Impact
Successful exploitation will allow remote attacker to bypass a sandbox protection mechanism via
a crafted PDF document.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 321
Vulnerability Insight
Error in '[Link]', which allow remote attackers to bypass a sandbox protection mech-
anism via a crafted PDF document. Aka 'Microsoft IME (Japanese) Elevation of Privilege
Vulnerability' as exploited in the wild in 2014.
References
cve: CVE-2014-4077
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→[Link]
cert-bund: CB-K14/1402
cert-bund: CB-K14/1397
dfn-cert: DFN-CERT-2014-1473
dfn-cert: DFN-CERT-2014-1470
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-074.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 322
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
Multiple aws are due to:
- the Windows Graphics Component ([Link]) fails to properly handle objects in memory.
- the Windows improperly handles objects in memory.
- Adobe Type Manager Font Driver ([Link]) when it fails to properly handle objects in
memory.
References
cve: CVE-2016-3216
cve: CVE-2016-3219
cve: CVE-2016-3220
url: [Link]
url: [Link]
cert-bund: CB-K16/0914
dfn-cert: DFN-CERT-2016-0969
2 RESULTS PER HOST 323
Summary
This host is missing an important security update according to Microsoft advisory (2861855).
Impact
Successful exploitation will allow remote attackers to bypass the security.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw is due to security issue in Network-level Authentication (NLA) method in Remote
Desktop Sessions.
References
url: [Link]
url: [Link]
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-005.
. . . continues on next page . . .
2 RESULTS PER HOST 324
Impact
Successful exploitation will allow remote attackers to gain restricted privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
The aw is due to an error when handling directory traversal sequences within the TS WebProxy
Windows component, which can be exploited to gain otherwise restricted privileges.
References
cve: CVE-2015-0016
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0038
dfn-cert: DFN-CERT-2015-0036
2 RESULTS PER HOST 325
NVT: Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability
(3193706)
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-134.
Impact
Successful exploitation will allow an attacker to run processes in an elevated context.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
Vulnerability Insight
The aw exists due to windows common log le system (CLFS) driver improperly handles objects
in memory.
References
cve: CVE-2016-0026
. . . continues on next page . . .
2 RESULTS PER HOST 326
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-137.
Impact
Successful exploitation will allow a locally-authenticated to read sensitive information on the
target system, cause the target system to become non-responsive and elevate their permissions
from unprivileged to administrator which thereby allows him/her to install programs, view,
change or delete data, or create new accounts.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 327
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws exist due to:
- The windows Virtual Secure Mode improperly handles objects in memory.
- A denial of service vulnerability in the Local Security Authority Subsystem Service (LSASS).
- The windows fails to properly handle NTLM password change requests.
References
cve: CVE-2016-7238
cve: CVE-2016-7237
cve: CVE-2016-7220
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1747
dfn-cert: DFN-CERT-2016-1852
Summary
7zip is prone to a zstandard decompression integer underow vulnerability.
Impact
Successful exploitation allows an attacker to perform remote code execution.
Solution:
Solution type: VendorFix
Update to version 24.07 or later.
Aected Software/OS
7zip version prior to 24.07 on Windows.
Vulnerability Insight
The aw exists due to lack of input data validation in the Zstandard decompression feature in
7-Zip.
References
cve: CVE-2024-11477
url: [Link]
cert-bund: WID-SEC-2024-3512
dfn-cert: DFN-CERT-2025-1015
dfn-cert: DFN-CERT-2024-3119
Summary
7zip is prone to a qcow handler innite loop denial of service (DoS) vulnerability.
Impact
Successful exploitation allows an attacker to conduct denial of service attacks.
Solution:
Solution type: VendorFix
Update to version 24.08 or later.
Aected Software/OS
7zip version prior to 24.08 on Windows.
Vulnerability Insight
The aw exists due to an innite loop in the CopyCoder processing streams.
References
cve: CVE-2024-11612
url: [Link]
cert-bund: WID-SEC-2025-0818
cert-bund: WID-SEC-2024-3527
dfn-cert: DFN-CERT-2025-0974
dfn-cert: DFN-CERT-2025-0509
dfn-cert: DFN-CERT-2025-0228
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-073.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 330
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
Multiple aws exist due to:
- When the Windows kernel-mode driver fails to properly handle objects in memory.
- When the Windows Virtual PCI (VPCI) virtual service provider (VSP) fails to properly handle
uninitialized memory.
References
cve: CVE-2016-3218
cve: CVE-2016-3221
cve: CVE-2016-3232
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0914
dfn-cert: DFN-CERT-2016-0969
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 331
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode, and to take
control over the aected system, also could retrieve the memory address of a kernel object.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
Multiple aws exist due to:
- When the Windows kernel-mode driver fails to properly handle objects in memory and incor-
rectly maps kernel memory
- When the DirectX Graphics kernel subsystem ([Link]) improperly handles objects in
memory.
References
cve: CVE-2016-0171
cve: CVE-2016-0173
cve: CVE-2016-0174
cve: CVE-2016-0196
cve: CVE-2016-0175
. . . continues on next page . . .
2 RESULTS PER HOST 332
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-034.
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
The aws exist in Windows when the Windows kernel-mode driver fails to properly handle objects
in memory.
References
cve: CVE-2016-0093
cve: CVE-2016-0094
cve: CVE-2016-0095
cve: CVE-2016-0096
url: [Link]
url: [Link]
cert-bund: CB-K16/0383
dfn-cert: DFN-CERT-2016-0412
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-098.
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode, and obtain
information to further compromise the user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
. . . continues on next page . . .
2 RESULTS PER HOST 334
Vulnerability Insight
Multiple aws exist when the Windows kernel-mode driver fails to properly handle objects in
memory.
References
cve: CVE-2016-3308
cve: CVE-2016-3309
cve: CVE-2016-3310
cve: CVE-2016-3311
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1216
dfn-cert: DFN-CERT-2016-1300
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-018.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 335
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
The aw exists in Windows when the Windows kernel-mode driver fails to properly handle objects
in memory.
References
url: [Link]
cve: CVE-2016-0048
url: [Link]
cert-bund: CB-K16/0220
dfn-cert: DFN-CERT-2016-0242
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-131.
Impact
Successful exploitation will allow an attacker to run arbitrary code in the context of the current
user.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
Vulnerability Insight
The aw exists due to microsoft video control fails to properly handle objects in memory.
References
cve: CVE-2016-7248
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1747
dfn-cert: DFN-CERT-2016-1852
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-018.
Impact
Successful exploitation could allow attackers to exhaust the non-paged pool and render the system
unusable or trigger a restart.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
The aw is due to an error within the TCP/IP stack, which remains in TCP FIN_WAIT_2
state after receiving an ACK to the FIN packet when handling a tear down sequence.
References
cve: CVE-2013-0075
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→13-018
dfn-cert: DFN-CERT-2013-0293
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-077.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode
privileges and take complete control of the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
An elevation of privilege vulnerability exists in Adobe Type Manager Font Driver (ATMFD)
when it fails to properly handle objects in memory.
References
cve: CVE-2015-2387
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1013
. . . continues on next page . . .
2 RESULTS PER HOST 339
Summary
OpenSSH is prone to multiple vulnerabilities.
Impact
Successfully exploiting this issue allows local users to obtain sensitive private-key information,
to gain privileges, conduct a senial-of-service condition and allows remote attackers to execute
arbitrary local PKCS#11 modules.
Solution:
Solution type: VendorFix
Update to version 7.4 or later.
Aected Software/OS
OpenSSH versions before 7.4 on Windows.
Vulnerability Insight
Multiple aws exist due to:
- An 'authle.c' script does not properly consider the eects of realloc on buer contents.
- The shared memory manager (associated with pre-authentication compression) does not ensure
that a bounds check is enforced by all compilers.
- The sshd in OpenSSH creates forwarded Unix-domain sockets as root, when privilege separation
is not used.
- An untrusted search path vulnerability in ssh-agent.c in ssh-agent.
- NULL pointer dereference error due to an out-of-sequence NEWKEYS message.
References
cve: CVE-2016-10009
cve: CVE-2016-10010
cve: CVE-2016-10011
cve: CVE-2016-10012
cve: CVE-2016-10708
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→3e6b931de1d16737
cert-bund: WID-SEC-2023-1996
cert-bund: CB-K18/0919
cert-bund: CB-K18/0591
cert-bund: CB-K18/0137
cert-bund: CB-K18/0041
cert-bund: CB-K17/2219
cert-bund: CB-K17/2112
cert-bund: CB-K17/1292
cert-bund: CB-K17/1061
cert-bund: CB-K17/0527
cert-bund: CB-K17/0377
cert-bund: CB-K17/0127
cert-bund: CB-K17/0041
cert-bund: CB-K16/1991
dfn-cert: DFN-CERT-2021-0776
dfn-cert: DFN-CERT-2019-1408
dfn-cert: DFN-CERT-2018-2259
dfn-cert: DFN-CERT-2018-2191
dfn-cert: DFN-CERT-2018-2068
dfn-cert: DFN-CERT-2018-1828
dfn-cert: DFN-CERT-2018-1568
. . . continues on next page . . .
2 RESULTS PER HOST 341
Summary
OpenSSH is prone to multiple vulnerabilities.
Impact
Successfully exploiting this issue allows local users to obtain sensitive private-key information,
to gain privileges, conduct a senial-of-service condition and allows remote attackers to execute
arbitrary local PKCS#11 modules.
Solution:
Solution type: VendorFix
Update to version 7.4 or later.
Vulnerability Insight
Multiple aws exist due to:
- An 'authle.c' script does not properly consider the eects of realloc on buer contents.
- The shared memory manager (associated with pre-authentication compression) does not ensure
that a bounds check is enforced by all compilers.
- The sshd in OpenSSH creates forwarded Unix-domain sockets as root, when privilege separation
is not used.
- An untrusted search path vulnerability in ssh-agent.c in ssh-agent.
- NULL pointer dereference error due to an out-of-sequence NEWKEYS message.
References
cve: CVE-2016-10009
cve: CVE-2016-10010
cve: CVE-2016-10011
cve: CVE-2016-10012
cve: CVE-2016-10708
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→3e6b931de1d16737
cert-bund: WID-SEC-2023-1996
cert-bund: CB-K18/0919
cert-bund: CB-K18/0591
cert-bund: CB-K18/0137
cert-bund: CB-K18/0041
cert-bund: CB-K17/2219
cert-bund: CB-K17/2112
. . . continues on next page . . .
2 RESULTS PER HOST 343
Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-024.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code as the logged-on
user.
Aected Software/OS
- Microsoft Windows 7 Service Pack 1 and prior
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows 2003 Service Pack 2 and prior
- Microsoft Windows Vista Service Pack 2 and prior
- Microsoft Windows Server 2008 Service Pack 2 and prior
Vulnerability Insight
The aw is due to the way Windows Authenticode Signature Verication function veries portable
executable (PE) les, which can be exploited to add malicious code to the le without invalidating
the signature.
References
cve: CVE-2012-0151
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→12-024
dfn-cert: DFN-CERT-2012-0654
Summary
This host is missing an important security update according to Microsoft KB4565354
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
The aw exists due to Windows Modules Installer fails to properly handle le operations.
Please see the references for more information on the vulnerabilities.
References
cve: CVE-2020-1346
url: [Link]
cert-bund: CB-K20/0692
dfn-cert: DFN-CERT-2020-1515
Summary
This host is missing an important security update according to Microsoft KB5010404
Impact
Successful exploitation will allow an attacker to elevate privileges, disclose sensitive information,
and conduct DoS attacks.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An elevation of privilege vulnerability in Windows Print Spooler.
- An information disclosure vulnerability in Windows Common Log File System Driver.
- An elevation of privilege vulnerability in Windows Common Log File System Driver.
Please see the references for more information about the vulnerabilities.
References
cve: CVE-2022-21981
cve: CVE-2022-21985
cve: CVE-2022-21989
cve: CVE-2022-21997
cve: CVE-2022-21998
cve: CVE-2022-21999
cve: CVE-2022-22000
cve: CVE-2022-22710
cve: CVE-2022-22717
cve: CVE-2022-22718
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
cert-bund: WID-SEC-2022-1174
cert-bund: CB-K22/0160
dfn-cert: DFN-CERT-2022-0306
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 347
Impact
Successful exploitation will allow remote attackers to aect condentiality, integrity, and avail-
ability via unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, 10.0 on Windows
Vulnerability Insight
The aw exists due to an unspecied error in 'Java SE' component.
References
cve: CVE-2018-2811
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-0724
Summary
Oracle Java SE is prone to a remote unspecied security vulnerability.
Impact
Successful exploitation will allow remote attackers to aect condentiality, integrity, and avail-
ability via unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, 10.0 on Windows
Vulnerability Insight
The aw exists due to an unspecied error in 'Java SE' component.
References
cve: CVE-2018-2811
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-0724
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-039
Impact
Successful exploitation will allow remote attackers to gain escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
Vulnerability Insight
The aw is triggered when executing the On-Screen keyboard from within the context of a low
integrity process.
References
cve: CVE-2014-2781
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0838
dfn-cert: DFN-CERT-2014-0878
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 350
Impact
Successful exploitation will allow an attacker who successfully exploited this vulnerability to exe-
cute code on the target system, gain the same user rights as the current user, obtain information
to further compromise the user's system and could attempt a brute-force attack to disclose the
password.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- An error in RPC if the server has Routing and Remote Access enabled.
- Internet Explorer improperly accesses objects in memory.
- Internet Explorer improperly handles objects in memory.
- Scripting engine handles objects in memory in Microsoft browsers.
- Windows its:// protocol handler unnecessarily sends trac to a remote site in order to determine
the zone of a provided URL.
References
cve: CVE-2017-11885
cve: CVE-2017-11886
cve: CVE-2017-11887
cve: CVE-2017-11890
cve: CVE-2017-11894
cve: CVE-2017-11895
cve: CVE-2017-11901
. . . continues on next page . . .
2 RESULTS PER HOST 351
Summary
This host is missing a critical security update according to Microsoft KB4088875
Impact
Successful exploitation will allow attacker to gain access to information, crash server and run
arbitrary code in system mode.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Multiple aws exist due to:
- When Windows Hyper-V on a host operating system fails to properly validate input from an
authenticated user on a guest operating system.
- The way that the scripting engine handles objects in memory in Internet Explorer.
- When Microsoft Hyper-V Network Switch on a host server fails to properly validate input from
a privileged user on a guest operating system.
- The Credential Security Support Provider protocol (CredSSP).
- Windows when the Microsoft Video Control mishandles objects in memory.
- When Windows Shell does not properly validate le copy destinations.
- When Internet Explorer fails a check, allowing sandbox escape.
- The Windows kernel that could allow an attacker to retrieve information that could lead to a
Kernel Address Space Layout Randomization (ASLR) bypass.
- The Windows Installer when the Windows Installer fails to properly sanitize input leading to
an insecure library loading behavior.
- When the Windows kernel improperly initializes objects in memory.
- When Windows Remote Assistance incorrectly processes XML External Entities (XXE).
- The way that the Windows Graphics Device Interface (GDI) handles objects in memory.
References
cve: CVE-2018-0811
cve: CVE-2018-0813
cve: CVE-2018-0814
cve: CVE-2018-0815
cve: CVE-2018-0886
cve: CVE-2018-0888
. . . continues on next page . . .
2 RESULTS PER HOST 353
Summary
7zip is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to execute code in the context of a service account and
conduct denial of service attacks.
Solution:
Solution type: VendorFix
Update to version 25.0.0 or later.
Aected Software/OS
7zip prior to version 25.0.0 on Windows.
References
cve: CVE-2025-53816
cve: CVE-2025-53817
cve: CVE-2025-11001
cve: CVE-2025-11002
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-2359
cert-bund: WID-SEC-2025-2261
cert-bund: WID-SEC-2025-1590
dfn-cert: DFN-CERT-2025-2990
dfn-cert: DFN-CERT-2025-2941
NVT: Microsoft VBScript Scripting Engine OLE Automation Memory Corruption Vulnerability
(3188724)
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-116
Impact
Successful exploitation will allow remote attacker to execute arbitrary code in the context of the
current user.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
The aw is due to an improper way of accessing objects in the memory by Microsoft OLE
Automation mechanism and the VBScript Scripting Engine in Internet Explorer.
References
cve: CVE-2016-3375
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1406
cert-bund: CB-K16/1403
dfn-cert: DFN-CERT-2016-1484
dfn-cert: DFN-CERT-2016-1483
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-019.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft .NET Framework 2.0 Service Pack 2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4.5.2
- Microsoft .NET Framework 4.6 and 4.6.1
Vulnerability Insight
Multiple aws exist as,
- Application fails to properly handle certain Extensible Stylesheet Language Transformations
(XSLT).
- The .NET's Windows Forms (WinForms) improperly handles icon data.
References
cve: CVE-2016-0033
cve: CVE-2016-0047
url: [Link]
url: [Link]
cert-bund: CB-K16/0220
dfn-cert: DFN-CERT-2016-0242
NVT: Apache Log4j 1.2.x RCE Vulnerability (Windows, Dec 2021) - Version Check
Summary
Apache Log4j is prone to a remote code execution (RCE) vulnerability in JMSAppender.
Solution:
Solution type: WillNotFix
No solution was made available by the vendor.
Note: Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as
it addresses numerous other issues from the previous versions.
Aected Software/OS
Apache Log4j version 1.2.x.
Vulnerability Insight
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker
has write access to the Log4j conguration. The attacker can provide TopicBindingName and
TopicConnectionFactoryBindingName congurations causing JMSAppender to perform JNDI
requests that result in remote code execution in a similar fashion to CVE-2021-44228.
Note this issue only aects Log4j 1.2 when specically congured to use JMSAppender, which
is not the default.
References
cve: CVE-2021-4104
url: [Link]
cert-bund: WID-SEC-2024-1926
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0107
cert-bund: WID-SEC-2023-1807
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-1770
cert-bund: WID-SEC-2022-1189
cert-bund: WID-SEC-2022-1015
cert-bund: WID-SEC-2022-0927
cert-bund: WID-SEC-2022-0628
cert-bund: WID-SEC-2022-0520
cert-bund: CB-K22/0066
cert-bund: CB-K21/1291
dfn-cert: DFN-CERT-2025-2802
. . . continues on next page . . .
2 RESULTS PER HOST 359
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 360
Vulnerability Insight
Multiple aws are due to unspecied errors in 'Libraries', 'JAXP' and 'JNDI' components.
References
cve: CVE-2022-21449
cve: CVE-2022-21476
cve: CVE-2022-21426
cve: CVE-2022-21496
cve: CVE-2022-21434
cve: CVE-2022-21443
url: [Link]
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2164
cert-bund: WID-SEC-2023-0840
cert-bund: WID-SEC-2022-1434
cert-bund: WID-SEC-2022-1335
cert-bund: WID-SEC-2022-1321
cert-bund: WID-SEC-2022-1228
cert-bund: WID-SEC-2022-1066
cert-bund: WID-SEC-2022-0987
cert-bund: WID-SEC-2022-0871
cert-bund: WID-SEC-2022-0858
cert-bund: WID-SEC-2022-0833
cert-bund: WID-SEC-2022-0446
cert-bund: WID-SEC-2022-0398
cert-bund: WID-SEC-2022-0300
cert-bund: WID-SEC-2022-0287
cert-bund: WID-SEC-2022-0200
cert-bund: WID-SEC-2022-0028
cert-bund: CB-K22/0470
dfn-cert: DFN-CERT-2024-2151
dfn-cert: DFN-CERT-2023-1425
dfn-cert: DFN-CERT-2023-1197
dfn-cert: DFN-CERT-2023-1174
dfn-cert: DFN-CERT-2023-1139
dfn-cert: DFN-CERT-2023-0846
dfn-cert: DFN-CERT-2023-0819
dfn-cert: DFN-CERT-2022-1955
. . . continues on next page . . .
2 RESULTS PER HOST 361
NVT: OpenSSH < 7.3 DoS and User Enumeration Vulnerabilities - Windows
Summary
OpenSSH is prone to denial of service (DoS) and user enumeration vulnerabilities.
Impact
Successfully exploiting this issue allows remote attackers to cause a denial of service (crypt CPU
consumption) and to enumerate users by leveraging the timing dierence between responses when
a large password is provided.
Solution:
Solution type: VendorFix
Update to version 7.3 or later.
Aected Software/OS
OpenSSH versions before 7.3 on Windows.
Vulnerability Insight
Multiple aws exist due to:
. . . continues on next page . . .
2 RESULTS PER HOST 362
References
cve: CVE-2016-6515
cve: CVE-2016-6210
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-0450
cert-bund: WID-SEC-2023-0449
cert-bund: CB-K18/0041
cert-bund: CB-K17/2219
cert-bund: CB-K17/2112
cert-bund: CB-K17/1753
cert-bund: CB-K17/1349
cert-bund: CB-K17/1292
cert-bund: CB-K17/0055
cert-bund: CB-K16/1837
cert-bund: CB-K16/1629
cert-bund: CB-K16/1487
cert-bund: CB-K16/1485
cert-bund: CB-K16/1252
cert-bund: CB-K16/1221
cert-bund: CB-K16/1082
dfn-cert: DFN-CERT-2023-1920
dfn-cert: DFN-CERT-2019-1408
dfn-cert: DFN-CERT-2018-1828
dfn-cert: DFN-CERT-2018-1070
dfn-cert: DFN-CERT-2018-0046
. . . continues on next page . . .
2 RESULTS PER HOST 363
NVT: OpenSSH < 7.3 DoS and User Enumeration Vulnerabilities - Windows
Summary
OpenSSH is prone to denial of service (DoS) and user enumeration vulnerabilities.
Impact
Successfully exploiting this issue allows remote attackers to cause a denial of service (crypt CPU
consumption) and to enumerate users by leveraging the timing dierence between responses when
a large password is provided.
Solution:
Solution type: VendorFix
Update to version 7.3 or later.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 364
Vulnerability Insight
Multiple aws exist due to:
- The auth_password function in 'auth-passwd.c' script does not limit password lengths for
password authentication.
- The sshd in OpenSSH, when SHA256 or SHA512 are used for user password hashing uses
BLOWFISH hashing on a static password when the username does not exist and it takes much
longer to calculate SHA256/SHA512 hash than BLOWFISH hash.
References
cve: CVE-2016-6515
cve: CVE-2016-6210
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-0450
cert-bund: WID-SEC-2023-0449
cert-bund: CB-K18/0041
cert-bund: CB-K17/2219
cert-bund: CB-K17/2112
cert-bund: CB-K17/1753
cert-bund: CB-K17/1349
cert-bund: CB-K17/1292
cert-bund: CB-K17/0055
cert-bund: CB-K16/1837
cert-bund: CB-K16/1629
cert-bund: CB-K16/1487
cert-bund: CB-K16/1485
cert-bund: CB-K16/1252
cert-bund: CB-K16/1221
cert-bund: CB-K16/1082
dfn-cert: DFN-CERT-2023-1920
. . . continues on next page . . .
2 RESULTS PER HOST 365
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-019.
Impact
Successful exploitation will allow remote attackers to gain access to sensitive information or
disrupt the availability of applications that use the .NET framework.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft .NET Framework 2.0 Service Pack 2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4.5.2
. . . continues on next page . . .
2 RESULTS PER HOST 366
Vulnerability Insight
Multiple aws exist as,
- Application fails to properly handle certain Extensible Stylesheet Language Transformations
(XSLT).
- The .NET's Windows Forms (WinForms) improperly handles icon data.
References
cve: CVE-2016-0033
cve: CVE-2016-0047
url: [Link]
url: [Link]
cert-bund: CB-K16/0220
dfn-cert: DFN-CERT-2016-0242
NVT: Apache Log4j 1.2.x RCE Vulnerability (Windows, Dec 2021) - Version Check
Summary
Apache Log4j is prone to a remote code execution (RCE) vulnerability in JMSAppender.
Solution:
Solution type: WillNotFix
No solution was made available by the vendor.
Note: Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as
it addresses numerous other issues from the previous versions.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 367
Vulnerability Insight
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker
has write access to the Log4j conguration. The attacker can provide TopicBindingName and
TopicConnectionFactoryBindingName congurations causing JMSAppender to perform JNDI
requests that result in remote code execution in a similar fashion to CVE-2021-44228.
Note this issue only aects Log4j 1.2 when specically congured to use JMSAppender, which
is not the default.
References
cve: CVE-2021-4104
url: [Link]
cert-bund: WID-SEC-2024-1926
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0107
cert-bund: WID-SEC-2023-1807
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-1770
cert-bund: WID-SEC-2022-1189
cert-bund: WID-SEC-2022-1015
cert-bund: WID-SEC-2022-0927
cert-bund: WID-SEC-2022-0628
cert-bund: WID-SEC-2022-0520
cert-bund: CB-K22/0066
cert-bund: CB-K21/1291
dfn-cert: DFN-CERT-2025-2802
dfn-cert: DFN-CERT-2024-3126
dfn-cert: DFN-CERT-2024-2222
dfn-cert: DFN-CERT-2023-1648
dfn-cert: DFN-CERT-2022-1813
dfn-cert: DFN-CERT-2022-1472
dfn-cert: DFN-CERT-2022-0805
dfn-cert: DFN-CERT-2022-0325
dfn-cert: DFN-CERT-2022-0292
dfn-cert: DFN-CERT-2022-0204
dfn-cert: DFN-CERT-2022-0119
dfn-cert: DFN-CERT-2022-0074
dfn-cert: DFN-CERT-2022-0015
dfn-cert: DFN-CERT-2021-2666
dfn-cert: DFN-CERT-2021-2643
. . . continues on next page . . .
2 RESULTS PER HOST 368
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u321 ([Link]) and earlier, 7u331 ([Link]) and earlier, 11.x through
11.0.14, 17.x through 17.0.2, 18 on Windows.
Vulnerability Insight
Multiple aws are due to unspecied errors in 'Libraries', 'JAXP' and 'JNDI' components.
References
cve: CVE-2022-21449
cve: CVE-2022-21476
cve: CVE-2022-21426
. . . continues on next page . . .
2 RESULTS PER HOST 369
NVT: Apache Log4j 1.2.x RCE Vulnerability (Windows, Dec 2021) - Version Check
Solution:
Solution type: WillNotFix
No solution was made available by the vendor.
Note: Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as
it addresses numerous other issues from the previous versions.
Aected Software/OS
Apache Log4j version 1.2.x.
Vulnerability Insight
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker
has write access to the Log4j conguration. The attacker can provide TopicBindingName and
TopicConnectionFactoryBindingName congurations causing JMSAppender to perform JNDI
requests that result in remote code execution in a similar fashion to CVE-2021-44228.
Note this issue only aects Log4j 1.2 when specically congured to use JMSAppender, which
is not the default.
References
cve: CVE-2021-4104
url: [Link]
cert-bund: WID-SEC-2024-1926
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0107
cert-bund: WID-SEC-2023-1807
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-1770
cert-bund: WID-SEC-2022-1189
cert-bund: WID-SEC-2022-1015
. . . continues on next page . . .
2 RESULTS PER HOST 371
Summary
This host is missing a critical security update according to Microsoft Bulletin MS16-001.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code and gain elevated
privileges on the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 372
Aected Software/OS
Microsoft Internet Explorer version 7.x/8.x/9.x/10.x/11.x.
Vulnerability Insight
Multiple aws exist due to:
- An error due to improper handling of objects in memory,
- Improper enforcing of cross-domain policies.
References
cve: CVE-2016-0002
cve: CVE-2016-0005
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0052
dfn-cert: DFN-CERT-2016-0063
NVT: Microsoft .NET Framework Authentication Bypass and Spoong Vulnerabilities (2836440)
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-040.
Impact
Successful exploitation could allow an attacker to bypass security mechanism and gain access to
restricted endpoint functions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 373
Aected Software/OS
- Microsoft .NET Framework 4
- Microsoft .NET Framework 4.5
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 2.0 Service Pack 2
Vulnerability Insight
The aws are due to
- Improper validation of XML signatures by the CLR
- Error within the WCF endpoint authentication mechanism when handling queries
References
cve: CVE-2013-1336
cve: CVE-2013-1337
url: [Link]
,→13-040
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-0895
NVT: Apache Log4j 1.2.x RCE Vulnerability (Windows, Dec 2021) - Version Check
Summary
Apache Log4j is prone to a remote code execution (RCE) vulnerability in JMSAppender.
Solution:
Solution type: WillNotFix
. . . continues on next page . . .
2 RESULTS PER HOST 374
Aected Software/OS
Apache Log4j version 1.2.x.
Vulnerability Insight
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker
has write access to the Log4j conguration. The attacker can provide TopicBindingName and
TopicConnectionFactoryBindingName congurations causing JMSAppender to perform JNDI
requests that result in remote code execution in a similar fashion to CVE-2021-44228.
Note this issue only aects Log4j 1.2 when specically congured to use JMSAppender, which
is not the default.
References
cve: CVE-2021-4104
url: [Link]
cert-bund: WID-SEC-2024-1926
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0107
cert-bund: WID-SEC-2023-1807
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-1770
cert-bund: WID-SEC-2022-1189
cert-bund: WID-SEC-2022-1015
cert-bund: WID-SEC-2022-0927
cert-bund: WID-SEC-2022-0628
cert-bund: WID-SEC-2022-0520
cert-bund: CB-K22/0066
cert-bund: CB-K21/1291
dfn-cert: DFN-CERT-2025-2802
dfn-cert: DFN-CERT-2024-3126
dfn-cert: DFN-CERT-2024-2222
dfn-cert: DFN-CERT-2023-1648
dfn-cert: DFN-CERT-2022-1813
dfn-cert: DFN-CERT-2022-1472
dfn-cert: DFN-CERT-2022-0805
dfn-cert: DFN-CERT-2022-0325
dfn-cert: DFN-CERT-2022-0292
. . . continues on next page . . .
2 RESULTS PER HOST 375
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u343 ([Link]) and earlier, 8u333 ([Link]) and earlier, 11.x through
[Link], 17.x through [Link], 18.x through [Link] on Windows.
Vulnerability Insight
Multiple aws are due to unspecied errors in 'Libraries', 'JAXP' and 'Hotspot' components.
References
cve: CVE-2022-34169
cve: CVE-2022-21541
cve: CVE-2022-21540
cve: CVE-2022-21549
url: [Link]
cert-bund: WID-SEC-2025-1565
cert-bund: WID-SEC-2025-1563
cert-bund: WID-SEC-2025-0144
cert-bund: WID-SEC-2024-1659
cert-bund: WID-SEC-2024-1653
cert-bund: WID-SEC-2024-1652
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1622
cert-bund: WID-SEC-2024-0899
cert-bund: WID-SEC-2024-0890
cert-bund: WID-SEC-2024-0870
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0788
cert-bund: WID-SEC-2024-0671
cert-bund: WID-SEC-2024-0124
cert-bund: WID-SEC-2023-2368
cert-bund: WID-SEC-2023-1032
cert-bund: WID-SEC-2023-1017
cert-bund: WID-SEC-2023-0553
cert-bund: WID-SEC-2023-0122
cert-bund: WID-SEC-2022-1244
cert-bund: WID-SEC-2022-0759
cert-bund: WID-SEC-2022-0746
dfn-cert: DFN-CERT-2024-3126
dfn-cert: DFN-CERT-2024-3125
dfn-cert: DFN-CERT-2024-2928
dfn-cert: DFN-CERT-2024-2713
dfn-cert: DFN-CERT-2024-1000
dfn-cert: DFN-CERT-2023-0899
dfn-cert: DFN-CERT-2023-0082
dfn-cert: DFN-CERT-2022-2660
dfn-cert: DFN-CERT-2022-2321
dfn-cert: DFN-CERT-2022-1955
dfn-cert: DFN-CERT-2022-1837
dfn-cert: DFN-CERT-2022-1714
dfn-cert: DFN-CERT-2022-1661
dfn-cert: DFN-CERT-2022-1607
dfn-cert: DFN-CERT-2022-1606
2 RESULTS PER HOST 377
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u241 ([Link]) and earlier.
Vulnerability Insight
The aw exists due to error in JavaFX component.
References
cve: CVE-2019-18197
url: [Link]
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K20/1030
cert-bund: CB-K20/0319
cert-bund: CB-K20/0097
dfn-cert: DFN-CERT-2020-2299
dfn-cert: DFN-CERT-2020-2131
dfn-cert: DFN-CERT-2020-1107
dfn-cert: DFN-CERT-2020-0771
. . . continues on next page . . .
2 RESULTS PER HOST 378
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u241 ([Link]) and earlier.
Vulnerability Insight
The aw exists due to error in JavaFX component.
References
cve: CVE-2019-18197
url: [Link]
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K20/1030
. . . continues on next page . . .
2 RESULTS PER HOST 379
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attacker to have an impact on
integrity and availability
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u211([Link]) and earlier, 8u202([Link]) and earlier, 11.0.2 and
earlier and 12 on Windows.
Vulnerability Insight
Multiple aws exist due to:
- An error in 'Libraries' component of Java SE.
- An error in 'RMI' component of Java SE.
References
cve: CVE-2019-2602
cve: CVE-2019-2684
url: [Link]
,→l#AppendixJAVA
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2023-1594
cert-bund: CB-K19/1121
cert-bund: CB-K19/0658
cert-bund: CB-K19/0552
cert-bund: CB-K19/0317
dfn-cert: DFN-CERT-2022-2268
dfn-cert: DFN-CERT-2019-1523
dfn-cert: DFN-CERT-2019-1402
dfn-cert: DFN-CERT-2019-1107
dfn-cert: DFN-CERT-2019-0940
dfn-cert: DFN-CERT-2019-0915
dfn-cert: DFN-CERT-2019-0887
dfn-cert: DFN-CERT-2019-0773
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attacker to have an impact on
integrity and availability
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 381
Aected Software/OS
Oracle Java SE version 7u211([Link]) and earlier, 8u202([Link]) and earlier, 11.0.2 and
earlier and 12 on Windows.
Vulnerability Insight
Multiple aws exist due to:
- An error in 'Libraries' component of Java SE.
- An error in 'RMI' component of Java SE.
References
cve: CVE-2019-2602
cve: CVE-2019-2684
url: [Link]
,→l#AppendixJAVA
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2023-1594
cert-bund: CB-K19/1121
cert-bund: CB-K19/0658
cert-bund: CB-K19/0552
cert-bund: CB-K19/0317
dfn-cert: DFN-CERT-2022-2268
dfn-cert: DFN-CERT-2019-1523
dfn-cert: DFN-CERT-2019-1402
dfn-cert: DFN-CERT-2019-1107
dfn-cert: DFN-CERT-2019-0940
dfn-cert: DFN-CERT-2019-0915
dfn-cert: DFN-CERT-2019-0887
dfn-cert: DFN-CERT-2019-0773
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u343 ([Link]) and earlier, 8u333 ([Link]) and earlier, 11.x through
[Link], 17.x through [Link], 18.x through [Link] on Windows.
Vulnerability Insight
Multiple aws are due to unspecied errors in 'Libraries', 'JAXP' and 'Hotspot' components.
References
cve: CVE-2022-34169
cve: CVE-2022-21541
cve: CVE-2022-21540
cve: CVE-2022-21549
url: [Link]
cert-bund: WID-SEC-2025-1565
cert-bund: WID-SEC-2025-1563
cert-bund: WID-SEC-2025-0144
cert-bund: WID-SEC-2024-1659
cert-bund: WID-SEC-2024-1653
cert-bund: WID-SEC-2024-1652
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1622
cert-bund: WID-SEC-2024-0899
cert-bund: WID-SEC-2024-0890
cert-bund: WID-SEC-2024-0870
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0788
. . . continues on next page . . .
2 RESULTS PER HOST 383
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 384
Aected Software/OS
Oracle Java SE version 7u343 ([Link]) and earlier, 8u333 ([Link]) and earlier, 11.x through
[Link], 17.x through [Link], 18.x through [Link] on Windows.
Vulnerability Insight
Multiple aws are due to unspecied errors in 'Libraries', 'JAXP' and 'Hotspot' components.
References
cve: CVE-2022-34169
cve: CVE-2022-21541
cve: CVE-2022-21540
cve: CVE-2022-21549
url: [Link]
cert-bund: WID-SEC-2025-1565
cert-bund: WID-SEC-2025-1563
cert-bund: WID-SEC-2025-0144
cert-bund: WID-SEC-2024-1659
cert-bund: WID-SEC-2024-1653
cert-bund: WID-SEC-2024-1652
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1622
cert-bund: WID-SEC-2024-0899
cert-bund: WID-SEC-2024-0890
cert-bund: WID-SEC-2024-0870
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0788
cert-bund: WID-SEC-2024-0671
cert-bund: WID-SEC-2024-0124
cert-bund: WID-SEC-2023-2368
cert-bund: WID-SEC-2023-1032
cert-bund: WID-SEC-2023-1017
cert-bund: WID-SEC-2023-0553
cert-bund: WID-SEC-2023-0122
cert-bund: WID-SEC-2022-1244
cert-bund: WID-SEC-2022-0759
cert-bund: WID-SEC-2022-0746
dfn-cert: DFN-CERT-2024-3126
. . . continues on next page . . .
2 RESULTS PER HOST 385
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-091.
Impact
Successful exploitation will allow remote attackers to gain access to potentially sensitive infor-
mation.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft .NET Framework 2.0 Service Pack 2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4.5.2
- Microsoft .NET Framework 4.6/4.6.1
References
cve: CVE-2016-3255
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1057
dfn-cert: DFN-CERT-2016-1125
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-047
Impact
Successful exploitation will allow remote attackers to bypass the ASLR security feature in con-
junction with another vulnerability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 387
Vulnerability Insight
The aw is due to RPC improperly frees messages that the server rejects as malformed, allowing
an attacker to ll up the address space of a process.
References
cve: CVE-2014-0316
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/1013
dfn-cert: DFN-CERT-2014-1053
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-063.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode
privileges or corrupt memory.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows 2003 x32 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 388
Vulnerability Insight
The following vulnerabilities exist:
- An error within Address Space Layout Randomization (ASLR) implementation can be exploited
to bypass the ASLR security feature.
- Multiple errors within the NT Virtual DOS Machine (NTVDM) subsystem.
References
cve: CVE-2013-2556
cve: CVE-2013-3196
cve: CVE-2013-3197
cve: CVE-2013-3198
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-1467
Summary
This host is missing a security update according to Oracle.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 389
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u291 ([Link]) and earlier, 11.0.11 and earlier, 16.0.1 and earlier on
Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' and 'Networking' components.
References
cve: CVE-2021-2388
url: [Link]
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-0464
cert-bund: CB-K21/0981
cert-bund: CB-K21/0783
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0074
dfn-cert: DFN-CERT-2021-2310
dfn-cert: DFN-CERT-2021-1825
dfn-cert: DFN-CERT-2021-1728
dfn-cert: DFN-CERT-2021-1534
dfn-cert: DFN-CERT-2021-1533
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to perform unauthorized modications to data, disclose
information and conduct denial of service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 11.0.x through 11.0.28, 17.0.x through 17.0.16, 21.0.x through 21.0.8, 25,
8u461 and prior on Windows.
References
cve: CVE-2025-53066
cve: CVE-2025-53057
url: [Link]
cert-bund: WID-SEC-2025-2365
dfn-cert: DFN-CERT-2025-3055
dfn-cert: DFN-CERT-2025-2943
dfn-cert: DFN-CERT-2025-2942
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to perform unauthorized modications to data, disclose
information and conduct denial of service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 11.0.x through 11.0.28, 17.0.x through 17.0.16, 21.0.x through 21.0.8, 25,
8u461 and prior on Windows.
References
cve: CVE-2025-53066
cve: CVE-2025-53057
url: [Link]
cert-bund: WID-SEC-2025-2365
dfn-cert: DFN-CERT-2025-3055
dfn-cert: DFN-CERT-2025-2943
dfn-cert: DFN-CERT-2025-2942
Summary
This host is missing a security update according to Oracle.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 392
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u291 ([Link]) and earlier, 11.0.11 and earlier, 16.0.1 and earlier on
Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' and 'Networking' components.
References
cve: CVE-2021-2388
url: [Link]
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-0464
cert-bund: CB-K21/0981
cert-bund: CB-K21/0783
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0074
dfn-cert: DFN-CERT-2021-2310
dfn-cert: DFN-CERT-2021-1825
dfn-cert: DFN-CERT-2021-1728
dfn-cert: DFN-CERT-2021-1534
dfn-cert: DFN-CERT-2021-1533
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-004.
Impact
Successful exploitation will allow attackers to cause a denial of service on the target system's
LSASS service, which triggers an automatic reboot of the system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
Vulnerability Insight
The aw exists in the way the Local Security Authority Subsystem Service (LSASS) handles
authentication requests.
References
cve: CVE-2017-0004
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0038
dfn-cert: DFN-CERT-2017-0040
Summary
This host is missing an important security update according to Microsoft KB5012329
Impact
Successful exploitation will allow an attacker to cause a denial of service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft
Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
The aw exists due to an input validation error in an unknown processing in .NET Framework.
References
cve: CVE-2022-26832
url: [Link]
cert-bund: WID-SEC-2022-1251
cert-bund: CB-K22/0433
dfn-cert: DFN-CERT-2022-0812
Summary
This host is missing an important security update according to Microsoft KB5009719
Impact
Successful exploitation will allow an attacker to conduct a denial of service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft
Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
The aw exists due to an error in .NET Framework which allows an unauthenticated attacker to
cause a denial of service on an aected system.
References
cve: CVE-2022-21911
url: [Link]
cert-bund: WID-SEC-2022-1251
cert-bund: CB-K22/0041
dfn-cert: DFN-CERT-2022-0048
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u361 and earlier, 11.0.18, 17.0.6, 20.0.0 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in the networking components.
References
cve: CVE-2023-21930
cve: CVE-2023-21937
cve: CVE-2023-21938
cve: CVE-2023-21939
cve: CVE-2023-21967
cve: CVE-2023-21968
url: [Link]
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2112
cert-bund: WID-SEC-2023-1846
cert-bund: WID-SEC-2023-1011
dfn-cert: DFN-CERT-2024-0147
dfn-cert: DFN-CERT-2023-2493
dfn-cert: DFN-CERT-2023-2249
dfn-cert: DFN-CERT-2023-2240
dfn-cert: DFN-CERT-2023-1955
dfn-cert: DFN-CERT-2023-1909
dfn-cert: DFN-CERT-2023-1879
dfn-cert: DFN-CERT-2023-1605
dfn-cert: DFN-CERT-2023-1418
dfn-cert: DFN-CERT-2023-1336
dfn-cert: DFN-CERT-2023-1304
. . . continues on next page . . .
2 RESULTS PER HOST 397
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u361 and earlier, 11.0.18, 17.0.6, 20.0.0 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in the networking components.
References
cve: CVE-2023-21930
cve: CVE-2023-21937
cve: CVE-2023-21938
cve: CVE-2023-21939
cve: CVE-2023-21967
cve: CVE-2023-21968
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 398
Summary
Oracle Java SE is prone to a remote security vulnerability.
Impact
Successful exploitation will allow remote attackers to aect condentiality and integrity via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 399
Vulnerability Insight
The aw is due to an unspecied error in the 'Security' component of Java SE.
References
cve: CVE-2018-2783
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: WID-SEC-2023-0531
cert-bund: CB-K18/0882
cert-bund: CB-K18/0821
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2019-0618
dfn-cert: DFN-CERT-2018-1931
dfn-cert: DFN-CERT-2018-1915
dfn-cert: DFN-CERT-2018-1746
dfn-cert: DFN-CERT-2018-1470
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-1078
dfn-cert: DFN-CERT-2018-0724
dfn-cert: DFN-CERT-2018-0102
Summary
Oracle Java SE is prone to a remote security vulnerability.
Impact
Successful exploitation will allow remote attackers to aect condentiality and integrity via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier on Win-
dows.
Vulnerability Insight
The aw is due to an unspecied error in the 'Security' component of Java SE.
References
cve: CVE-2018-2783
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: WID-SEC-2023-0531
cert-bund: CB-K18/0882
cert-bund: CB-K18/0821
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2019-0618
dfn-cert: DFN-CERT-2018-1931
dfn-cert: DFN-CERT-2018-1915
dfn-cert: DFN-CERT-2018-1746
dfn-cert: DFN-CERT-2018-1470
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-1078
dfn-cert: DFN-CERT-2018-0724
dfn-cert: DFN-CERT-2018-0102
2 RESULTS PER HOST 401
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized update, insert or delete access to critical data or all Oracle Java SE
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u391 and earlier 11.0.21, 17.0.9, 21.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in the multiple components.
References
cve: CVE-2024-20918
cve: CVE-2024-20952
cve: CVE-2024-20919
cve: CVE-2024-20921
cve: CVE-2024-20945
url: [Link]
cert-bund: WID-SEC-2025-0001
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0121
. . . continues on next page . . .
2 RESULTS PER HOST 402
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized update, insert or delete access to critical data or all Oracle Java SE
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u391 and earlier 11.0.21, 17.0.9, 21.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in the multiple components.
References
cve: CVE-2024-20918
cve: CVE-2024-20952
cve: CVE-2024-20919
cve: CVE-2024-20921
cve: CVE-2024-20945
url: [Link]
cert-bund: WID-SEC-2025-0001
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0121
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-0533
dfn-cert: DFN-CERT-2024-0502
dfn-cert: DFN-CERT-2024-0501
dfn-cert: DFN-CERT-2024-0500
dfn-cert: DFN-CERT-2024-0494
dfn-cert: DFN-CERT-2024-0491
dfn-cert: DFN-CERT-2024-0422
dfn-cert: DFN-CERT-2024-0417
dfn-cert: DFN-CERT-2024-0361
dfn-cert: DFN-CERT-2024-0354
dfn-cert: DFN-CERT-2024-0129
dfn-cert: DFN-CERT-2024-0128
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 404
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u441 and prior, 17.0.x through 17.0.14, 11.0.x through 11.0.26, 21.0.x
through 21.0.6 and 24 on Windows.
References
cve: CVE-2025-21587
cve: CVE-2025-30698
url: [Link]
cert-bund: WID-SEC-2025-1035
cert-bund: WID-SEC-2025-0815
dfn-cert: DFN-CERT-2025-3170
dfn-cert: DFN-CERT-2025-3168
dfn-cert: DFN-CERT-2025-2784
dfn-cert: DFN-CERT-2025-2550
dfn-cert: DFN-CERT-2025-1788
dfn-cert: DFN-CERT-2025-1414
dfn-cert: DFN-CERT-2025-1350
dfn-cert: DFN-CERT-2025-1319
dfn-cert: DFN-CERT-2025-1285
dfn-cert: DFN-CERT-2025-1265
dfn-cert: DFN-CERT-2025-0985
dfn-cert: DFN-CERT-2025-0982
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to perform unauthorized modications to data, disclose
information and cause denial of service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u441 and prior, 17.0.x through 17.0.14, 11.0.x through 11.0.26, 21.0.x
through 21.0.6 and 24 on Windows.
References
cve: CVE-2025-21587
cve: CVE-2025-30698
url: [Link]
cert-bund: WID-SEC-2025-1035
cert-bund: WID-SEC-2025-0815
dfn-cert: DFN-CERT-2025-3170
dfn-cert: DFN-CERT-2025-3168
dfn-cert: DFN-CERT-2025-2784
dfn-cert: DFN-CERT-2025-2550
dfn-cert: DFN-CERT-2025-1788
dfn-cert: DFN-CERT-2025-1414
dfn-cert: DFN-CERT-2025-1350
dfn-cert: DFN-CERT-2025-1319
dfn-cert: DFN-CERT-2025-1285
dfn-cert: DFN-CERT-2025-1265
dfn-cert: DFN-CERT-2025-0985
dfn-cert: DFN-CERT-2025-0982
2 RESULTS PER HOST 406
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to compromise Oracle Java SE, which can result in
unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u411 and prior, 17.0.x through 17.0.11, 11.0.x through 11.0.23, 21.0.x
through 21.0.3 and 22.0.x through 22.0.1 on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21147: An error in the Hotspot component of Oracle Java SE.
- CVE-2024-21068: An error in the 2D component of Oracle Java SE.
- CVE-2024-21140: An error in the Hotspot component of Oracle Java SE.
References
cve: CVE-2024-21147
cve: CVE-2024-21145
cve: CVE-2024-21140
cve: CVE-2024-21131
cve: CVE-2024-21138
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 407
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to compromise Oracle Java SE, which can result in
unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u411 and prior, 17.0.x through 17.0.11, 11.0.x through 11.0.23, 21.0.x
through 21.0.3 and 22.0.x through 22.0.1 on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21147: An error in the Hotspot component of Oracle Java SE.
- CVE-2024-21068: An error in the 2D component of Oracle Java SE.
- CVE-2024-21140: An error in the Hotspot component of Oracle Java SE.
References
cve: CVE-2024-21147
cve: CVE-2024-21145
cve: CVE-2024-21140
cve: CVE-2024-21131
cve: CVE-2024-21138
url: [Link]
cert-bund: WID-SEC-2024-1658
cert-bund: WID-SEC-2024-1648
cert-bund: WID-SEC-2024-1647
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-2789
dfn-cert: DFN-CERT-2024-2788
dfn-cert: DFN-CERT-2024-2191
dfn-cert: DFN-CERT-2024-2140
dfn-cert: DFN-CERT-2024-2119
dfn-cert: DFN-CERT-2024-1860
dfn-cert: DFN-CERT-2024-1859
NVT: Oracle Java SE <= 8u451 Security Update (Jul 2025) - Windows
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation allows an attacker to take control of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 409
Aected Software/OS
Oracle Java SE version 8u451 and prior on Windows.
References
cve: CVE-2025-50063
url: [Link]
cert-bund: WID-SEC-2025-1569
dfn-cert: DFN-CERT-2025-1899
NVT: Oracle Java SE <= 8u451 Security Update (Jul 2025) - Windows
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation allows an attacker to take control of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u451 and prior on Windows.
References
cve: CVE-2025-50063
url: [Link]
cert-bund: WID-SEC-2025-1569
dfn-cert: DFN-CERT-2025-1899
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-003
Impact
Successful exploitation will allow remote attackers to gain escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw is due to the improper use of window handle thread-owned objects in memory. This
may allow local attacker to gain elevated privileges.
References
cve: CVE-2014-0262
. . . continues on next page . . .
2 RESULTS PER HOST 411
Summary
This host is missing an important security update according to Microsoft Advisory 3033929.
Impact
Successful exploitation will allow remote attackers to bypass security and gain restricted privi-
leges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw is due to an error within the WebDAV kernel-mode driver ([Link]).
References
cve: CVE-2015-0073
cve: CVE-2015-0075
url: [Link]
url: [Link]
cert-bund: CB-K15/0319
. . . continues on next page . . .
2 RESULTS PER HOST 412
NVT: Microsoft Windows Remote Procedure Call Privilege Elevation Vulnerability (3067505)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-076.
Impact
Successful exploitation will allow remote attacker to gain privileged access.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
Vulnerability Insight
The aw occurs when Windows RPC inadvertently allows DCE/RPC connection reection.
References
cve: CVE-2015-2370
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 413
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-117.
Impact
Successful exploitation will allow an attacker to gain elevated privileges on a targeted system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
Vulnerability Insight
The error exists as NDIS fails to check the length of a buer prior to copying memory into it.
References
cve: CVE-2015-6098
url: [Link]
url: [Link]
cert-bund: CB-K15/1649
dfn-cert: DFN-CERT-2015-1742
2 RESULTS PER HOST 414
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-017.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode
privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
- Race condition errors when handling certain objects in memory can be exploited to execute
arbitrary code with kernel privileges.
- An error when handling the reference counter for certain objects in memory can be exploited
to execute arbitrary code with kernel privileges.
References
cve: CVE-2013-1278
cve: CVE-2013-1279
cve: CVE-2013-1280
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 415
Summary
This host has important security update missing according to Microsoft Bulletin MS12-047.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code with kernel-mode
privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Windows kernel-mode driver improperly validates parameters (when creating a hook procedure)
and specic keyboard layouts, which can be exploited to execute arbitrary code.
References
cve: CVE-2012-1890
cve: CVE-2012-1893
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→12-047
dfn-cert: DFN-CERT-2012-1330
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-132.
Impact
Successful exploitation will allow an attacker to take complete control of an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 417
References
cve: CVE-2015-6128
cve: CVE-2015-6132
cve: CVE-2015-6133
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1804
dfn-cert: DFN-CERT-2015-1903
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-072.
Impact
Successful exploitation will allow remote attackers to gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
. . . continues on next page . . .
2 RESULTS PER HOST 418
Vulnerability Insight
Flaw exists due to error when windows graphics component fails to properly process bitmap
conversions.
References
cve: CVE-2015-2364
url: [Link]
url: [Link]
cert-bund: CB-K15/1013
dfn-cert: DFN-CERT-2015-1060
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-027.
Impact
Successful exploitation will allow attackers to gain elevated privileges and execute code in the
context of the LocalSystem account.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 419
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
Flaw is due to an error in the 'ShellExecute' function within the Windows Shell API when
handling le associations.
References
cve: CVE-2014-1807
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→14-027
cert-bund: CB-K14/0568
dfn-cert: DFN-CERT-2014-0597
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-073.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 420
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws exist due to:
- An improper handling of buer elements by windows kernel-mode driver under certain condi-
tions.
- An improper freeing of an object in memory by windows kernel-mode driver.
- Improper handling of buer elements by windows kernel-mode driver under certain conditions.
- Improper freeing of an object in memory by windows kernel-mode driver.
- Insucient validation of certain data passed from user mode by the windows kernel-mode driver.
- Windows kernel-mode driver when it accesses an object in memory that has either not been
correctly initialized or deleted.
- Windows kernel-mode driver when it improperly validates user input.
- Windows kernel-mode driver '[Link]' fails to properly free memory.
References
cve: CVE-2015-2363
cve: CVE-2015-2365
cve: CVE-2015-2366
cve: CVE-2015-2367
cve: CVE-2015-2381
cve: CVE-2015-2382
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 421
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-085.
Impact
Successful exploitation will allow a local attacker to elevate privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw is due to improper symbolic link processing by the Mount Manager component.
References
cve: CVE-2015-1769
. . . continues on next page . . .
2 RESULTS PER HOST 422
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-033.
Impact
Successful exploitation could allow attackers to gain escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 Service Pack 1 and prior
- Microsoft Windows Vista Service Pack 2 and prior
- Microsoft Windows Server 2008 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 Service Pack 1 and prior
Vulnerability Insight
The aw is due to the way Windows Partition Manager ([Link]) allocates objects in mem-
ory, when two or more processes or threads call Plug and Play (PnP) Conguration Manager
functions at the same time.
References
cve: CVE-2012-0178
. . . continues on next page . . .
2 RESULTS PER HOST 423
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-061.
Impact
Successful exploitation will allow remote attackers to bypass security, gain elevated privileges
and execute arbitrary code on aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws exist due to:
- Improper handling of buer elements by windows kernel-mode driver under certain conditions.
- Improper freeing of an object in memory by windows kernel-mode driver.
- Insucient validation of certain data passed from user mode by the windows kernel-mode driver.
- Windows kernel-mode driver when it accesses an object in memory that has either not been
correctly initialized or deleted.
- Windows kernel-mode driver when it improperly validates user input.
. . . continues on next page . . .
2 RESULTS PER HOST 424
References
cve: CVE-2015-1719
cve: CVE-2015-1720
cve: CVE-2015-1721
cve: CVE-2015-1722
cve: CVE-2015-1723
cve: CVE-2015-1724
cve: CVE-2015-1725
cve: CVE-2015-1726
cve: CVE-2015-1727
cve: CVE-2015-1768
cve: CVE-2015-2360
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0783
dfn-cert: DFN-CERT-2015-0827
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-023.
Impact
Successful exploitation will allow remote attackers to bypass security and gain restricted privi-
leges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws exist:
- In the Windows kernel-mode driver that could allow the disclosure of kernel memory contents
to an attacker.
- In the Windows kernel-mode driver that is caused when the kernel-mode driver fails to properly
validate the calling threads token.
- In the Windows kernel-mode driver that could allow the disclosure of kernel memory contents
to an attacker.
- In the Windows kernel-mode driver that could allow the disclosure of kernel memory contents
to an attacker. This vulnerability is caused when the Windows kernel-mode driver dereferences
a NULL pointer.
References
cve: CVE-2015-0077
cve: CVE-2015-0078
cve: CVE-2015-0094
. . . continues on next page . . .
2 RESULTS PER HOST 426
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-015.
Impact
Successful exploitation will allow local attacker to gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
Flaw exists as impersonation levels are not properly validated or enforced when creating pro-
cesses.
References
cve: CVE-2015-0062
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 427
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-015.
Impact
Successful exploitation will allow remote attackers to cause a DoS (Denial of Service) and gain
escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Service Pack 3 and prior
- Microsoft Windows XP x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to an information disclosure and an elevation of privilege vulnerability
because the Windows kernel-mode driver improperly handles objects in memory.
References
cve: CVE-2014-0300
cve: CVE-2014-0323
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0296
dfn-cert: DFN-CERT-2014-0300
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-038.
Impact
Successful exploitation will allow local users to gain privileges via a crafted application.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Flaws are due to:
- A type confusion aw related to NtCreateTransactionManager that may result in the operating
system failing to properly validate and enforce impersonation levels.
. . . continues on next page . . .
2 RESULTS PER HOST 429
References
cve: CVE-2015-1643
cve: CVE-2015-1644
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0527
dfn-cert: DFN-CERT-2015-0545
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-019.
Impact
Successful exploitation will allow attackers to gain escalated privileges and execute the code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 Edition Service Pack 1 and prior
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 430
References
cve: CVE-2013-0076
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→13-019
dfn-cert: DFN-CERT-2013-0296
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-119.
Impact
Successful exploitation will allow attackers to gain elevated privileges of an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
. . . continues on next page . . .
2 RESULTS PER HOST 431
Vulnerability Insight
Flaw is due to a double-free error in the Ancillary Function Driver within '[Link]'.
References
cve: CVE-2015-2478
url: [Link]
url: [Link]
cert-bund: CB-K15/1649
dfn-cert: DFN-CERT-2015-1742
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-003.
Impact
Successful exploitation will allow local attacker to perform certain actions with higher privileges
and potentially gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 432
Vulnerability Insight
Flaw is due to some weaknesses when creating directories and mounting user hives during the
login process.
References
cve: CVE-2015-0004
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0038
dfn-cert: DFN-CERT-2015-0036
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-068.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code with kernel-mode
privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 433
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
The aw is due to an integer overow error when handling certain objects in memory and can
be exploited to execute arbitrary code with kernel privileges.
References
cve: CVE-2012-2529
url: [Link]
url: [Link]
url: [Link]
,→12-068
dfn-cert: DFN-CERT-2012-1938
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-025.
Impact
Successful exploitation will allow remote attackers to run arbitrary code and bypass user account
checks to gain elevated privileges.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 434
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
The aws are exists,
- In the way that Windows Registry Virtualization improperly allows a user to modify the virtual
store of another user.
- when Windows fails to properly validate and enforce impersonation levels.
References
cve: CVE-2015-0073
cve: CVE-2015-0075
url: [Link]
url: [Link]
cert-bund: CB-K15/0319
dfn-cert: DFN-CERT-2015-0324
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-101
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 435
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Service Pack 3 and prior
- Microsoft Windows XP x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to:
- An error within the [Link] driver can be exploited to corrupt memory.
- A use-after-free error exists within the [Link] driver.
- An error when processing TrueType font les can be exploited to cause a crash.
- A double fetch error exists within the [Link] driver.
- An integer overow error exists within the [Link] driver.
References
cve: CVE-2013-3899
cve: CVE-2013-3902
cve: CVE-2013-3903
cve: CVE-2013-3907
cve: CVE-2013-5058
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 436
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-001.
Impact
Successful exploitation will allow local attacker to bypass the authorization check to create cache
entries and in turn gain escalated privileges on the system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
Flaw is due to the impersonation token of a caller is not properly checked when determining if
an administrator or not.
References
cve: CVE-2015-0002
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 437
Summary
This host is missing a critical security update according to Microsoft Bulletin MS14-040.
Impact
Successful exploitation will allow attackers to gain elevated privileges and execute arbitrary code
and take complete control of an aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32 Service Pack 3 and prior
- Microsoft Windows 2003 x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
Vulnerability Insight
Flaw is due to a double-free error in the Ancillary Function Driver within '[Link]'.
References
cve: CVE-2014-1767
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0838
dfn-cert: DFN-CERT-2014-0878
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-010.
Impact
Successful exploitation will allow remote attackers to bypass security and gain restricted privi-
leges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
The aw is due to an error within the WebDAV kernel-mode driver ([Link]).
References
cve: CVE-2015-0003
cve: CVE-2015-0010
cve: CVE-2015-0057
cve: CVE-2015-0058
cve: CVE-2015-0059
cve: CVE-2015-0060
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0171
dfn-cert: DFN-CERT-2015-0175
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-049
Impact
Successful exploitation will allow attackers to gain escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 440
Vulnerability Insight
Flaw exists due to an error within the Windows Installer Service when handling a repair of a
previously installed application
References
cve: CVE-2014-1814
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/1013
dfn-cert: DFN-CERT-2014-1053
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-102.
Impact
Successful exploitation will allow attacker to gain elevated privileges to perform arbitrary ad-
ministration functions such as add users and install applications on the targeted machine.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 441
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
Multiple aws are due to:
- Task Management failing to validate and enforce impersonation levels.
- Task Scheduler failing to properly verify certain le system interactions.
References
cve: CVE-2015-2524
cve: CVE-2015-2525
cve: CVE-2015-2528
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1321
dfn-cert: DFN-CERT-2015-1385
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-032.
Impact
Successful exploitation could allow attackers to bypass certain security restrictions and gain
escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 Service Pack 1
- Microsoft Windows Vista Service Pack 2 and prior
- Microsoft Windows Server 2008 Service Pack 2 and prior
Vulnerability Insight
The aws are due to the way,
- Windows Firewall handles outbound broadcast packets.
- Windows TCP/IP stack handles the binding of an IPv6 address to a local interface.
References
cve: CVE-2012-0174
cve: CVE-2012-0179
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→12-032
dfn-cert: DFN-CERT-2012-0898
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-111.
Impact
Successful exploitation will allow local users to gain privileges via a crafted application.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Multiple aws are due to windows kernel is not handling objects in memory properly.
References
cve: CVE-2015-2549
cve: CVE-2015-2550
cve: CVE-2015-2552
cve: CVE-2015-2553
cve: CVE-2015-2554
url: [Link]
url: [Link]
cert-bund: CB-K15/1507
dfn-cert: DFN-CERT-2015-1586
2 RESULTS PER HOST 444
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-055.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code with kernel-mode
privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
The aw is due to a use-after-free error in [Link] when accessing objects in memory.
References
cve: CVE-2012-2527
url: [Link]
url: [Link]
url: [Link]
,→12-055
dfn-cert: DFN-CERT-2012-1570
2 RESULTS PER HOST 445
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-005.
Impact
Successful exploitation will allow remote attackers to gain escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
The aw is due to an error in '[Link]' when handling window broadcast messages.
References
cve: CVE-2013-0008
url: [Link]
url: [Link]
url: [Link]
,→13-005
dfn-cert: DFN-CERT-2013-0045
2 RESULTS PER HOST 446
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-133
Impact
Successful exploitation will allow an authenticated user to execute code with elevated privileges
that would allow them to install programs.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Edge on Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
Vulnerability Insight
The aw is due to some unspecied weakness in the Windows Pragmatic General Multicast
(PGM) protocol.
References
cve: CVE-2015-6126
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 447
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-076.
Impact
Successful exploitation will allow remote attackers to gain escalated privileges, read arbitrary
kernel memory and cause a DoS (Denial of Service).
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to error related to multiple fetch within the kernel-mode driver
([Link]).
References
cve: CVE-2013-1341
cve: CVE-2013-1342
cve: CVE-2013-1343
cve: CVE-2013-1344
cve: CVE-2013-3864
cve: CVE-2013-3865
cve: CVE-2013-3866
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/0638
dfn-cert: DFN-CERT-2013-1634
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-041.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code with kernel-mode
privileges
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 449
Vulnerability Insight
Multiple aws are due to:
- An error in [Link] within the string atom class name and lipboard format atom name
handling and can be exploited to execute arbitrary code.
- An integer overow error when handling the reference counter for font resources when loading
TrueType fonts.
- A race condition error in [Link] when handling particular thread creation attempts and
can be exploited to execute arbitrary code.
References
cve: CVE-2012-1864
cve: CVE-2012-1865
cve: CVE-2012-1866
cve: CVE-2012-1867
cve: CVE-2012-1868
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→12-041
dfn-cert: DFN-CERT-2012-1124
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-046.
Impact
Successful exploitation will allow remote attackers to gain escalated privileges or cause buer
overow and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to:
- A race condition error within the DirectX graphics kernel subsystem.
- An unspecied error within the Windows kernel-mode driver ([Link])
References
cve: CVE-2013-1332
cve: CVE-2013-1333
cve: CVE-2013-1334
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-0891
2 RESULTS PER HOST 451
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-027.
Impact
Successful exploitation could allow remote attackers to compromise the aected system and
possibly execute arbitrary code with System-level privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
Multiple aws are due to improper handling of objects in memory by the kernel-mode driver,
which can be exploited by inserting a malicious USB device into the system.
References
cve: CVE-2013-1285
cve: CVE-2013-1286
cve: CVE-2013-1287
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 452
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow attackers to partially access data, partially
modify data, and partially deny services.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, 9.0 on Windows
Vulnerability Insight
The aw exists due to a aw in the Deployment component of the application.
References
cve: CVE-2017-10309
url: [Link]
url: [Link]
cert-bund: CB-K17/2168
. . . continues on next page . . .
2 RESULTS PER HOST 453
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow attackers to partially access data, partially
modify data, and partially deny services.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, 9.0 on Windows
Vulnerability Insight
The aw exists due to a aw in the Deployment component of the application.
References
cve: CVE-2017-10309
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 454
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow attackers to partially access data and cause
a partial denial of service conditions.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, 9.0 on Windows
Vulnerability Insight
Multiple aws exist due to a aw in 'JAX-WS' component of the application.
References
. . . continues on next page . . .
2 RESULTS PER HOST 455
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow attackers to partially access data and cause
a partial denial of service conditions.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 456
Vulnerability Insight
Multiple aws exist due to a aw in 'JAX-WS' component of the application.
References
cve: CVE-2016-10165
cve: CVE-2017-10350
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K18/0030
cert-bund: CB-K17/2199
cert-bund: CB-K17/2168
cert-bund: CB-K17/2047
cert-bund: CB-K17/1745
cert-bund: CB-K17/0159
dfn-cert: DFN-CERT-2018-1900
dfn-cert: DFN-CERT-2018-0645
dfn-cert: DFN-CERT-2018-0039
dfn-cert: DFN-CERT-2017-2300
dfn-cert: DFN-CERT-2017-2268
dfn-cert: DFN-CERT-2017-2135
dfn-cert: DFN-CERT-2017-1825
dfn-cert: DFN-CERT-2017-0163
Summary
This host is missing an important security update according to Microsoft advisory (2862152).
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 457
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows 8.1 x32/x64
Vulnerability Insight
The aw is due to improper verication of DirectAccess server connections to DirectAccess clients
by DirectAccess.
References
cve: CVE-2013-3876
url: [Link]
url: [Link]
,→862152
NVT: Microsoft Window XML Core Services Information Disclosure Vulnerability (2916036)
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-005.
Impact
Successful exploitation will allow remote attackers to read les on the local le system of the
user or read content of web domains where the user is currently authenticated.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
The aw is due to an unspecied error which improperly enforce cross-domain policies.
References
cve: CVE-2014-0266
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0168
dfn-cert: DFN-CERT-2014-0174
2 RESULTS PER HOST 459
NVT: Microsoft Windows Kernel-Mode Driver TrueType Font DoS Vulnerability (3002885)
Summary
This host is missing a moderate security update according to Microsoft Bulletin MS14-079.
Impact
Successful exploitation will allow an attacker to conduct denial-of-service attack.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
The aw is due to an integer underow error in the 'vFill_IFIMETRICS' function within the
[Link] module when processing font les.
References
cve: CVE-2014-6317
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/1402
dfn-cert: DFN-CERT-2014-1473
2 RESULTS PER HOST 460
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-049.
Impact
Successful exploitation could allow attackers to cause a denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
The aw is due to an integer overow error within Windows TCP/IP driver when handling
packets during TCP connection, which can be exploited to cause the system to stop responding.
References
cve: CVE-2013-3138
url: [Link]
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-1112
2 RESULTS PER HOST 461
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-036.
Impact
Successful exploitation will allow remote attackers to gain escalated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Multiple aws are due to:
- Improper handling of certain objects in kernel memory.
- Improper parsing of crafted OpenType font les.
References
cve: CVE-2013-1283
cve: CVE-2013-1291
cve: CVE-2013-1292
cve: CVE-2013-1293
. . . continues on next page . . .
2 RESULTS PER HOST 462
Summary
7zip is prone to a mark-of-the-web bypass vulnerability.
Impact
Successful exploitation allows an attacker to bypass the 'Mark-of-the-Web' security feature in
Windows and execute arbitrary code in the context of the current user.
Solution:
Solution type: VendorFix
Update to version 24.09 or later.
Aected Software/OS
7zip version prior to 24.09 on Windows.
Vulnerability Insight
The aw exists due to an incomplete implementation or design oversight in 7-Zip's handling of
the Mark-of-the-Web mechanism when extracting les from archives.
[ return to [Link] ]
NVT: Oracle GlassFish Server <= 4.1.1 Directory Traversal Vulnerability - Active Check
Summary
GlassFish server is prone to a directory traversal vulnerability.
Impact
Successful exploitation will allow remote attackers to gain access to sensitive information.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
Oracle GlassFish Server version 4.1.1 and probably prior.
Vulnerability Insight
The aw is due to
- Improper sanitization of parameter 'META-INF' in '[Link]' le.
References
cve: CVE-2017-1000028
url: [Link]
Summary
This routine reports all SSL/TLS cipher suites accepted by a service where attack vectors exists
only on HTTPS services.
Impact
This could allow remote attackers to obtain sensitive information or have other, unspecied
impacts.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 465
Aected Software/OS
All services accepting vulnerable SSL/TLS cipher suites via HTTPS.
Vulnerability Insight
These rules are applied for the evaluation of the vulnerable cipher suites:
- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).
References
cve: CVE-2016-2183
cve: CVE-2016-6329
cve: CVE-2020-12872
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
cert-bund: WID-SEC-2024-1277
cert-bund: WID-SEC-2024-0209
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2022-2226
cert-bund: WID-SEC-2022-1955
. . . continues on next page . . .
2 RESULTS PER HOST 466
[ return to [Link] ]
Summary
Elasticsearch is prone to an information disclosure vulnerability.
Impact
Successful exploitation would allow an authenticated attacker to acquire valid login credentials.
Solution:
Solution type: VendorFix
Update to version 5.6.12 or 6.4.1 respectively.
Aected Software/OS
Elasticsearch versions through 5.6.11 and 6.0.0 through 6.4.0.
Vulnerability Insight
The _cluster/settings API, when queried, could leak sensitive conguration information such as
passwords, tokens or usernames.
[ return to [Link] ]
Summary
This routine reports all SSL/TLS cipher suites accepted by a service where attack vectors exists
only on HTTPS services.
Impact
This could allow remote attackers to obtain sensitive information or have other, unspecied
impacts.
. . . continues on next page . . .
2 RESULTS PER HOST 470
Solution:
Solution type: Mitigation
The conguration of this services should be changed so that it does not accept the listed cipher
suites anymore.
Please see the references for more resources supporting you with this task.
Aected Software/OS
All services accepting vulnerable SSL/TLS cipher suites via HTTPS.
Vulnerability Insight
These rules are applied for the evaluation of the vulnerable cipher suites:
- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).
References
cve: CVE-2016-2183
cve: CVE-2016-6329
cve: CVE-2020-12872
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
cert-bund: WID-SEC-2024-1277
cert-bund: WID-SEC-2024-0209
cert-bund: WID-SEC-2024-0064
. . . continues on next page . . .
2 RESULTS PER HOST 471
Summary
Various application or web servers / products are prone to an information disclosure vulnerability.
Impact
Based on the information provided in this le an attacker might be able to gather additional info
and/or sensitive data about the application / the application / web server.
Solution:
Solution type: VendorFix
The following vendor xes are known:
- Update to Payara Platform Enterprise 5.31.0, Payara Platform Community 5.2021.7 or later.
For other products please contact the vendor for more information on possible xes.
Aected Software/OS
The following products are known to be aected:
- Payara Platform Enterprise / Community
Other products might be aected as well.
Vulnerability Insight
The servlet specication prohibits servlet containers from serving resources in the '/WEB-INF'
and '/META-INF' directories of a web application archive directly to clients.
This means that URLs like:
[Link]
will return an error message, rather than the contents of the deployment descriptor.
However, some application or web servers / products are prone to a vulnerability that exposes
this information if the client requests a URL like this instead:
[Link]
[Link]
(note the './/' before 'WEB-INF').
. . . continues on next page . . .
2 RESULTS PER HOST 475
References
cve: CVE-2021-41381
url: [Link]
,→[Link]
url: [Link]
,→-[Link]
[ return to [Link] ]
Summary
The Java JMX interface is congured in an insecure way by allowing unauthenticated attackers
to load classes from any remote URL.
Solution:
Solution type: Mitigation
Enable password authentication and/or SSL client certicate authentication for the JMX agent.
References
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 476
[ return to [Link] ]
Summary
This routine reports all 'Anonymous' SSL/TLS cipher suites accepted by a service.
Impact
This could allow remote attackers to obtain sensitive information or have other, unspecied
impacts.
Solution:
Solution type: Mitigation
The conguration of this services should be changed so that it does not accept the listed 'Anony-
mous' cipher suites anymore.
Please see the references for more resources supporting you in this task.
Aected Software/OS
All services providing an encrypted communication using 'Anonymous' SSL/TLS cipher suites.
Vulnerability Insight
Services supporting 'Anonymous' cipher suites could allow a client to negotiate an SSL/TLS
connection to the host without any authentication of the remote endpoint.
References
cve: CVE-2007-1858
cve: CVE-2014-0351
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
,→/28482
url: [Link]
,→/69754
cert-bund: CB-K14/0058
dfn-cert: DFN-CERT-2014-0049
dfn-cert: DFN-CERT-2012-0442
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 478
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated TLSv1.0 and/or TLSv1.1 protocols in favor of the
TLSv1.2+ protocols.
Please see the references for more resources supporting you with this task.
Aected Software/OS
- All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols
- CVE-2023-41928: Kiloview P1 4G and P2 4G Video Encoder
- CVE-2024-41270: Gorush v1.18.4
- CVE-2025-3200: Multiple products from Wiesemann & Theis
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
cve: CVE-2023-41928
cve: CVE-2024-41270
cve: CVE-2025-3200
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1435
cert-bund: CB-K18/0799
cert-bund: CB-K16/1289
cert-bund: CB-K16/1096
cert-bund: CB-K15/1751
cert-bund: CB-K15/1266
cert-bund: CB-K15/0850
cert-bund: CB-K15/0764
cert-bund: CB-K15/0720
cert-bund: CB-K15/0548
cert-bund: CB-K15/0526
cert-bund: CB-K15/0509
cert-bund: CB-K15/0493
cert-bund: CB-K15/0384
cert-bund: CB-K15/0365
cert-bund: CB-K15/0364
cert-bund: CB-K15/0302
cert-bund: CB-K15/0192
cert-bund: CB-K15/0079
cert-bund: CB-K15/0016
cert-bund: CB-K14/1342
cert-bund: CB-K14/0231
. . . continues on next page . . .
2 RESULTS PER HOST 480
Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 482
Solution:
Solution type: Workaround
- Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger
Die-Hellman group. Please see the references for more resources supporting you with this task.
- For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.
Aected Software/OS
All services providing an encrypted communication using Die-Hellman groups with insucient
strength.
Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.
References
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
[ return to [Link] ]
Summary
This routine reports all weak SSL/TLS cipher suites accepted by a service.
Impact
This could allow remote attackers to obtain sensitive information or have other, unspecied
impacts.
Solution:
Solution type: Mitigation
The conguration of this services should be changed so that it does not accept the listed weak
cipher suites anymore.
Please see the references for more resources supporting you with this task.
Aected Software/OS
All services providing an encrypted communication using weak SSL/TLS cipher suites.
Vulnerability Insight
These rules are applied for the evaluation of the cryptographic strength:
- RC4 is considered to be weak (CVE-2013-2566, CVE-2015-2808)
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods and therefore
considered as weak (CVE-2015-4000)
- 1024 bit RSA authentication is considered to be insecure and therefore as weak
- Any cipher considered to be secure for only the next 10 years is considered as medium
- Any other cipher is considered as strong
References
cve: CVE-2013-2566
cve: CVE-2015-2808
cve: CVE-2015-4000
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
cert-bund: CB-K21/0067
cert-bund: CB-K19/0812
cert-bund: CB-K17/1750
cert-bund: CB-K16/1593
cert-bund: CB-K16/1552
cert-bund: CB-K16/1102
cert-bund: CB-K16/0617
cert-bund: CB-K16/0599
cert-bund: CB-K16/0168
cert-bund: CB-K16/0121
cert-bund: CB-K16/0090
cert-bund: CB-K16/0030
cert-bund: CB-K15/1751
cert-bund: CB-K15/1591
cert-bund: CB-K15/1550
cert-bund: CB-K15/1517
cert-bund: CB-K15/1514
cert-bund: CB-K15/1464
. . . continues on next page . . .
2 RESULTS PER HOST 485
Summary
It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this
system.
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated TLSv1.0 and/or TLSv1.1 protocols in favor of the
TLSv1.2+ protocols.
Please see the references for more resources supporting you with this task.
Aected Software/OS
- All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols
- CVE-2023-41928: Kiloview P1 4G and P2 4G Video Encoder
- CVE-2024-41270: Gorush v1.18.4
- CVE-2025-3200: Multiple products from Wiesemann & Theis
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
cve: CVE-2023-41928
cve: CVE-2024-41270
. . . continues on next page . . .
2 RESULTS PER HOST 488
Summary
The remote service is using a SSL/TLS certicate in the certicate chain that has been signed
using a cryptographically weak hashing algorithm.
Solution:
Solution type: Mitigation
. . . continues on next page . . .
2 RESULTS PER HOST 491
Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certicates are considered crypto-
graphically weak and not secure enough for ongoing use:
- Secure Hash Algorithm 1 (SHA-1)
- Message Digest 5 (MD5)
- Message Digest 4 (MD4)
- Message Digest 2 (MD2)
Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft
and Google will begin warning users when visiting web sites that use SHA-1 signed Secure Socket
Layer (SSL) certicates.
NOTE: The script preference allows to set one or more custom SHA-1 ngerprints of CA certi-
cates which are trusted by this routine. The ngerprints needs to be passed comma-separated
and case-insensitive:
Fingerprint1
or
ngerprint1, Fingerprint2
References
url: [Link]
,→sha-1-based-signature-algorithms/
[ return to [Link] ]
Summary
The service is using an SSL/TLS certicate from a known untrusted and/or dangerous certicate
authority (CA).
Impact
An attacker could use this for man-in-the-middle (MITM) attacks, accessing sensible data and
other attacks.
Solution:
Solution type: Mitigation
Replace the SSL/TLS certicate with one signed by a trusted CA.
Summary
The remote SSL/TLS service is prone to a denial of service (DoS) vulnerability.
Impact
The aw might make it easier for remote attackers to cause a DoS (CPU consumption) by
performing many renegotiations within a single connection.
Solution:
Solution type: VendorFix
Users should contact their vendors for specic patch information.
A general solution is to remove/disable renegotiation capabilities altogether from/in the aected
SSL/TLS service.
Aected Software/OS
Every SSL/TLS service which does not properly restrict client-initiated renegotiation.
Vulnerability Insight
The aw exists because the remote SSL/TLS service does not properly restrict client-initiated
renegotiation within the SSL and TLS protocols.
Note: The referenced CVEs are aecting OpenSSL and Mozilla Network Security Services (NSS)
but both are in a DISPUTED state with the following rationale:
> It can also be argued that it is the responsibility of server deployments, not a security library,
to prevent or limit renegotiation when it is inappropriate within a specic environment.
Both CVEs are still kept in this VT as a reference to the origin of this aw.
References
cve: CVE-2011-1473
cve: CVE-2011-5094
url: [Link]
,→tiation-dos/
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0796
cert-bund: WID-SEC-2023-1435
cert-bund: CB-K17/0980
cert-bund: CB-K17/0979
cert-bund: CB-K14/0772
cert-bund: CB-K13/0915
cert-bund: CB-K13/0462
dfn-cert: DFN-CERT-2025-0933
dfn-cert: DFN-CERT-2017-1013
dfn-cert: DFN-CERT-2017-1012
dfn-cert: DFN-CERT-2014-0809
dfn-cert: DFN-CERT-2013-1928
dfn-cert: DFN-CERT-2012-1112
Summary
The remote server's SSL/TLS certicate has already expired.
Solution:
Solution type: Mitigation
Replace the SSL/TLS certicate by a new one.
Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 496
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated TLSv1.0 and/or TLSv1.1 protocols in favor of the
TLSv1.2+ protocols.
Please see the references for more resources supporting you with this task.
Aected Software/OS
- All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols
- CVE-2023-41928: Kiloview P1 4G and P2 4G Video Encoder
- CVE-2024-41270: Gorush v1.18.4
- CVE-2025-3200: Multiple products from Wiesemann & Theis
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
cve: CVE-2023-41928
cve: CVE-2024-41270
cve: CVE-2025-3200
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1435
cert-bund: CB-K18/0799
cert-bund: CB-K16/1289
cert-bund: CB-K16/1096
cert-bund: CB-K15/1751
cert-bund: CB-K15/1266
cert-bund: CB-K15/0850
cert-bund: CB-K15/0764
cert-bund: CB-K15/0720
cert-bund: CB-K15/0548
cert-bund: CB-K15/0526
cert-bund: CB-K15/0509
cert-bund: CB-K15/0493
cert-bund: CB-K15/0384
cert-bund: CB-K15/0365
cert-bund: CB-K15/0364
cert-bund: CB-K15/0302
cert-bund: CB-K15/0192
cert-bund: CB-K15/0079
cert-bund: CB-K15/0016
. . . continues on next page . . .
2 RESULTS PER HOST 498
Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).
Solution:
Solution type: Workaround
- Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger
Die-Hellman group. Please see the references for more resources supporting you with this task.
- For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.
Aected Software/OS
All services providing an encrypted communication using Die-Hellman groups with insucient
strength.
Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.
References
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
[ return to [Link] ]
2 RESULTS PER HOST 501
Summary
OpenSSH is prone to a user enumeration vulnerability.
Impact
Successfully exploitation will allow remote attacker to test whether a certain user exists or not
(username enumeration) on a target OpenSSH server.
Solution:
Solution type: VendorFix
Update to version 7.8 or later.
Aected Software/OS
OpenSSH versions 7.7 and prior.
Vulnerability Insight
The aw is due to not delaying bailout for an invalid authenticating user until after the packet
containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and
auth2-pubkey.c
References
cve: CVE-2018-15473
url: [Link]
url: [Link]
,→1e0
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K20/0041
cert-bund: CB-K18/1031
cert-bund: CB-K18/0873
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2021-2178
dfn-cert: DFN-CERT-2020-2189
dfn-cert: DFN-CERT-2020-0228
dfn-cert: DFN-CERT-2019-2046
dfn-cert: DFN-CERT-2019-0857
dfn-cert: DFN-CERT-2019-0362
dfn-cert: DFN-CERT-2018-2293
dfn-cert: DFN-CERT-2018-2259
dfn-cert: DFN-CERT-2018-2191
dfn-cert: DFN-CERT-2018-1806
dfn-cert: DFN-CERT-2018-1696
Summary
OpenSSH is prone to a user enumeration vulnerability.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
OpenSSH version 5.9 through 7.8.
Vulnerability Insight
The aw exists in the 'auth-gss2.c' source code le of the aected software and is due to in-
sucient validation of an authentication request packet when the Guide Star Server II (GSS2)
component is used on an aected system.
References
cve: CVE-2018-15919
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K18/0885
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2018-2293
dfn-cert: DFN-CERT-2018-2191
Summary
OpenSSH is prone to a security bypass vulnerability.
Impact
Successfully exploiting this issue allows local users to bypass certain security restrictions and
perform unauthorized actions. This may lead to further attacks.
Solution:
Solution type: VendorFix
Update to version 7.6 or later.
Aected Software/OS
OpenSSH versions prior to 7.6 on Windows.
Vulnerability Insight
The aw exists in the 'process_open' function in sftp-server.c script which does not properly
prevent write operations in readonly mode.
References
cve: CVE-2017-15906
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 505
[ return to [Link] ]
Summary
The Apache Tomcat servlet/JSP container has default les installed.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 506
Solution:
Solution type: Mitigation
Remove default les, example JSPs and Servlets from the Tomcat Servlet/JSP container.
Vulnerability Insight
Default les, such as documentation, default Servlets and JSPs were found on the Apache Tomcat
servlet/JSP container.
NVT: Apache Tomcat Security Constraint Incorrect Handling Access Bypass Vulnerabilities -
Windows
Summary
Apache Tomcat is prone to multiple access bypass vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 507
Solution:
Solution type: VendorFix
Upgrade to Apache Tomcat version 9.0.5, 8.5.28, 8.0.50, 7.0.85 or later.
Aected Software/OS
Apache Tomcat versions 9.0.0.M1 to 9.0.4
Apache Tomcat versions 8.5.0 to 8.5.27
Apache Tomcat versions 8.0.0.RC1 to 8.0.49
Apache Tomcat versions 7.0.0 to 7.0.84 on Windows.
Vulnerability Insight
Multiple aws are due to:
- The system does not properly enforce security constraints that dened by annotations of Servlets
in certain cases, depending on the order that Servlets are loaded.
- The URL pattern of (the empty string) which exactly maps to the context root was not
correctly handled when used as part of a security constraint denition.
References
cve: CVE-2018-1305
cve: CVE-2018-1304
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→7e10949b01b1f8a0fb@%[Link]%3E
cert-bund: WID-SEC-2024-1682
cert-bund: WID-SEC-2024-0528
cert-bund: CB-K19/1121
. . . continues on next page . . .
2 RESULTS PER HOST 508
Summary
Apache Tomcat is prone to an authentication bypass vulnerability.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 509
Aected Software/OS
Apache Tomcat versions prior to 9.0.96, 10.0.x through 10.1.30 and 11.0.0-M1 through 11.0.0-
M26.
Note: While not explicitly mentioned by the vendor (due to the EOL status of these branches)
it is assumed that the whole 10.x branch and all versions prior to 9.x are aected by this aw. If
you disagree with this assessment and want to accept the risk please create an override for this
result.
Vulnerability Insight
If Tomcat was congured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuth-
Context component which may throw an exception during the authentication process without
explicitly setting an HTTP status to indicate failure, the authentication may not have failed, al-
lowing the user to bypass the authentication process. There are no known Jakarta Authentication
components that behave in this way.
References
cve: CVE-2024-52316
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-0521
cert-bund: WID-SEC-2024-3684
cert-bund: WID-SEC-2024-3486
dfn-cert: DFN-CERT-2025-2285
dfn-cert: DFN-CERT-2025-2098
dfn-cert: DFN-CERT-2025-0890
dfn-cert: DFN-CERT-2025-0146
dfn-cert: DFN-CERT-2025-0134
dfn-cert: DFN-CERT-2024-3156
dfn-cert: DFN-CERT-2024-3077
2 RESULTS PER HOST 510
Summary
Apache Axis2 is prone to multiple vulnerabilities.
Impact
Successfully exploiting these issues allows attackers to:
- CVE-2012-5785: perform man-in-the-middle attacks or impersonate trusted servers, which will
aid in further attacks
- CVE-2012-4418: may allow unauthenticated attackers to construct specially crafted messages
that can be successfully veried and contain arbitrary content. This may aid in further attacks
- CVE-2012-5351: allows remote attackers to forge messages and bypass authentication
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
The issue aects versions up to 1.6.2.
Vulnerability Insight
The following aws exist:
- CVE-2012-5785: a security bypass vulnerability because the application fails to properly vali-
date SSL certicates from the server
- CVE-2012-4418: a security vulnerability involving XML signature wrapping
- CVE-2012-5351: a SAML assertion that lacks a Signature element, aka a 'Signature exclusion
attack'
Summary
Apache Tomcat is prone to multiple denial of service (DoS) vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 or later.
Aected Software/OS
Apache Tomcat versions prior to 8.5.99, 9.0.0-M1 through 9.0.85, 10.x through 10.1.18 and
11.0.0-M1 through 11.0.0-M16.
Note: While not explicitly mentioned by the vendor (due to the EOL status of these branches) it
is assumed that the whole 10.x branch and all versions prior to 8.5.x are aected by these aws.
If you disagree with this assessment and want to accept the risk please create an override for this
result.
Vulnerability Insight
The following aws exist:
- CVE-2024-23672: WebSocket DoS with incomplete closing handshake
. . . continues on next page . . .
2 RESULTS PER HOST 512
References
cve: CVE-2024-23672
cve: CVE-2024-24549
url: [Link]
url: [Link]
url: [Link]
,→7
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-3663
cert-bund: WID-SEC-2024-3508
cert-bund: WID-SEC-2024-3377
cert-bund: WID-SEC-2024-3220
cert-bund: WID-SEC-2024-3219
cert-bund: WID-SEC-2024-3196
cert-bund: WID-SEC-2024-3195
cert-bund: WID-SEC-2024-3191
cert-bund: WID-SEC-2024-1656
cert-bund: WID-SEC-2024-1642
cert-bund: WID-SEC-2024-1638
cert-bund: WID-SEC-2024-1622
cert-bund: WID-SEC-2024-1238
cert-bund: WID-SEC-2024-1214
cert-bund: WID-SEC-2024-1210
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0630
dfn-cert: DFN-CERT-2025-1517
dfn-cert: DFN-CERT-2024-3096
dfn-cert: DFN-CERT-2024-3078
dfn-cert: DFN-CERT-2024-2743
. . . continues on next page . . .
2 RESULTS PER HOST 513
Summary
Apache Tomcat is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 9.0.98, 10.1.34, 11.0.2 or later.
Vendor note: Users running Tomcat on a case insensitive le system with the default servlet
write enabled (readonly initialisation parameter set to the non-default value of false) may need
additional conguration to fully mitigate CVE-2024-50379 depending on which version of Java
they are using with Tomcat:
- running on Java 8 or Java 11: the system property [Link] must be explicitly
set to false (it defaults to true)
- running on Java 17: the system property [Link], if set, must be set to false (it
defaults to false)
- running on Java 21 onwards: no further conguration is required (the system property and the
problematic cache have been removed)
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 514
Vulnerability Insight
The following aws exist:
- CVE-2024-50379: Remote code execution (RCE) via write-enabled default servlet
- CVE-2024-54677: Denial of service (DoS) in examples web application
- CVE-2024-56337: RCE via write-enabled default servlet - CVE-2024-50379 mitigation was
incomplete
References
cve: CVE-2024-50379
cve: CVE-2024-54677
cve: CVE-2024-56337
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-0823
cert-bund: WID-SEC-2025-0819
cert-bund: WID-SEC-2025-0818
cert-bund: WID-SEC-2025-0808
cert-bund: WID-SEC-2025-0719
cert-bund: WID-SEC-2025-0148
cert-bund: WID-SEC-2024-3744
cert-bund: WID-SEC-2024-3722
dfn-cert: DFN-CERT-2025-2285
dfn-cert: DFN-CERT-2025-2098
dfn-cert: DFN-CERT-2025-1991
dfn-cert: DFN-CERT-2025-1923
. . . continues on next page . . .
2 RESULTS PER HOST 515
NVT: Apache Tomcat CGI Security Constraint Bypass Vulnerability (May 2025) - Windows
Summary
Apache Tomcat is prone to a CGI security constraint bypass vulnerability.
Solution:
Solution type: VendorFix
Update to version 9.0.105, 10.1.41, 11.0.7 or later.
Aected Software/OS
Apache Tomcat version 9.0.104 and prior, 10.x through 10.1.40 and 11.0.0-M1 through 11.0.6.
. . . continues on next page . . .
2 RESULTS PER HOST 516
Vulnerability Insight
When running on a case insensitive le system with security constraints congured for the
<code>pathInfo</code> component of a URL that mapped to the CGI servlet, it is possi-
ble to bypass those security constraints with a specially crafted URL.
References
cve: CVE-2025-46701
url: [Link]
cert-bund: WID-SEC-2025-1850
cert-bund: WID-SEC-2025-1365
cert-bund: WID-SEC-2025-1165
dfn-cert: DFN-CERT-2025-2285
dfn-cert: DFN-CERT-2025-2098
dfn-cert: DFN-CERT-2025-1991
dfn-cert: DFN-CERT-2025-1905
dfn-cert: DFN-CERT-2025-1780
dfn-cert: DFN-CERT-2025-1384
Summary
The host / application transmits sensitive information (username, passwords) in cleartext via
HTTP.
Impact
An attacker could use this situation to compromise or eavesdrop on the HTTP communication
between the client and the server using a man-in-the-middle attack to get access to sensitive data
like usernames or passwords.
Solution:
Solution type: Workaround
Enforce the transmission of sensitive data via an encrypted SSL/TLS connection. Additionally
make sure the host / application is redirecting all users to the secured SSL/TLS connection
before allowing to input sensitive data into the mentioned functions.
Aected Software/OS
Hosts / applications which doesn't enforce the transmission of sensitive data via an encrypted
SSL/TLS connection.
References
url: [Link]
,→ssion_Management
url: [Link]
url: [Link]
Summary
Apache Tomcat is prone to an information disclosure vulnerability.
Solution:
Solution type: VendorFix
Update to version 8.5.86, 9.0.72, 10.1.6, 11.0.0-M3 or later.
Aected Software/OS
Apache Tomcat versions through 8.5.85, 9.0.0-M1 through 9.0.71, 10.x through 10.1.5 and 11.0.0-
M1 through 11.0.0-M2.
Vulnerability Insight
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that
include the X-Forwarded-Proto header set to https, session cookies created by Tomcat did not
include the secure attribute. This could result in the user agent transmitting the session cookie
over an insecure channel.
References
cve: CVE-2023-28708
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 519
Summary
When the default servlet in Apache Tomcat returned a redirect to a directory (e.g. redirecting
to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the
redirect to be generated to any URI of the attackers choice.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 520
Aected Software/OS
Apache Tomcat 9.0.0.M1-9.0.11, 8.5.0-8.5.33, 7.0.23-7.0.90 and probably 8.0.x.
References
cve: CVE-2018-11784
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1212
cert-bund: WID-SEC-2024-1682
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2023-0531
cert-bund: WID-SEC-2023-0460
cert-bund: CB-K20/0029
cert-bund: CB-K19/1121
cert-bund: CB-K19/0907
cert-bund: CB-K19/0616
cert-bund: CB-K19/0320
cert-bund: CB-K19/0050
cert-bund: CB-K18/0963
dfn-cert: DFN-CERT-2019-2710
dfn-cert: DFN-CERT-2019-2159
dfn-cert: DFN-CERT-2019-1562
dfn-cert: DFN-CERT-2019-1237
dfn-cert: DFN-CERT-2019-0771
dfn-cert: DFN-CERT-2019-0147
dfn-cert: DFN-CERT-2019-0104
dfn-cert: DFN-CERT-2018-2435
dfn-cert: DFN-CERT-2018-2165
dfn-cert: DFN-CERT-2018-2142
dfn-cert: DFN-CERT-2018-2000
[ return to [Link] ]
2 RESULTS PER HOST 521
NVT: Oracle MySQL Server 5.5 <= 5.5.28 Security Update (cpujan2013) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.5.29 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5 through 5.5.28.
References
cve: CVE-2012-5612
cve: CVE-2013-0386
cve: CVE-2013-0368
. . . continues on next page . . .
2 RESULTS PER HOST 522
Summary
Oracle MySQL server is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow an attacker to disclose potentially sensitive information, ma-
nipulate certain data and cause a DoS (Denial of Service).
Solution:
Solution type: VendorFix
Apply the patch from the references or upgrade to latest version.
Aected Software/OS
Oracle MySQL version 5.1.x to 5.1.65 and Oracle MySQL version 5.5.x to 5.5.27 on Windows.
Vulnerability Insight
The aws are due to multiple unspecied errors in MySQL server component related to server
installation and server optimizer.
References
cve: CVE-2012-3180
cve: CVE-2012-3177
cve: CVE-2012-3160
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2012-2200
dfn-cert: DFN-CERT-2012-2118
NVT: Oracle MySQL Server <= 5.1.65 / 5.5 <= 5.5.27 Security Update (cpujan2013) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 524
Aected Software/OS
Oracle MySQL Server versions 5.1.65 and prior and 5.5 through 5.5.27.
Vulnerability Insight
The aw allows remote authenticated users to aect availability, related to GIS Extension.
References
cve: CVE-2012-5060
url: [Link]
advisory-id: cpujan2013
dfn-cert: DFN-CERT-2013-0079
NVT: Oracle MySQL Server 5.5.x <= 5.5.23 Security Update (cpujul2012) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
The aws allow remote authenticated users to aect availability via unknown vectors related to
the 'Server Optimizer' and 'InnoDB' package / privilege.
Solution:
Solution type: VendorFix
Update to version 5.5.24 or later.
Aected Software/OS
Oracle MySQL Server 5.5.x through 5.5.23.
References
cve: CVE-2012-1735
cve: CVE-2012-1757
cve: CVE-2012-1756
url: [Link]
advisory-id: cpujul2012
dfn-cert: DFN-CERT-2012-1389
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 526
Impact
Successful exploitation could allow remote authenticated users to aect availability via unknown
vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
MySQL version 5.1.x before 5.1.62 and 5.5.x before 5.5.22.
Vulnerability Insight
Multiple unspecied errors exist in the Server Optimizer and Server DML components.
References
cve: CVE-2012-1690
cve: CVE-2012-1688
cve: CVE-2012-1703
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→pendixMSQL
dfn-cert: DFN-CERT-2012-2118
dfn-cert: DFN-CERT-2012-1170
dfn-cert: DFN-CERT-2012-0939
. . . continues on next page . . .
2 RESULTS PER HOST 527
Summary
Oracle MySQL is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote to have an impact on availability,
condentiality and integrity.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.53 and earlier, 5.6.34 and earlier, 5.7.16 and earlier on Windows
Vulnerability Insight
Multiple aws exist due to: multiple unspecied errors in sub components 'Error Handling',
'Logging', 'MyISAM', 'Packaging', 'Optimizer', 'DML' and 'DDL'.
References
cve: CVE-2017-3238
cve: CVE-2017-3318
cve: CVE-2017-3291
cve: CVE-2017-3317
cve: CVE-2017-3258
cve: CVE-2017-3312
cve: CVE-2017-3313
cve: CVE-2017-3244
cve: CVE-2017-3265
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K18/0224
cert-bund: CB-K17/1732
cert-bund: CB-K17/1604
cert-bund: CB-K17/1298
cert-bund: CB-K17/0927
cert-bund: CB-K17/0423
cert-bund: CB-K17/0098
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1806
dfn-cert: DFN-CERT-2017-1675
dfn-cert: DFN-CERT-2017-1341
dfn-cert: DFN-CERT-2017-0959
dfn-cert: DFN-CERT-2017-0430
dfn-cert: DFN-CERT-2017-0090
2 RESULTS PER HOST 529
NVT: Oracle MySQL Server <= 5.1.66 / 5.5 <= 5.5.28 Security Update (cpuapr2013) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.1.67, 5.5.29 or later.
Aected Software/OS
Oracle MySQL Server versions 5.1.66 and prior and 5.5 through 5.5.28.
References
cve: CVE-2013-1531
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0839
. . . continues on next page . . .
2 RESULTS PER HOST 530
NVT: Oracle MySQL Server <= 5.5.50 / 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update
(cpuoct2016) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation of this vulnerability will allow a remote authenticated user to cause denial
of service conditions.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.50 and prior, 5.6 through 5.6.31 and 5.7 through 5.7.13.
Vulnerability Insight
The aw exists due to an unspecied error in the 'Server: DML' component.
References
cve: CVE-2016-5612
url: [Link]
advisory-id: cpuoct2016
cert-bund: CB-K16/1979
cert-bund: CB-K16/1755
cert-bund: CB-K16/1742
cert-bund: CB-K16/1714
cert-bund: CB-K16/1624
dfn-cert: DFN-CERT-2016-2089
dfn-cert: DFN-CERT-2016-1859
dfn-cert: DFN-CERT-2016-1849
dfn-cert: DFN-CERT-2016-1790
dfn-cert: DFN-CERT-2016-1714
NVT: Oracle MySQL Server <= 5.5.31 / 5.6 <= 5.6.11 Security Update (cpujan2016) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Aected Software/OS
Oracle MySQL Server versions 5.5.31 and prior and 5.6 through 5.6.11.
Vulnerability Insight
Unspecied errors exist in the 'MySQL Server' component via unknown vectors.
References
cve: CVE-2016-0502
url: [Link]
url: [Link]
advisory-id: cpujan2016
cert-bund: WID-SEC-2024-1482
cert-bund: CB-K16/0246
cert-bund: CB-K16/0245
cert-bund: CB-K16/0094
dfn-cert: DFN-CERT-2016-0266
dfn-cert: DFN-CERT-2016-0265
dfn-cert: DFN-CERT-2016-0104
NVT: Oracle MySQL Server <= 5.1.68 / 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update
(cpuapr2013) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation could allow remote attackers to aect condentiality, integrity, and avail-
ability via unknown vectors.
Solution:
Solution type: VendorFix
Update to version 5.1.69, 5.5.31, 5.6.11 or later.
Aected Software/OS
Oracle MySQL Server versions 5.1.68 and prior, 5.5 through 5.5.30 and 5.6 through 5.6.10.
Vulnerability Insight
Unspecied error in Server Optimizer, Server Privileges, InnoDB, and in some unspecied vectors.
References
cve: CVE-2013-2375
cve: CVE-2013-1544
cve: CVE-2013-1532
cve: CVE-2013-2389
cve: CVE-2013-2392
. . . continues on next page . . .
2 RESULTS PER HOST 534
NVT: Oracle MySQL Server <= 5.1.67 / 5.5 <= 5.5.29 / 5.6 <= 5.6.10 Security Update
(cpuapr2013) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation could allow remote attackers to aect condentiality, integrity, and avail-
ability via unknown vectors.
Solution:
Solution type: VendorFix
Update to version 5.1.68, 5.5.30, 5.6.11 or later.
Aected Software/OS
Oracle MySQL Server versions 5.1.67 and prior, 5.5 through 5.5.29 and 5.6 through 5.6.10.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 535
References
cve: CVE-2013-2378
cve: CVE-2013-1506
url: [Link]
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0839
dfn-cert: DFN-CERT-2013-0798
NVT: Oracle MySQL Server <= 5.1.67 / 5.5 <= 5.5.29 Security Update (cpuapr2013) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 536
Solution:
Solution type: VendorFix
Update to version 5.1.68, 5.5.30 or later.
Aected Software/OS
Oracle MySQL Server versions 5.1.67 and prior and 5.5 through 5.5.29.
Vulnerability Insight
Unspecied error in Server Partition and in some unspecied vectors.
References
cve: CVE-2013-1521
cve: CVE-2013-1552
cve: CVE-2013-1555
cve: CVE-2012-5614
url: [Link]
url: [Link]
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0839
dfn-cert: DFN-CERT-2013-0798
NVT: Oracle MySQL Server <= 5.6.46 Security Update (cpujan2020) - Windows
Summary
Oracle MySQL Server is prone to an unspecied denial of service vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.6.47 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.46 and prior.
References
cve: CVE-2020-2579
url: [Link]
advisory-id: cpujan2020
cert-bund: CB-K20/0038
dfn-cert: DFN-CERT-2020-1827
dfn-cert: DFN-CERT-2020-1078
dfn-cert: DFN-CERT-2020-0096
2 RESULTS PER HOST 538
NVT: Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 / 8.0 <= 8.0.17 Security Update
(cpuoct2019) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.6.46, 5.7.28, 8.0.18 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.45 and prior, 5.7 through 5.7.27 and 8.0 through 8.0.17.
Vulnerability Insight
Oracle MySQL Server is prone to multiple vulnerabilities.
For further information refer to the ocial advisory via the referenced link.
NVT: Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Update (cpu-
jul2019) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 540
Aected Software/OS
Oracle MySQL Server versions 5.6.44 and prior, 5.7 through 5.7.26 and 8.0 through 8.0.16.
Vulnerability Insight
Oracle MySQL Server is prone to multiple denial of service vulnerabilities.
For further information refer to the ocial advisory via the referenced link.
References
cve: CVE-2019-2805
cve: CVE-2019-2740
cve: CVE-2019-2819
cve: CVE-2019-2739
cve: CVE-2019-2737
cve: CVE-2019-2738
url: [Link]
advisory-id: cpujul2019
cert-bund: CB-K19/0620
dfn-cert: DFN-CERT-2020-2620
dfn-cert: DFN-CERT-2020-2180
dfn-cert: DFN-CERT-2020-0658
dfn-cert: DFN-CERT-2020-0517
dfn-cert: DFN-CERT-2019-2695
dfn-cert: DFN-CERT-2019-2656
dfn-cert: DFN-CERT-2019-2300
dfn-cert: DFN-CERT-2019-2008
dfn-cert: DFN-CERT-2019-1713
dfn-cert: DFN-CERT-2019-1683
dfn-cert: DFN-CERT-2019-1568
dfn-cert: DFN-CERT-2019-1453
2 RESULTS PER HOST 541
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.36 and earlier and 5.6.16 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Performance
Schema, Options, RBR.
References
. . . continues on next page . . .
2 RESULTS PER HOST 542
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 543
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to SRINFOSC
and SRCHAR.
References
cve: CVE-2014-4258
cve: CVE-2014-4260
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→ty_patches
url: [Link]
,→ppendixMSQL
cert-bund: CB-K15/0567
cert-bund: CB-K14/1420
cert-bund: CB-K14/0891
cert-bund: CB-K14/0868
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2014-1500
dfn-cert: DFN-CERT-2014-0930
dfn-cert: DFN-CERT-2014-0911
Summary
Oracle MySQL is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle MySQL version 5.5.60 and earlier, 5.6.40 and earlier, 5.7.22 and earlier.
Vulnerability Insight
Multiple aws exist due to errors in 'Server: Security: Encryption', 'Server: Options', 'MyISAM',
'Client mysqldump' components of application.
References
cve: CVE-2018-2767
cve: CVE-2018-3066
cve: CVE-2018-3058
cve: CVE-2018-3070
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 545
NVT: Oracle MySQL Server <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpuapr2021) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.33, 8.0.23 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.32 and prior and 8.0 through 8.0.22.
References
cve: CVE-2020-1971
cve: CVE-2021-2178
cve: CVE-2021-2202
url: [Link]
advisory-id: cpuapr2021
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2023-0067
cert-bund: WID-SEC-2023-0065
cert-bund: WID-SEC-2022-2047
cert-bund: WID-SEC-2022-1908
cert-bund: WID-SEC-2022-1000
cert-bund: WID-SEC-2022-0585
cert-bund: CB-K21/1065
cert-bund: CB-K21/0788
cert-bund: CB-K21/0615
cert-bund: CB-K21/0421
cert-bund: CB-K21/0111
cert-bund: CB-K21/0062
cert-bund: CB-K21/0006
cert-bund: CB-K20/1217
dfn-cert: DFN-CERT-2022-1582
dfn-cert: DFN-CERT-2022-1215
dfn-cert: DFN-CERT-2022-0076
dfn-cert: DFN-CERT-2021-2190
dfn-cert: DFN-CERT-2021-2155
dfn-cert: DFN-CERT-2021-2126
dfn-cert: DFN-CERT-2021-1504
dfn-cert: DFN-CERT-2021-1225
dfn-cert: DFN-CERT-2021-0924
dfn-cert: DFN-CERT-2021-0862
dfn-cert: DFN-CERT-2021-0828
dfn-cert: DFN-CERT-2021-0826
dfn-cert: DFN-CERT-2021-0821
dfn-cert: DFN-CERT-2021-0819
dfn-cert: DFN-CERT-2021-0715
dfn-cert: DFN-CERT-2021-0408
. . . continues on next page . . .
2 RESULTS PER HOST 547
Summary
Oracle MySQL is prone to multiple denial of service (DoS) vulnerabilities.
Impact
Successful exploitation of these vulnerabilities will allow remote attackers to conduct a denial-
of-service attack.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.58 and earlier, 5.6.38 and earlier, 5.7.20 and earlier on Windows
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 548
References
cve: CVE-2018-2668
cve: CVE-2018-2665
cve: CVE-2018-2622
cve: CVE-2018-2640
url: [Link]
cert-bund: CB-K18/0480
cert-bund: CB-K18/0392
cert-bund: CB-K18/0265
cert-bund: CB-K18/0096
dfn-cert: DFN-CERT-2019-1047
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-1265
dfn-cert: DFN-CERT-2018-0515
dfn-cert: DFN-CERT-2018-0424
dfn-cert: DFN-CERT-2018-0286
dfn-cert: DFN-CERT-2018-0101
NVT: Oracle MySQL Server <= 5.5.51 Security Update (cpuoct2016) - Windows
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 549
Impact
Successful exploitation of this vulnerability will allow a remote authenticated user to cause denial
of service conditions.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.51 and prior.
Vulnerability Insight
The aw exists due to an unspecied error within the 'Server:DML' component.
References
cve: CVE-2016-5624
url: [Link]
advisory-id: cpuoct2016
cert-bund: CB-K16/1846
cert-bund: CB-K16/1714
cert-bund: CB-K16/1624
dfn-cert: DFN-CERT-2016-1950
dfn-cert: DFN-CERT-2016-1790
dfn-cert: DFN-CERT-2016-1714
2 RESULTS PER HOST 550
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote attackers to compromise availability
of the system.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.57 and earlier, 5.6.37 and earlier, 5.7.11 and earlier on Windows.
Vulnerability Insight
The aw exists due to an error in 'Server: Optimizer'
References
cve: CVE-2017-10378
url: [Link]
url: [Link]
cert-bund: CB-K18/0480
cert-bund: CB-K18/0242
cert-bund: CB-K18/0224
cert-bund: CB-K17/2048
cert-bund: CB-K17/1748
dfn-cert: DFN-CERT-2019-1047
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-1265
dfn-cert: DFN-CERT-2018-0515
dfn-cert: DFN-CERT-2018-0260
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-2137
dfn-cert: DFN-CERT-2017-1827
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote to compromise availability con-
dentiality, and integrity of the system.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 552
Aected Software/OS
Oracle MySQL version 5.5.57 and earlier, 5.6.37 and earlier, 5.7.19 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to:
- An error in 'Client programs' component.
- An error in 'Server: DDL'.
- An error in 'Server: Replication'
References
cve: CVE-2017-10379
cve: CVE-2017-10384
cve: CVE-2017-10268
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K18/0480
cert-bund: CB-K18/0242
cert-bund: CB-K18/0224
cert-bund: CB-K17/2048
cert-bund: CB-K17/1748
dfn-cert: DFN-CERT-2019-1047
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-1265
dfn-cert: DFN-CERT-2018-0515
dfn-cert: DFN-CERT-2018-0260
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-2137
dfn-cert: DFN-CERT-2017-1827
2 RESULTS PER HOST 553
NVT: Oracle MySQL Server <= 5.6.49 / 5.7 <= 5.7.31 / 8.0 <= 8.0.21 Security Update
(cpuoct2020) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.6.50, 5.7.32, 8.0.22 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.49 and prior, 5.7 through 5.7.31 and 8.0 through 8.0.21.
References
cve: CVE-2020-14765
cve: CVE-2020-14769
cve: CVE-2020-14812
. . . continues on next page . . .
2 RESULTS PER HOST 554
NVT: Oracle MySQL Server <= 8.0.41, 8.1 <= 8.4.4, 9.0 <= 9.2.0 Security Update
(cpuapr2025)- Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 8.0.42, 8.4.5, 9.3.0 or later.
Aected Software/OS
Oracle MySQL Server version 8.0.41 and prior, 8.1 through 8.4.4 and 9.0 through 9.2.0.
References
cve: CVE-2025-21577
cve: CVE-2025-30682
cve: CVE-2025-30687
cve: CVE-2025-30688
cve: CVE-2025-21574
cve: CVE-2025-21575
cve: CVE-2025-30693
cve: CVE-2025-30695
cve: CVE-2025-30715
cve: CVE-2025-21584
cve: CVE-2025-21580
cve: CVE-2025-21581
cve: CVE-2025-21585
cve: CVE-2025-30689
cve: CVE-2025-21579
cve: CVE-2025-30696
cve: CVE-2025-30705
cve: CVE-2025-30683
cve: CVE-2025-30684
cve: CVE-2025-30685
cve: CVE-2025-30699
cve: CVE-2025-30704
cve: CVE-2024-13176
cve: CVE-2024-9143
cve: CVE-2025-30721
cve: CVE-2025-30703
cve: CVE-2025-30681
url: [Link]
advisory-id: cpuapr2025
cert-bund: WID-SEC-2025-2364
cert-bund: WID-SEC-2025-1850
cert-bund: WID-SEC-2025-1572
cert-bund: WID-SEC-2025-1568
cert-bund: WID-SEC-2025-1566
. . . continues on next page . . .
2 RESULTS PER HOST 556
NVT: Oracle MySQL Server <= 5.5.38 / 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to disclose potentially sensitive information, gain
escalated privileges, manipulate certain data, cause a DoS (Denial of Service), and compromise
a vulnerable system.
Solution:
Solution type: VendorFix
Update to version 5.5.39, 5.6.20 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5.38 and prior and 5.6 through 5.6.19.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to
CLIENT:MYSQLADMIN, CLIENT:MYSQLDUMP, SERVER:MEMORY STORAGE ENGINE,
SERVER:SSL:yaSSL, SERVER:DML, SERVER:SSL:yaSSL, SERVER:REPLICATION ROW
FORMAT BINARY LOG DML, SERVER:CHARACTER SETS, and SERVER:MyISAM.
References
cve: CVE-2014-6530
cve: CVE-2012-5615
cve: CVE-2014-6495
cve: CVE-2014-6478
cve: CVE-2014-4274
cve: CVE-2014-4287
. . . continues on next page . . .
2 RESULTS PER HOST 558
Summary
Oracle MySQL server is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow an attacker to disclose potentially sensitive information, ma-
nipulate certain data, and cause a DoS (Denial of Service).
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 559
Aected Software/OS
Oracle MySQL version 5.5.x to 5.5.26 on Windows.
Vulnerability Insight
The aws are due to multiple unspecied errors in MySQL server component vectors related to
MySQL client and server.
References
cve: CVE-2012-3147
cve: CVE-2012-3149
cve: CVE-2012-3144
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/0919
dfn-cert: DFN-CERT-2013-1937
NVT: Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Update
(cpuoct2019) - Windows
Summary
Oracle MySQL Server is prone to a local unauthenticated vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.6.45, 5.7.27, 8.0.17 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.44 and prior, 5.7 through 5.7.26 and 8.0 through 8.0.16.
Vulnerability Insight
Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure
where MySQL Server executes to compromise MySQL Server.
References
cve: CVE-2019-2969
url: [Link]
advisory-id: cpuoct2019
cert-bund: CB-K19/0915
dfn-cert: DFN-CERT-2019-2149
2 RESULTS PER HOST 561
NVT: Oracle MySQL Server <= 5.5.47 / 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update
(cpuapr2016v3) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.47 and prior, 5.6 through 5.6.28 and 5.7 through 5.7.10.
Vulnerability Insight
Unspecied errors exist in the 'MySQL Server' component via unknown vectors.
References
cve: CVE-2016-0649
cve: CVE-2016-0650
cve: CVE-2016-0644
cve: CVE-2016-0646
cve: CVE-2016-0640
cve: CVE-2016-0641
url: [Link]
advisory-id: cpuapr2016v3
cert-bund: CB-K16/1122
cert-bund: CB-K16/0936
cert-bund: CB-K16/0791
cert-bund: CB-K16/0750
cert-bund: CB-K16/0646
cert-bund: CB-K16/0597
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0994
dfn-cert: DFN-CERT-2016-0903
dfn-cert: DFN-CERT-2016-0845
dfn-cert: DFN-CERT-2016-0803
dfn-cert: DFN-CERT-2016-0695
dfn-cert: DFN-CERT-2016-0644
NVT: Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows
Summary
Oracle MySQL Server is prone to a vulnerability in a third party library.
Impact
The aw makes it easier for remote attackers to obtain private RSA keys by capturing TLS
handshakes, aka a Lenstra attack.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.45 and prior and 5.6 through 5.6.26.
Vulnerability Insight
wolfSSL (formerly CyaSSL) as used in MySQL does not properly handle faults associated with
the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without
low memory optimizations on a server.
References
cve: CVE-2015-7744
url: [Link]
advisory-id: cpujan2016
cert-bund: WID-SEC-2024-1482
cert-bund: CB-K16/0246
cert-bund: CB-K16/0245
cert-bund: CB-K16/0094
dfn-cert: DFN-CERT-2016-0266
dfn-cert: DFN-CERT-2016-0265
dfn-cert: DFN-CERT-2016-0104
2 RESULTS PER HOST 564
NVT: Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Update
(cpuapr2019) - Windows
Summary
Oracle MySQL Server is prone to a vulnerability in the libmysqld subcomponent.
Solution:
Solution type: VendorFix
Update to version 5.6.43, 5.7.25, 8.0.14 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.42 and prior, 5.7 through 5.7.24 and 8.0 through 8.0.13.
Vulnerability Insight
Dicult to exploit vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized access to critical data or complete access to all MySQL Server accessible data.
References
cve: CVE-2018-3123
url: [Link]
advisory-id: cpuapr2019
cert-bund: WID-SEC-2023-1594
cert-bund: CB-K19/0319
dfn-cert: DFN-CERT-2019-0775
NVT: Oracle MySQL Server <= 5.6.43 / 5.7 <= 5.7.25 / 8.0 <= 8.0.15 Security Update
(cpuapr2019) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.6.44, 5.7.26, 8.0.16 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.43 and prior, 5.7 through 5.7.25 and 8.0 through 8.0.15.
Vulnerability Insight
The attacks range in variety and diculty. Most of them allow an attacker with network access
via multiple protocols to compromise the MySQL Server.
For further information refer to the ocial advisory via the referenced link.
References
cve: CVE-2019-1559
cve: CVE-2019-2683
cve: CVE-2019-2627
cve: CVE-2019-2614
url: [Link]
advisory-id: cpuapr2019
cert-bund: WID-SEC-2023-2946
cert-bund: WID-SEC-2023-1594
cert-bund: WID-SEC-2022-0673
cert-bund: WID-SEC-2022-0462
cert-bund: CB-K22/0045
cert-bund: CB-K20/0041
cert-bund: CB-K19/0911
cert-bund: CB-K19/0639
cert-bund: CB-K19/0623
cert-bund: CB-K19/0622
cert-bund: CB-K19/0620
cert-bund: CB-K19/0619
cert-bund: CB-K19/0615
cert-bund: CB-K19/0332
cert-bund: CB-K19/0320
cert-bund: CB-K19/0319
cert-bund: CB-K19/0173
dfn-cert: DFN-CERT-2020-2620
dfn-cert: DFN-CERT-2020-2189
dfn-cert: DFN-CERT-2020-2180
dfn-cert: DFN-CERT-2020-0092
dfn-cert: DFN-CERT-2020-0048
dfn-cert: DFN-CERT-2019-2625
dfn-cert: DFN-CERT-2019-2457
dfn-cert: DFN-CERT-2019-2300
dfn-cert: DFN-CERT-2019-2274
dfn-cert: DFN-CERT-2019-2158
dfn-cert: DFN-CERT-2019-2157
dfn-cert: DFN-CERT-2019-2046
. . . continues on next page . . .
2 RESULTS PER HOST 567
NVT: Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpujul2023) - Windows
Summary
Oracle MySQL Server is prone to a unspecied vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.43, 8.0.34 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.42 and prior and 8.x through 8.0.33.
References
cve: CVE-2023-22053
url: [Link]
advisory-id: cpujul2023
cert-bund: WID-SEC-2024-1248
cert-bund: WID-SEC-2023-1794
dfn-cert: DFN-CERT-2024-1188
dfn-cert: DFN-CERT-2024-0593
dfn-cert: DFN-CERT-2024-0491
dfn-cert: DFN-CERT-2024-0454
dfn-cert: DFN-CERT-2023-1642
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 569
Impact
Successful exploitation will allow man-in-the-middle attackers to spoof servers via a cleartext-
downgrade attack.
Solution:
Solution type: VendorFix
Upgrade to version Oracle MySQL Server 5.7.3 or later.
Aected Software/OS
Oracle MySQL Server 5.7.2 and earlier on Windows.
Vulnerability Insight
The aw exists due to improper validation of MySQL client library when establishing a secure
connection to a MySQL server using the ssl option.
References
cve: CVE-2015-3152
url: [Link]
url: [Link]
cert-bund: CB-K18/0871
cert-bund: CB-K16/0944
cert-bund: CB-K15/1045
cert-bund: CB-K15/1042
cert-bund: CB-K15/1020
. . . continues on next page . . .
2 RESULTS PER HOST 570
NVT: Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update
(cpuapr2016v3) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow remote users to aect condentiality, integrity, and availability
via unknown vectors.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.11.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 571
References
cve: CVE-2016-0666
cve: CVE-2016-0647
cve: CVE-2016-0648
cve: CVE-2016-0642
cve: CVE-2016-0643
cve: CVE-2016-2047
url: [Link]
advisory-id: cpuapr2016v3
cert-bund: CB-K16/1129
cert-bund: CB-K16/1122
cert-bund: CB-K16/0936
cert-bund: CB-K16/0791
cert-bund: CB-K16/0750
cert-bund: CB-K16/0646
cert-bund: CB-K16/0597
cert-bund: CB-K16/0493
cert-bund: CB-K16/0133
dfn-cert: DFN-CERT-2016-1204
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0994
dfn-cert: DFN-CERT-2016-0903
dfn-cert: DFN-CERT-2016-0845
dfn-cert: DFN-CERT-2016-0803
dfn-cert: DFN-CERT-2016-0695
dfn-cert: DFN-CERT-2016-0644
dfn-cert: DFN-CERT-2016-0532
dfn-cert: DFN-CERT-2016-0143
2 RESULTS PER HOST 572
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to cause a denial of service.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier on windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Server :
Optimizer, DDL, Server : Compiling, Server : Federated.
References
cve: CVE-2015-2571
cve: CVE-2015-0505
cve: CVE-2015-0501
cve: CVE-2015-0499
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-2068
cert-bund: CB-K15/1546
cert-bund: CB-K15/1518
cert-bund: CB-K15/1202
cert-bund: CB-K15/1193
cert-bund: CB-K15/1045
cert-bund: CB-K15/1042
cert-bund: CB-K15/0964
cert-bund: CB-K15/0720
cert-bund: CB-K15/0531
dfn-cert: DFN-CERT-2015-1623
dfn-cert: DFN-CERT-2015-1604
dfn-cert: DFN-CERT-2015-1272
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-1105
dfn-cert: DFN-CERT-2015-1096
dfn-cert: DFN-CERT-2015-1016
dfn-cert: DFN-CERT-2015-0758
dfn-cert: DFN-CERT-2015-0551
NVT: Oracle MySQL Server <= 5.5.46 Security Update (cpuapr2016v3) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow local users to aect availability.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.46 and prior.
Vulnerability Insight
Unspecied error exists in the 'MySQL Server' component via unknown vectors related to 'Op-
timizer'.
References
cve: CVE-2016-0651
url: [Link]
advisory-id: cpuapr2016v3
cert-bund: CB-K16/1122
cert-bund: CB-K16/0936
cert-bund: CB-K16/0791
cert-bund: CB-K16/0597
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0994
dfn-cert: DFN-CERT-2016-0845
dfn-cert: DFN-CERT-2016-0644
2 RESULTS PER HOST 575
NVT: Oracle MySQL Server <= 8.0.43, 8.1.x <= 8.4.7, 9.0.0 <= 9.4.0 Security Update
(cpuoct2025) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 8.0.44, 8.4.7, 9.4.1 or later.
Aected Software/OS
Oracle MySQL Server versions 8.0.43 and prior, 8.1.x through 8.4.6 and 9.0.0 through 9.4.0.
Note: While not explicitly mentioned by the vendor (due to the EOL status of these branches)
it is assumed that all versions prior to 8.x and versions like 9.2.x in between are also aected by
these aws. If you disagree with this assessment and want to accept the risk please create an
override for this result.
NVT: Oracle MySQL Server <= 5.1.66 / 5.5 <= 5.5.28 Security Update (cpujan2013) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.1.67, 5.5.29 or later.
Aected Software/OS
Oracle MySQL Server versions 5.1.66 and prior and 5.5 through 5.5.28.
References
cve: CVE-2012-5611
cve: CVE-2013-0384
cve: CVE-2013-0389
cve: CVE-2013-0385
cve: CVE-2013-0375
cve: CVE-2012-1702
cve: CVE-2013-0383
cve: CVE-2012-0572
cve: CVE-2012-0574
cve: CVE-2012-1705
cve: CVE-2012-4414
url: [Link]
advisory-id: cpujan2013
cert-bund: CB-K13/0919
cert-bund: CB-K13/0603
dfn-cert: DFN-CERT-2013-1937
dfn-cert: DFN-CERT-2013-1597
dfn-cert: DFN-CERT-2013-0259
dfn-cert: DFN-CERT-2013-0192
dfn-cert: DFN-CERT-2013-0119
dfn-cert: DFN-CERT-2013-0118
dfn-cert: DFN-CERT-2013-0106
dfn-cert: DFN-CERT-2013-0079
dfn-cert: DFN-CERT-2013-0037
dfn-cert: DFN-CERT-2013-0028
dfn-cert: DFN-CERT-2012-2285
dfn-cert: DFN-CERT-2012-2258
dfn-cert: DFN-CERT-2012-2215
dfn-cert: DFN-CERT-2012-2200
2 RESULTS PER HOST 578
NVT: Oracle MySQL Server <= 8.0.39, 8.1 <= 8.4.1, 9.0 <= 9.0.1 Security Update (cpuoct2024)
- Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 8.0.40, 8.4.2, 9.0.2 or later.
Aected Software/OS
Oracle MySQL Server version 8.0.39 and prior, 8.1 through 8.4.1 and 9.0 through 9.0.1.
References
cve: CVE-2024-21238
url: [Link]
advisory-id: cpuoct2024
. . . continues on next page . . .
2 RESULTS PER HOST 579
NVT: Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.30 Security Update (cpuoct2022) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.40, 8.0.31 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.39 and prior and 8.0 through 8.0.30.
NVT: Oracle MySQL Server <= 5.6.46 / 5.7 <= 5.7.26 Security Update (cpuapr2020) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities in OpenSSL.
Solution:
Solution type: VendorFix
Update to version 5.6.47, 5.7.27 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.46 and prior and 5.7 through 5.7.26.
References
cve: CVE-2019-1547
cve: CVE-2019-1549
cve: CVE-2019-1552
cve: CVE-2019-1563
url: [Link]
advisory-id: cpuapr2020
cert-bund: WID-SEC-2023-3081
cert-bund: WID-SEC-2023-1762
. . . continues on next page . . .
2 RESULTS PER HOST 582
NVT: Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 Security Update (cpuoct2019) - Windows
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 583
Solution:
Solution type: VendorFix
Update to version 5.6.46, 5.7.28 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.45 and prior and 5.7 through 5.7.27.
Vulnerability Insight
Oracle MySQL Server is prone to multiple vulnerabilities.
For further information refer to the ocial advisory via the referenced link.
References
cve: CVE-2019-2922
cve: CVE-2019-2923
cve: CVE-2019-2924
cve: CVE-2019-2910
url: [Link]
advisory-id: cpuoct2019
cert-bund: CB-K19/0915
dfn-cert: DFN-CERT-2020-0103
dfn-cert: DFN-CERT-2019-2149
2 RESULTS PER HOST 584
Summary
Oracle MySQL is prone to a security bypass vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote attackers to bypass certain security
restrictions and perform unauthorized actions by conducting a man-in-the-middle attack. This
may lead to other attacks also.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.54 and earlier, 5.6.35 and earlier on Windows
Vulnerability Insight
The aw exists due to an incorrect implementation or enforcement of 'ssl-mode=REQUIRED'
in MySQL.
References
cve: CVE-2017-3305
url: [Link]
url: [Link]
cert-bund: CB-K17/1604
cert-bund: CB-K17/1239
cert-bund: CB-K17/0657
dfn-cert: DFN-CERT-2017-1675
dfn-cert: DFN-CERT-2017-1282
dfn-cert: DFN-CERT-2017-0675
Summary
Oracle MySQL is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to have an impact on
condentiality, integrity and availability.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier, on Windows
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 586
References
cve: CVE-2017-3651
cve: CVE-2017-3653
cve: CVE-2017-3652
cve: CVE-2017-3635
cve: CVE-2017-3648
cve: CVE-2017-3641
url: [Link]
,→#AppendixMSQL
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K18/0224
cert-bund: CB-K17/1870
cert-bund: CB-K17/1732
cert-bund: CB-K17/1604
cert-bund: CB-K17/1453
cert-bund: CB-K17/1401
cert-bund: CB-K17/1298
cert-bund: CB-K17/1239
cert-bund: CB-K17/1205
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1956
dfn-cert: DFN-CERT-2017-1806
. . . continues on next page . . .
2 RESULTS PER HOST 587
Summary
Oracle MySQL is prone to vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote attackers to partially access data,
partially modify data, and partially deny service.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.56 and earlier, 5.6.36 and earlier, on Windows
Vulnerability Insight
The aw exists due to an error in the Client programs component.
References
cve: CVE-2017-3636
url: [Link]
,→#AppendixMSQL
url: [Link]
cert-bund: CB-K18/0224
cert-bund: CB-K17/1870
cert-bund: CB-K17/1604
cert-bund: CB-K17/1453
cert-bund: CB-K17/1401
cert-bund: CB-K17/1239
cert-bund: CB-K17/1205
dfn-cert: DFN-CERT-2018-1276
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1956
dfn-cert: DFN-CERT-2017-1675
dfn-cert: DFN-CERT-2017-1519
dfn-cert: DFN-CERT-2017-1465
dfn-cert: DFN-CERT-2017-1282
dfn-cert: DFN-CERT-2017-1243
Summary
MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow remote authenticated users to aect availability via unknown
vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL 5.5.30 and earlier and 5.6.10 on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Prepared
Statements, Server Options and Server Partition.
References
cve: CVE-2013-3801
cve: CVE-2013-3805
cve: CVE-2013-3794
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/0919
cert-bund: CB-K13/0620
dfn-cert: DFN-CERT-2013-1937
dfn-cert: DFN-CERT-2013-1599
dfn-cert: DFN-CERT-2013-1553
dfn-cert: DFN-CERT-2013-1478
2 RESULTS PER HOST 590
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to cause a denial of service.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier on windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to DDL, Server
: Security : Privileges, Server : Security : Encryption, InnoDB : DML.
References
cve: CVE-2015-2573
cve: CVE-2015-2568
cve: CVE-2015-0441
cve: CVE-2015-0433
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-2068
cert-bund: CB-K15/1546
cert-bund: CB-K15/1202
cert-bund: CB-K15/1193
cert-bund: CB-K15/1045
cert-bund: CB-K15/1042
cert-bund: CB-K15/0964
cert-bund: CB-K15/0720
cert-bund: CB-K15/0531
dfn-cert: DFN-CERT-2015-1623
dfn-cert: DFN-CERT-2015-1272
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-1105
dfn-cert: DFN-CERT-2015-1096
dfn-cert: DFN-CERT-2015-1016
dfn-cert: DFN-CERT-2015-0758
dfn-cert: DFN-CERT-2015-0551
NVT: Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.31 Security Update (cpuoct2023) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.7.43, 8.0.32 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.42 and prior and 8.x through 8.0.31.
References
cve: CVE-2023-22015
cve: CVE-2023-22026
url: [Link]
advisory-id: cpuoct2023
cert-bund: WID-SEC-2023-2690
dfn-cert: DFN-CERT-2023-2536
NVT: Oracle MySQL Server <= 5.7.33 Security Update (cpuapr2021) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.34 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.33 and prior.
References
cve: CVE-2021-2154
url: [Link]
advisory-id: cpuapr2021
cert-bund: WID-SEC-2023-0065
cert-bund: CB-K21/0421
dfn-cert: DFN-CERT-2022-1241
dfn-cert: DFN-CERT-2022-0933
dfn-cert: DFN-CERT-2022-0666
dfn-cert: DFN-CERT-2021-1660
dfn-cert: DFN-CERT-2021-0984
dfn-cert: DFN-CERT-2021-0821
Summary
Oracle MySQL is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote attackers to conduct a denial-of-
service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle MySQL version 5.5.60 and earlier.
Vulnerability Insight
Multiple aws exist due to an error in the 'Server: Security: Privileges' component of MySQL
Server.
References
cve: CVE-2018-3063
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 595
NVT: Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpujul2023) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.42, 8.0.33 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.41 and prior and 8.x through 8.0.32.
References
cve: CVE-2023-22007
url: [Link]
advisory-id: cpujul2023
cert-bund: WID-SEC-2023-1794
dfn-cert: DFN-CERT-2024-1188
dfn-cert: DFN-CERT-2024-0593
dfn-cert: DFN-CERT-2024-0454
dfn-cert: DFN-CERT-2023-1642
NVT: Oracle MySQL Server Component 'Replication' Unspecied vulnerability (Oct 2013) -
Windows
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attackers to disclose sensitive information, manipulate
certain data, cause a DoS (Denial of Service) and bypass certain security restrictions.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Vulnerability Insight
Unspecied error in the MySQL Server component via unknown vectors related to Replication.
References
cve: CVE-2013-5807
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0187
cert-bund: CB-K13/1072
cert-bund: CB-K13/0840
cert-bund: CB-K13/0789
dfn-cert: DFN-CERT-2014-0190
dfn-cert: DFN-CERT-2013-2099
dfn-cert: DFN-CERT-2013-1846
dfn-cert: DFN-CERT-2013-1795
NVT: Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpu-
jan2021) - Windows
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 598
Impact
Successful attacks of this vulnerability can result in the unauthorized ability to cause a hang or
frequently repeatedly crash (complete DOS) the MySQL Server.
Solution:
Solution type: VendorFix
Update to version 5.6.51, 5.7.31, 8.0.18 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.50 and prior, 5.7 through 5.7.30 and 8.0 through 8.0.17.
References
cve: CVE-2021-2001
url: [Link]
advisory-id: cpujan2021
cert-bund: WID-SEC-2023-0067
cert-bund: CB-K21/0062
dfn-cert: DFN-CERT-2021-2155
dfn-cert: DFN-CERT-2021-0810
dfn-cert: DFN-CERT-2021-0131
2 RESULTS PER HOST 599
NVT: Oracle MySQL Server <= 8.0.35 Security Update (cpuoct2024) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 8.0.36 or later.
Aected Software/OS
Oracle MySQL Server version 8.0.35 and prior.
References
cve: CVE-2024-21200
url: [Link]
advisory-id: cpuoct2024
cert-bund: WID-SEC-2024-3188
dfn-cert: DFN-CERT-2024-2732
2 RESULTS PER HOST 600
NVT: Oracle MySQL Server <= 5.7.40 Security Update (cpujan2023) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.41 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.40 and prior.
References
cve: CVE-2023-21840
url: [Link]
advisory-id: cpujan2023
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2023-1424
. . . continues on next page . . .
2 RESULTS PER HOST 601
NVT: Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.31 Security Update (cpuoct2023) - Windows
Summary
Oracle MySQL Server is prone to denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.44, 8.0.32 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.43 and prior and 8.x through 8.0.31.
References
. . . continues on next page . . .
2 RESULTS PER HOST 602
NVT: Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpu-
jan2021) - Windows
Summary
Oracle MySQL Server is prone to multiple vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.6.51, 5.7.33, 8.0.23 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.50 and prior, 5.7 through 5.7.32 and 8.0 through 8.0.22.
References
cve: CVE-2021-2022
cve: CVE-2021-2060
url: [Link]
advisory-id: cpujan2021
cert-bund: WID-SEC-2023-0067
cert-bund: CB-K21/0062
dfn-cert: DFN-CERT-2021-2155
dfn-cert: DFN-CERT-2021-0131
NVT: Oracle MySQL Server <= 8.0.38, 8.1 <= 8.4.1, 9.0 <= 9.0.1 Security Update (cpuoct2024)
- Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 8.0.39, 8.4.2, 9.0.2 or later.
Aected Software/OS
Oracle MySQL Server version 8.0.38 and prior, 8.1 through 8.4.1 and 9.0 through 9.0.1.
References
cve: CVE-2024-21207
url: [Link]
advisory-id: cpuoct2024
cert-bund: WID-SEC-2024-3188
dfn-cert: DFN-CERT-2024-2732
NVT: Oracle MySQL Server <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpuapr2021) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.31, 8.0.18 or later.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 605
References
cve: CVE-2021-2160
url: [Link]
advisory-id: cpuapr2021
cert-bund: WID-SEC-2023-0065
cert-bund: CB-K21/0421
dfn-cert: DFN-CERT-2021-0821
NVT: Oracle MySQL Server 5.5 <= 5.5.29 / 5.6 <= 5.6.11 Security Update (cpuapr2013) -
Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 606
Aected Software/OS
Oracle MySQL Server versions 5.5 through 5.5.29 and 5.6 through 5.6.10.
References
cve: CVE-2013-1523
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0798
NVT: Oracle MySQL Server <= 8.0.39, 8.1 <= 8.4.0 Security Update (cpuoct2024) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 8.0.40, 8.4.1 or later.
Aected Software/OS
Oracle MySQL Server version 8.0.39 and prior and 8.1 through 8.4.0.
References
cve: CVE-2024-21212
url: [Link]
advisory-id: cpuoct2024
cert-bund: WID-SEC-2024-3188
dfn-cert: DFN-CERT-2025-0446
dfn-cert: DFN-CERT-2024-2732
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation of this vulnerability will allow remote to have some unspecied impact
on availability.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.53 and earlier on Windows
Vulnerability Insight
The aw exists due to an unspecied error in sub component 'Server: Charsets'.
References
cve: CVE-2017-3243
url: [Link]
url: [Link]
cert-bund: CB-K18/0224
cert-bund: CB-K17/1298
cert-bund: CB-K17/0098
dfn-cert: DFN-CERT-2018-0242
dfn-cert: DFN-CERT-2017-1341
dfn-cert: DFN-CERT-2017-0090
2 RESULTS PER HOST 609
NVT: Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpuoct2022) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.37, 8.0.28 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.36 and prior and 8.0 through 8.0.27.
References
cve: CVE-2022-21595
url: [Link]
advisory-id: cpuoct2022
cert-bund: WID-SEC-2024-1591
. . . continues on next page . . .
2 RESULTS PER HOST 610
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier on Windows
Vulnerability Insight
Unspecied errors exist in the MySQL Server component via unknown vectors related to Server
: Pluggable Auth and Server : Security : Privileges.
References
cve: CVE-2015-4737
cve: CVE-2015-2620
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1518
cert-bund: CB-K15/1202
cert-bund: CB-K15/1193
cert-bund: CB-K15/1045
cert-bund: CB-K15/1020
dfn-cert: DFN-CERT-2015-1604
dfn-cert: DFN-CERT-2015-1272
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-1096
dfn-cert: DFN-CERT-2015-1071
NVT: Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.29 Security Update (cpuoct2022) - Windows
Summary
Oracle MySQL Server is prone to an information disclosure vulnerability.
Aected Software/OS
Oracle MySQL Server version 5.7.39 and prior and 8.0 through 8.0.29.
References
cve: CVE-2022-21592
url: [Link]
advisory-id: cpuoct2022
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2022-1776
dfn-cert: DFN-CERT-2022-2306
NVT: Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.16 Security Update (cpuoct2022) - Windows
Summary
Oracle MySQL Server is prone to an information disclosure vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.40, 8.0.17 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.39 and prior and 8.0 through 8.0.16.
References
cve: CVE-2022-21589
url: [Link]
advisory-id: cpuoct2022
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2022-1776
dfn-cert: DFN-CERT-2022-2306
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 614
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Optimizer,
InnoDB, and Locking.
References
cve: CVE-2014-0386
cve: CVE-2014-0393
cve: CVE-2014-0402
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0710
cert-bund: CB-K14/0187
cert-bund: CB-K14/0177
. . . continues on next page . . .
2 RESULTS PER HOST 615
NVT: Oracle MySQL Server Component 'Optimizer' Unspecied vulnerability (Oct 2013) - Win-
dows
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attackers to disclose sensitive information, manipulate
certain data, cause a DoS (Denial of Service) and bypass certain security restrictions.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL versions 5.1.51 through 5.1.70, 5.5.10 through 5.5.32, and 5.6.x through 5.6.12
on Windows.
Vulnerability Insight
Unspecied error in the MySQL Server component via unknown vectors related to Optimizer.
References
cve: CVE-2013-3839
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0187
cert-bund: CB-K13/1072
cert-bund: CB-K13/0840
cert-bund: CB-K13/0806
cert-bund: CB-K13/0789
dfn-cert: DFN-CERT-2014-0190
dfn-cert: DFN-CERT-2013-2099
dfn-cert: DFN-CERT-2013-1846
dfn-cert: DFN-CERT-2013-1815
dfn-cert: DFN-CERT-2013-1795
Summary
Oracle MySQL server is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow an attacker to disclose potentially sensitive information, ma-
nipulate certain data.
Solution:
Solution type: VendorFix
Apply the patch from the referenced vendor advisory or upgrade to latest version.
Aected Software/OS
Oracle MySQL version 5.1.x to 5.1.63 and Oracle MySQL version 5.5.x to 5.5.25 on Windows.
Vulnerability Insight
The aws are due to multiple unspecied errors in MySQL server component vectors related to
InnoDB plugin, server full text search and InnoDB.
References
cve: CVE-2012-3173
cve: CVE-2012-3167
cve: CVE-2012-3166
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2012-2200
dfn-cert: DFN-CERT-2012-2118
2 RESULTS PER HOST 618
NVT: Oracle MySQL Server <= 5.5.46 Security Update (cpujan2016) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an authenticated remote attacker to aect availability via un-
known vectors.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.46 and prior.
Vulnerability Insight
Unspecied errors exist in the 'MySQL Server' component via unknown vectors.
References
cve: CVE-2016-0616
url: [Link]
advisory-id: cpujan2016
cert-bund: WID-SEC-2024-1482
cert-bund: CB-K16/1122
cert-bund: CB-K16/0936
cert-bund: CB-K16/0791
cert-bund: CB-K16/0493
cert-bund: CB-K16/0246
cert-bund: CB-K16/0245
cert-bund: CB-K16/0133
cert-bund: CB-K16/0094
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0994
dfn-cert: DFN-CERT-2016-0845
dfn-cert: DFN-CERT-2016-0532
dfn-cert: DFN-CERT-2016-0266
dfn-cert: DFN-CERT-2016-0265
dfn-cert: DFN-CERT-2016-0143
dfn-cert: DFN-CERT-2016-0104
NVT: Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 620
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.46 and prior and 5.6 through 5.6.27.
Vulnerability Insight
Unspecied errors exist in the 'MySQL Server' component via unknown vectors.
References
cve: CVE-2016-0596
url: [Link]
url: [Link]
url: [Link]
url: [Link]
advisory-id: cpujan2016
cert-bund: WID-SEC-2024-1482
cert-bund: CB-K16/1122
cert-bund: CB-K16/0936
cert-bund: CB-K16/0791
cert-bund: CB-K16/0646
cert-bund: CB-K16/0493
cert-bund: CB-K16/0246
cert-bund: CB-K16/0245
cert-bund: CB-K16/0133
cert-bund: CB-K16/0094
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0994
dfn-cert: DFN-CERT-2016-0845
. . . continues on next page . . .
2 RESULTS PER HOST 621
NVT: Oracle MySQL Server <= 5.5.38 Security Update (cpuoct2014) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow attackers to disclose potentially sensitive information, gain
escalated privileges, manipulate certain data, cause a DoS (Denial of Service), and compromise
a vulnerable system.
Solution:
Solution type: VendorFix
Update to version 5.5.39 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5.38 and prior.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to
SERVER:DDL.
References
cve: CVE-2014-6520
url: [Link]
url: [Link]
advisory-id: cpuoct2014
cert-bund: CB-K15/0567
cert-bund: CB-K15/0415
cert-bund: CB-K14/1482
cert-bund: CB-K14/1420
cert-bund: CB-K14/1412
cert-bund: CB-K14/1299
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2015-0427
dfn-cert: DFN-CERT-2014-1567
dfn-cert: DFN-CERT-2014-1500
dfn-cert: DFN-CERT-2014-1489
dfn-cert: DFN-CERT-2014-1357
NVT: Oracle MySQL Server <= 5.1.62 / 5.4.x <= 5.5.23 Security Update (cpujul2012) - Win-
dows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
The aws allow remote authenticated users to aect availability via unknown vectors related to
the 'Server Optimizer' and 'GIS Extension' package / privilege.
Solution:
Solution type: VendorFix
Update to version 5.1.63, 5.5.24 or later.
Aected Software/OS
Oracle MySQL Server 5.1.62 and prior and 5.4.x through 5.5.23.
References
cve: CVE-2012-0540
cve: CVE-2012-1734
cve: CVE-2012-2749
url: [Link]
advisory-id: cpujul2012
dfn-cert: DFN-CERT-2013-0106
dfn-cert: DFN-CERT-2012-2118
dfn-cert: DFN-CERT-2012-1389
NVT: Oracle MySQL Server <= 5.1.62 / 5.4.x <= 5.5.22 Security Update (cpujul2012) - Win-
dows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
The aw allows remote authenticated users to aect availability via unknown vectors related to
the 'Server Optimizer' package / privilege.
Solution:
Solution type: VendorFix
Update to version 5.1.63, 5.5.23 or later.
Aected Software/OS
Oracle MySQL Server 5.1.62 and prior and 5.4.x through 5.5.22.
References
cve: CVE-2012-1689
url: [Link]
advisory-id: cpujul2012
dfn-cert: DFN-CERT-2012-2118
dfn-cert: DFN-CERT-2012-1389
2 RESULTS PER HOST 625
NVT: Oracle MySQL Server 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr2013) -
Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation could allow remote attackers to aect condentiality, integrity, and avail-
ability via unknown vectors.
Solution:
Solution type: VendorFix
Update to version 5.5.31, 5.6.11 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5 through 5.5.30 and 5.6 through 5.6.10.
Vulnerability Insight
Unspecied error in some unknown vectors related to Stored Procedure.
References
cve: CVE-2013-2376
cve: CVE-2013-1511
url: [Link]
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0882
dfn-cert: DFN-CERT-2013-0798
NVT: Oracle MySQL Server 5.5 <= 5.5.29 Security Update (cpuapr2013) - Windows
Summary
Oracle MySQL Server is prone to multiple unspecied vulnerabilities.
Solution:
Solution type: VendorFix
Update to version 5.5.30 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5 through 5.5.29.
References
cve: CVE-2013-1512
cve: CVE-2013-1526
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0798
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to disclose potentially sensitive information, manip-
ulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server version 5.5.38 and earlier, and 5.6.19 and earlier on Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 628
References
cve: CVE-2015-0391
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1193
cert-bund: CB-K15/0567
cert-bund: CB-K15/0415
cert-bund: CB-K15/0073
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2015-0427
dfn-cert: DFN-CERT-2015-0074
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.37 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to ENARC and
SROPTZR.
References
cve: CVE-2014-2494
cve: CVE-2014-4207
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→ty_patches
url: [Link]
,→ppendixMSQL
cert-bund: CB-K15/0567
cert-bund: CB-K14/1420
cert-bund: CB-K14/0891
cert-bund: CB-K14/0868
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2014-1500
dfn-cert: DFN-CERT-2014-0930
. . . continues on next page . . .
2 RESULTS PER HOST 630
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to disclose potentially sensitive information, manip-
ulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server version 5.5.40 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to
Server:InnoDB:DDL:Foreign Key
References
cve: CVE-2015-0432
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1193
cert-bund: CB-K15/0964
cert-bund: CB-K15/0567
cert-bund: CB-K15/0415
cert-bund: CB-K15/0073
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-1016
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2015-0427
dfn-cert: DFN-CERT-2015-0074
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to InnoDB,
Optimizer, Error Handling, and some unknown vectors.
References
cve: CVE-2014-0401
cve: CVE-2014-0412
cve: CVE-2014-0437
cve: CVE-2013-5908
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1518
cert-bund: CB-K14/0710
cert-bund: CB-K14/0187
cert-bund: CB-K14/0177
cert-bund: CB-K14/0082
cert-bund: CB-K14/0074
cert-bund: CB-K14/0055
dfn-cert: DFN-CERT-2015-1604
dfn-cert: DFN-CERT-2014-0742
dfn-cert: DFN-CERT-2014-0190
dfn-cert: DFN-CERT-2014-0180
dfn-cert: DFN-CERT-2014-0085
dfn-cert: DFN-CERT-2014-0074
dfn-cert: DFN-CERT-2014-0048
2 RESULTS PER HOST 633
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.33 and earlier on Windows, Oracle MySQL version 5.6.13 and earlier
on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Partition.
References
. . . continues on next page . . .
2 RESULTS PER HOST 634
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an authenticated remote attacker to aect availability via un-
known vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 635
Vulnerability Insight
Unspecied error exists in the MySQL Server component via unknown vectors related to Server.
References
cve: CVE-2015-4816
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1483
cert-bund: CB-K16/1122
cert-bund: CB-K16/0791
cert-bund: CB-K16/0493
cert-bund: CB-K16/0246
cert-bund: CB-K15/1844
cert-bund: CB-K15/1600
cert-bund: CB-K15/1554
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-0845
dfn-cert: DFN-CERT-2016-0532
dfn-cert: DFN-CERT-2016-0266
dfn-cert: DFN-CERT-2015-1946
dfn-cert: DFN-CERT-2015-1692
dfn-cert: DFN-CERT-2015-1638
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to cause denial-of-service
attack.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.43 and earlier, and 5.6.24 and earlier on Windows.
Vulnerability Insight
Unspecied errors exist in the MySQL Server component via unknown vectors related to DML,
Server : I_S, Server : Optimizer, and GIS.
References
cve: CVE-2015-2648
cve: CVE-2015-4752
cve: CVE-2015-2643
cve: CVE-2015-2582
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 637
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow an authenticated remote attacker to aect condentiality, in-
tegrity, and availability via unknown vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier on windows
References
cve: CVE-2015-4913
cve: CVE-2015-4830
cve: CVE-2015-4826
cve: CVE-2015-4815
cve: CVE-2015-4807
cve: CVE-2015-4802
cve: CVE-2015-4792
cve: CVE-2015-4870
cve: CVE-2015-4861
cve: CVE-2015-4858
cve: CVE-2015-4836
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1483
cert-bund: CB-K16/1122
cert-bund: CB-K16/0791
cert-bund: CB-K16/0646
cert-bund: CB-K16/0493
cert-bund: CB-K16/0246
cert-bund: CB-K16/0245
cert-bund: CB-K15/1844
. . . continues on next page . . .
2 RESULTS PER HOST 639
Summary
MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote authenticated users to aect availability via unknown
vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL 5.5.31 and earlier on Windows.
Vulnerability Insight
Unspecied error in the MySQL Server component via unknown vectors related to Server Parser.
References
cve: CVE-2013-3783
url: [Link]
url: [Link]
cert-bund: CB-K13/1072
cert-bund: CB-K13/0620
dfn-cert: DFN-CERT-2013-2099
dfn-cert: DFN-CERT-2013-1599
dfn-cert: DFN-CERT-2013-1553
dfn-cert: DFN-CERT-2013-1478
Summary
MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote authenticated users to aect availability via unknown
vectors.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 641
Aected Software/OS
Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier and 5.6.10 on Windows.
Vulnerability Insight
Unspecied error in the MySQL Server component via unknown vectors related to Server Options.
References
cve: CVE-2013-3808
url: [Link]
url: [Link]
cert-bund: CB-K13/0620
dfn-cert: DFN-CERT-2013-1599
dfn-cert: DFN-CERT-2013-1553
dfn-cert: DFN-CERT-2013-1478
Summary
MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow remote authenticated users to aect integrity and availability
via unknown vectors and cause denial of service.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL 5.5.31 and earlier, 5.6.11 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Server Repli-
cation, Audit Log and Data Manipulation Language.
References
cve: CVE-2013-3812
cve: CVE-2013-3809
cve: CVE-2013-3793
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/1072
cert-bund: CB-K13/0620
dfn-cert: DFN-CERT-2013-2099
dfn-cert: DFN-CERT-2013-1599
dfn-cert: DFN-CERT-2013-1553
dfn-cert: DFN-CERT-2013-1478
2 RESULTS PER HOST 643
Summary
MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation could allow remote authenticated users to aect availability via unknown
vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
MySQL version 5.5.x before 5.5.22
Vulnerability Insight
Unspecied error in MySQL Server component related to Partition.
References
cve: CVE-2012-1697
. . . continues on next page . . .
2 RESULTS PER HOST 644
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow attackers to manipulate certain data and cause a DoS (Denial
of Service).
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.35 and earlier and 5.6.15 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Partition,
Replication and XML subcomponent.
References
cve: CVE-2014-0384
cve: CVE-2014-2419
cve: CVE-2014-2438
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0710
cert-bund: CB-K14/0464
cert-bund: CB-K14/0452
dfn-cert: DFN-CERT-2014-0742
dfn-cert: DFN-CERT-2014-0477
dfn-cert: DFN-CERT-2014-0459
Summary
MySQL is prone to multiple unspecied vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 646
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, 5.6.11 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Full Text
Search and Server Optimizer.
References
cve: CVE-2013-3804
cve: CVE-2013-3802
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/1072
cert-bund: CB-K13/0620
dfn-cert: DFN-CERT-2013-2099
dfn-cert: DFN-CERT-2013-1599
dfn-cert: DFN-CERT-2013-1553
dfn-cert: DFN-CERT-2013-1478
[ return to [Link] ]
Summary
Ruby on Rails is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation would allow an attacker to render legitimate users unable to use the
application.
Solution:
Solution type: VendorFix
Update to version [Link] or later.
Aected Software/OS
Ruby on Rails through version [Link].
Vulnerability Insight
An untrusted user may run any pending migration in production.
References
cve: CVE-2020-8185
url: [Link]
cert-bund: CB-K20/0604
dfn-cert: DFN-CERT-2021-0842
dfn-cert: DFN-CERT-2020-2327
2 RESULTS PER HOST 648
NVT: Ruby on Rails Action View XSS Vulnerability (Aug 2016) - Windows
Summary
Ruby on Rails is prone to a cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow a remote attacker to inject arbitrary web script or HTML via
crafted parameters.
Solution:
Solution type: VendorFix
Update to version [Link], [Link], [Link] or later.
Aected Software/OS
Ruby on Rails 3.x before [Link], Ruby on Rails 4.x before [Link] and Ruby on Rails 5.x before
[Link] on Windows.
Vulnerability Insight
The aw is due to the Text declared as 'HTML safe' when passed as an attribute value to a tag
helper will not have quotes escaped which can lead to an XSS attack.
References
cve: CVE-2016-6316
url: [Link]
url: [Link]
url: [Link]
,→FrCwDAAJ
url: [Link]
,→have-been-released
cert-bund: CB-K17/1730
. . . continues on next page . . .
2 RESULTS PER HOST 649
Summary
Ruby on Rails is prone to an information disclosure vulnerability in puma.
Solution:
Solution type: VendorFix
Update to version [Link], [Link], [Link], [Link] or later.
Aected Software/OS
Ruby on Rails version 5.x through 7.0.x.
Vulnerability Insight
Puma may not always call close on the response body. Rails depends on the response body being
closed in order for its CurrentAttributes implementation to work correctly.
References
cve: CVE-2022-23634
url: [Link]
dfn-cert: DFN-CERT-2024-0625
dfn-cert: DFN-CERT-2022-1898
dfn-cert: DFN-CERT-2022-1891
dfn-cert: DFN-CERT-2022-1506
dfn-cert: DFN-CERT-2022-1409
. . . continues on next page . . .
2 RESULTS PER HOST 650
NVT: Ruby on Rails Active Model Security Bypass Vulnerability (Jan 2016) - Windows
Summary
Ruby on Rails is prone to a security bypass vulnerability.
Impact
Successful exploitation will allow a remote attacker to bypass intended change restrictions by
leveraging use of the nested attributes feature.
Solution:
Solution type: VendorFix
Update to version [Link], [Link] or later.
Aected Software/OS
Ruby on Rails 4.1.x before [Link], Ruby on Rails 4.2.x before [Link] on Windows.
Vulnerability Insight
The aw is due to Ruby on Rails supports the use of instance-level writers for class accessors.
References
cve: CVE-2016-0753
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1085
. . . continues on next page . . .
2 RESULTS PER HOST 651
NVT: Ruby on Rails Action View 'render' Directory Traversal Vulnerability (Feb 2016) - Win-
dows
Summary
Ruby on Rails is prone to a directory traversal vulnerability.
Impact
Successful exploitation will allow a remote attacker to read arbitrary les by leveraging an ap-
plication's unrestricted use of the render method.
Solution:
Solution type: VendorFix
Update to version [Link], [Link] or later.
Aected Software/OS
Ruby on Rails versions before [Link] and 4.x before [Link] on Windows.
Vulnerability Insight
The aw is due to an improper validation of crafted requests to action view, one of the components
of action pack.
References
cve: CVE-2016-2097
url: [Link]
url: [Link]
url: [Link]
,→AJ
cert-bund: WID-SEC-2022-2271
cert-bund: CB-K16/0522
cert-bund: CB-K16/0419
cert-bund: CB-K16/0372
dfn-cert: DFN-CERT-2022-2796
dfn-cert: DFN-CERT-2016-0566
dfn-cert: DFN-CERT-2016-0458
dfn-cert: DFN-CERT-2016-0404
NVT: Ruby on Rails Active Record Security Bypass Vulnerability (Jan 2016) - Windows
Summary
Ruby on Rails is prone to a security bypass vulnerability.
Impact
Successful exploitation will allow a remote attacker to bypass intended change restrictions by
leveraging use of the nested attributes feature.
Solution:
Solution type: VendorFix
Update to version [Link], [Link], [Link] or later.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 653
Vulnerability Insight
The aw is due to the script 'activerecord/lib/active_record/nested_attributes.rb' does not
properly implement a certain destroy option.
References
cve: CVE-2015-7577
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1085
cert-bund: CB-K17/0278
cert-bund: CB-K16/0625
cert-bund: CB-K16/0419
cert-bund: CB-K16/0254
cert-bund: CB-K16/0166
cert-bund: CB-K16/0165
dfn-cert: DFN-CERT-2017-0284
dfn-cert: DFN-CERT-2016-0674
dfn-cert: DFN-CERT-2016-0458
dfn-cert: DFN-CERT-2016-0272
dfn-cert: DFN-CERT-2016-0181
dfn-cert: DFN-CERT-2016-0178
NVT: Ruby on Rails Active Support DoS Vulnerability (Jun 2015) - Windows
Summary
Ruby on Rails is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 4.1.11, 4.2.2 or later.
Aected Software/OS
Ruby on Rails before 4.1.11 and Ruby on Rails 4.2.x before 4.2.2 on Windows.
Vulnerability Insight
The aw is due to Specially crafted XML documents can cause applications to raise a System-
StackError and potentially cause a denial of service attack.
References
cve: CVE-2015-3227
url: [Link]
url: [Link]
,→Lnxvk/x4EocXnHPp8J
cert-bund: CB-K16/0166
cert-bund: CB-K15/1056
cert-bund: CB-K15/0856
dfn-cert: DFN-CERT-2016-0181
dfn-cert: DFN-CERT-2015-1111
dfn-cert: DFN-CERT-2015-0899
NVT: Ruby on Rails < 5.2.5, 6.x < 6.0.4 CSRF Vulnerability
Summary
Ruby on Rails is prone to a cross-site request forgery (CSRF) vulnerability.
Impact
Successful exploitation would allow an authenticated attacer to perform actions in the context
of another user.
Solution:
Solution type: VendorFix
Update to version 5.2.5, 6.0.4 or later.
Aected Software/OS
Ruby on Rails through version 5.2.4 and versions 6.0.0 through 6.0.3.
Vulnerability Insight
An attacker can use a global CSRF token, as can be found in the authenticity_token meta tag,
to forge form-specic CSRF tokens.
References
cve: CVE-2020-8166
url: [Link]
cert-bund: WID-SEC-2023-1093
cert-bund: CB-K20/0477
dfn-cert: DFN-CERT-2024-0110
dfn-cert: DFN-CERT-2021-0842
dfn-cert: DFN-CERT-2020-2327
dfn-cert: DFN-CERT-2020-2093
NVT: Ruby on Rails Active Support XSS Vulnerability (Jun 2015) - Windows
Summary
Ruby on Rails is prone to a cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow a remote attacker to inject arbitrary web script or HTML via
crafted parameters.
Solution:
Solution type: VendorFix
Update to version 4.2.2, 4.1.11 or later.
Aected Software/OS
Ruby on Rails versions 3.x, 3.0.x, 3.1.x, 3.2.x, 4.1.x before 4.1.11, 4.2.x before 4.2.2 on Linux.
Vulnerability Insight
The aw is due to error in handling 'ActiveSupport::[Link]' method which can lead to an
XSS attack.
References
cve: CVE-2015-3226
url: [Link]
url: [Link]
,→ck3hU/3QZrGIaQW6cJ
cert-bund: CB-K16/0166
cert-bund: CB-K15/0856
dfn-cert: DFN-CERT-2016-0181
dfn-cert: DFN-CERT-2015-0899
[ return to [Link] ]
Summary
ManageEngine Desktop Central is prone to multiple cross-site scripting (XSS) vulnerabilities.
. . . continues on next page . . .
2 RESULTS PER HOST 657
Impact
Successful exploitation will allow attacker to execute arbitrary script code in the browser of
an unsuspecting user in the context of the aected site. This may allow the attacker to steal
cookie-based authentication credentials and to launch other attacks.
Solution:
Solution type: VendorFix
Update to version 9.2.026 or later.
Aected Software/OS
ManageEngine Desktop Central version 9.1.099 and prior.
Vulnerability Insight
The aw allows to inject client-side script into Desktop Centrals web page.
References
cve: CVE-2018-8722
url: [Link]
,→[Link]
url: [Link]
Summary
Various application or web servers / products are prone to an information disclosure vulnerability.
Impact
Based on the information provided in this le an attacker might be able to gather additional info
and / or sensitive data about the application / the application / web server.
Solution:
Solution type: VendorFix
Please contact the vendor for more information on possible xes.
Aected Software/OS
The following products are known to be aected:
- Caucho Resin version 2.1.12 on Apache HTTP server version 1.3.29
Other products and versions might be aected as well.
Vulnerability Insight
The servlet specication prohibits servlet containers from serving resources in the '/WEB-INF'
and '/META-INF' directories of a web application archive directly to clients.
This means that URLs like:
[Link]
will return an error message, rather than the contents of the deployment descriptor.
However, some application or web servers / products are prone to a vulnerability that exposes
this information if the client requests a URL like this instead:
[Link]
[Link]
(note the double dot ('..') after 'WEB-INF').
References
cve: CVE-2004-0281
url: [Link]
url: [Link]
Summary
Various application or web servers / products are prone to an information disclosure vulnerability.
Impact
Based on the information provided in this le an attacker might be able to gather additional info
and / or sensitive data about the application / the application / web server.
Solution:
Solution type: VendorFix
Please contact the vendor for more information on possible xes.
Aected Software/OS
The following products are known to be aected:
- A miscongured reverse proxy.
Other products might be aected as well.
Vulnerability Insight
The servlet specication prohibits servlet containers from serving resources in the '/WEB-INF'
and '/META-INF' directories of a web application archive directly to clients.
This means that URLs like:
[Link]
will return an error message, rather than the contents of the deployment descriptor.
However, some application or web servers / products are prone to a vulnerability that exposes
this information if the client requests a URL like this instead:
[Link]
(note the 'f.' in 'WEB-INF').
References
url: [Link]
Summary
The host / application transmits sensitive information (username, passwords) in cleartext via
HTTP.
Impact
An attacker could use this situation to compromise or eavesdrop on the HTTP communication
between the client and the server using a man-in-the-middle attack to get access to sensitive data
like usernames or passwords.
Solution:
Solution type: Workaround
Enforce the transmission of sensitive data via an encrypted SSL/TLS connection. Additionally
make sure the host / application is redirecting all users to the secured SSL/TLS connection
before allowing to input sensitive data into the mentioned functions.
Aected Software/OS
Hosts / applications which doesn't enforce the transmission of sensitive data via an encrypted
SSL/TLS connection.
References
url: [Link]
,→ssion_Management
url: [Link]
url: [Link]
Summary
ManageEngine Desktop Central is prone to a reected cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow attacker to cause cross site scripting and steal the cookie of
other active sessions.
Solution:
Solution type: VendorFix
Update to version 9.2.026 or later.
Aected Software/OS
ManageEngine Desktop Central version 9.1.099 and prior.
Vulnerability Insight
The aw exists as input passed via 'To' parameter of 'Specify Delivery Format' is not validated
properly.
References
url: [Link]
[ return to [Link] ]
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-063.
Impact
Successful exploitation will allow attackers to gain elevated privileges on aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw exists in the Windows LoadLibrary as it fails to properly validate user input.
References
cve: CVE-2015-1758
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0783
dfn-cert: DFN-CERT-2015-0827
NVT: Microsoft File Handling Component Remote Code Execution Vulnerability (2922229)
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-019.
Impact
Successful exploitation will allow attackers to execute arbitrary code and potentially compromise
user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows XP x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
Flaw is due to an improper path restrictions when processing .bat and .cmd les related to the
'CreateProcess' function.
References
cve: CVE-2014-0315
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0408
dfn-cert: DFN-CERT-2014-0426
2 RESULTS PER HOST 666
NVT: Microsoft Windows Service Control Manager Privilege Elevation Vulnerability (2872339)
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-077.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode
privileges within the context of the Service Control Manager or corrupt memory.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw is due to a double-free error in the Service Control Manager ([Link]) when handling
service descriptions from the registry.
References
cve: CVE-2013-3862
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/0631
dfn-cert: DFN-CERT-2013-1623
2 RESULTS PER HOST 667
NVT: Microsoft Windows HID Functionality (Over USB) Code Execution Vulnerability (Jan
2011)
Summary
A USB device driver software is prone to a code execution vulnerability.
Impact
Successful exploitation will allow user-assisted attackers to execute arbitrary programs via crafted
USB data.
Solution:
Solution type: Workaround
No solution or patch was made available for at least one year since disclosure of this vulnerability.
Likely none will be provided anymore. General solution options are to upgrade to a newer release,
disable respective features, remove the product or replace the product by another one.
A workaround is to introduce device ltering on the target host to only allow trusted USB devices
to be enabled automatically. Once this workaround is in place an overwrite for this vulnerability
can be created to mark it as a false positive.
Aected Software/OS
All Microsoft Windows systems with an enabled USB device driver and no local protection
mechanism against the automatic enabling of additional Human Interface Device (HID).
Vulnerability Insight
The aw is due to error in USB device driver ([Link]), which does not properly warn the
user before enabling additional Human Interface Device (HID) functionality.
References
cve: CVE-2011-0638
url: [Link]
url: [Link]
url: [Link]
2 RESULTS PER HOST 668
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-074.
Impact
Successful exploitation will allow attackers to elevate privileges on a targeted system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
An elevation of privilege vulnerability exists in some cases in the Windows Installer service when
it improperly runs custom action scripts.
References
cve: CVE-2015-2371
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 669
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-050.
Impact
Successful exploitation will allow local attacker to gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
Flaw is due to an error in Service Control Manager (SCM) that is due to a failure to properly
verify impersonation levels.
References
cve: CVE-2015-1702
. . . continues on next page . . .
2 RESULTS PER HOST 670
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability and con-
dentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 11.0.12 and earlier, 17 and earlier on
Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' and 'JSSE' components.
References
cve: CVE-2021-35567
cve: CVE-2021-35578
. . . continues on next page . . .
2 RESULTS PER HOST 671
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attacker to have an impact on
condentiality, integrity and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 672
Aected Software/OS
Oracle Java SE version 7u231([Link]) and earlier, 8u221([Link]) and earlier, 11.0.4 and
earlier, 13 on Windows.
Vulnerability Insight
Multiple aws exist due to errors in 'Kerberos', 'Networking', 'Libraries', 'Javadoc', '2D', 'Con-
currency', 'JAXP', 'Security' and 'Serialization' components.
References
cve: CVE-2019-2949
cve: CVE-2019-2989
cve: CVE-2019-2958
cve: CVE-2019-2999
cve: CVE-2019-2962
cve: CVE-2019-2988
cve: CVE-2019-2992
cve: CVE-2019-2964
cve: CVE-2019-2973
cve: CVE-2019-2981
cve: CVE-2019-2978
cve: CVE-2019-2894
cve: CVE-2019-2983
cve: CVE-2019-2933
cve: CVE-2019-2945
url: [Link]
,→l
cert-bund: WID-SEC-2023-0524
cert-bund: WID-SEC-2023-0016
cert-bund: CB-K20/0895
cert-bund: CB-K20/0586
cert-bund: CB-K20/0139
cert-bund: CB-K19/1121
cert-bund: CB-K19/0910
dfn-cert: DFN-CERT-2020-1984
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-1276
dfn-cert: DFN-CERT-2020-1275
dfn-cert: DFN-CERT-2020-0577
dfn-cert: DFN-CERT-2020-0530
. . . continues on next page . . .
2 RESULTS PER HOST 673
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attacker to have an impact on
condentiality, integrity and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u231([Link]) and earlier, 8u221([Link]) and earlier, 11.0.4 and
earlier, 13 on Windows.
Vulnerability Insight
Multiple aws exist due to errors in 'Kerberos', 'Networking', 'Libraries', 'Javadoc', '2D', 'Con-
currency', 'JAXP', 'Security' and 'Serialization' components.
References
cve: CVE-2019-2949
cve: CVE-2019-2989
cve: CVE-2019-2958
. . . continues on next page . . .
2 RESULTS PER HOST 674
NVT: Microsoft Update to Improve Cryptography and Digital Certicate Handling (2854544)
Summary
This host is missing an important security update according to Microsoft Security Advisory
(2854544).
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 675
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
The aw is due to a Flame modules named 'Gadget' and 'Munch', used to infect other machines
in the same network as the targeted machine.
References
url: [Link]
url: [Link]
,→854544
url: [Link]
,→tal-certi/240001452
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability and con-
dentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 11.0.12 and earlier, 17 and earlier on
Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' and 'JSSE' components.
References
cve: CVE-2021-35567
cve: CVE-2021-35578
url: [Link]
cert-bund: WID-SEC-2023-0426
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-0908
cert-bund: WID-SEC-2022-0833
cert-bund: WID-SEC-2022-0826
cert-bund: WID-SEC-2022-0809
cert-bund: WID-SEC-2022-0676
cert-bund: WID-SEC-2022-0196
cert-bund: CB-K22/0310
cert-bund: CB-K22/0239
cert-bund: CB-K21/1082
dfn-cert: DFN-CERT-2022-1721
dfn-cert: DFN-CERT-2022-1571
dfn-cert: DFN-CERT-2022-0580
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2021-2566
dfn-cert: DFN-CERT-2021-2530
. . . continues on next page . . .
2 RESULTS PER HOST 677
NVT: Microsoft USB Mass Storage Class Driver Privilege Elevation Vulnerability (3143142)
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-033
Impact
Successful exploitation will allow an attacker to run arbitrary code in kernel mode.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 10 x32/x64
Vulnerability Insight
The aw is due to Windows USB Mass Storage Class driver fails to properly validate objects in
memory.
References
cve: CVE-2016-0133
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/0546
cert-bund: CB-K16/0383
dfn-cert: DFN-CERT-2016-0589
dfn-cert: DFN-CERT-2016-0412
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to access data.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, 9.0.1 and earlier on Windows
Vulnerability Insight
Multiple aws exist due to:
- An error in the 'JGSS' sub-component of application.
- An error in the 'JavaFX' sub-component of application.
References
cve: CVE-2018-2634
cve: CVE-2018-2581
url: [Link]
cert-bund: CB-K18/0808
cert-bund: CB-K18/0636
cert-bund: CB-K18/0091
dfn-cert: DFN-CERT-2018-1703
dfn-cert: DFN-CERT-2018-0816
dfn-cert: DFN-CERT-2018-0645
dfn-cert: DFN-CERT-2018-0102
NVT: Microsoft Windows SAM and LSAD Privilege Elevation Vulnerability (3148527)
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-047
Impact
Successful exploitation will allow an authenticated user to execute code with elevated privileges
that could gain access to the SAM database.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 680
Vulnerability Insight
Multiple aws are due to the way the SAM and LSAD remote protocols establish the Remote
Procedure Call (RPC) channel.
References
cve: CVE-2016-0128
url: [Link]
url: [Link]
cert-bund: CB-K16/0546
dfn-cert: DFN-CERT-2016-0589
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation of this vulnerability will allow remote attackers to access data.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, 9.0.1 and earlier on Windows
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 681
References
cve: CVE-2018-2634
cve: CVE-2018-2581
url: [Link]
cert-bund: CB-K18/0808
cert-bund: CB-K18/0636
cert-bund: CB-K18/0091
dfn-cert: DFN-CERT-2018-1703
dfn-cert: DFN-CERT-2018-0816
dfn-cert: DFN-CERT-2018-0645
dfn-cert: DFN-CERT-2018-0102
Summary
This host is missing an important security update according to Microsoft advisory (2916652).
Impact
Successful exploitation will allow attackers to spoof content, perform phishing attacks, or perform
man-in-the-middle attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 682
Vulnerability Insight
The aw is due to DG Tresor which improperly issued a subordinate CA certicate
References
url: [Link]
url: [Link]
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-009.
Impact
Successful exploitation will allow context
- dependent attacker to corrupt memory, execute arbitrary code and compromise a user's system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x/10.x/11.x.
Vulnerability Insight
Multiple aws are due to an error related to display:run-in handling, user supplied input is not
properly validated and multiple unspecied vulnerabilities.
References
cve: CVE-2014-8967
cve: CVE-2015-0017
cve: CVE-2015-0018
cve: CVE-2015-0019
cve: CVE-2015-0020
cve: CVE-2015-0021
cve: CVE-2015-0022
cve: CVE-2015-0023
cve: CVE-2015-0025
cve: CVE-2015-0026
cve: CVE-2015-0027
cve: CVE-2015-0028
cve: CVE-2015-0029
cve: CVE-2015-0030
cve: CVE-2015-0031
cve: CVE-2015-0035
cve: CVE-2015-0036
cve: CVE-2015-0037
cve: CVE-2015-0038
cve: CVE-2015-0039
cve: CVE-2015-0040
cve: CVE-2015-0041
cve: CVE-2015-0042
cve: CVE-2015-0043
cve: CVE-2015-0044
cve: CVE-2015-0045
cve: CVE-2015-0046
cve: CVE-2015-0048
cve: CVE-2015-0049
cve: CVE-2015-0050
cve: CVE-2015-0051
cve: CVE-2015-0052
cve: CVE-2015-0053
cve: CVE-2015-0054
cve: CVE-2015-0055
cve: CVE-2015-0066
cve: CVE-2015-0067
cve: CVE-2015-0068
cve: CVE-2015-0069
cve: CVE-2015-0070
cve: CVE-2015-0071
. . . continues on next page . . .
2 RESULTS PER HOST 684
Summary
This host is missing a moderate security update according to Microsoft Bulletin MS16-126.
Impact
Successful exploitation will allow an attacker to test for the presence of les on disk.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
Vulnerability Insight
An information disclosure vulnerability exists when the Microsoft Internet Messaging API im-
properly handles objects in memory.
NVT: Microsoft Windows XML Core Services Information Disclosure Vulnerability (4010321)
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-022.
Impact
Successful exploitation will allow remote attackers to test for the presence of les on disk.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
. . . continues on next page . . .
2 RESULTS PER HOST 687
Vulnerability Insight
Flaw exists due to improper handling of objects in memory.
References
cve: CVE-2017-0022
cisa: Known Exploited Vulnerability (KEV) catalog
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0443
dfn-cert: DFN-CERT-2017-0451
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to partially cause denial of service and access data.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 688
Vulnerability Insight
Multiple aws exist due to errors in 'ImageIO', 'Networking' and 'Libraries' components.
References
cve: CVE-2018-11212
cve: CVE-2019-2426
cve: CVE-2019-2422
url: [Link]
,→l
cert-bund: WID-SEC-2024-2180
cert-bund: WID-SEC-2022-0517
cert-bund: CB-K19/1121
cert-bund: CB-K19/0696
cert-bund: CB-K19/0640
cert-bund: CB-K19/0334
cert-bund: CB-K19/0225
cert-bund: CB-K19/0051
dfn-cert: DFN-CERT-2022-1460
dfn-cert: DFN-CERT-2022-0872
dfn-cert: DFN-CERT-2019-1944
dfn-cert: DFN-CERT-2019-1615
dfn-cert: DFN-CERT-2019-1488
dfn-cert: DFN-CERT-2019-1486
dfn-cert: DFN-CERT-2019-1107
dfn-cert: DFN-CERT-2019-1105
dfn-cert: DFN-CERT-2019-0618
dfn-cert: DFN-CERT-2019-0478
dfn-cert: DFN-CERT-2019-0473
dfn-cert: DFN-CERT-2019-0467
dfn-cert: DFN-CERT-2019-0209
dfn-cert: DFN-CERT-2019-0154
dfn-cert: DFN-CERT-2019-0106
dfn-cert: DFN-CERT-2018-1330
2 RESULTS PER HOST 689
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to partially cause denial of service and access data.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.7.0 to [Link], 1.8.0 to [Link] and 11.0.1 on Windows.
Vulnerability Insight
Multiple aws exist due to errors in 'ImageIO', 'Networking' and 'Libraries' components.
References
cve: CVE-2018-11212
cve: CVE-2019-2426
cve: CVE-2019-2422
url: [Link]
,→l
cert-bund: WID-SEC-2024-2180
cert-bund: WID-SEC-2022-0517
cert-bund: CB-K19/1121
cert-bund: CB-K19/0696
cert-bund: CB-K19/0640
cert-bund: CB-K19/0334
. . . continues on next page . . .
2 RESULTS PER HOST 690
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u231 ([Link]) and earlier.
References
cve: CVE-2019-16168
cve: CVE-2019-13117
cve: CVE-2019-13118
cve: CVE-2020-2585
url: [Link]
cert-bund: WID-SEC-2023-1614
cert-bund: WID-SEC-2023-0234
cert-bund: CB-K20/0988
cert-bund: CB-K20/0324
cert-bund: CB-K20/0039
cert-bund: CB-K20/0038
cert-bund: CB-K19/0652
cert-bund: CB-K19/0649
cert-bund: CB-K19/0644
dfn-cert: DFN-CERT-2021-2005
dfn-cert: DFN-CERT-2021-1076
dfn-cert: DFN-CERT-2021-1070
dfn-cert: DFN-CERT-2021-0107
dfn-cert: DFN-CERT-2020-2391
dfn-cert: DFN-CERT-2020-2252
dfn-cert: DFN-CERT-2020-1840
dfn-cert: DFN-CERT-2020-1107
dfn-cert: DFN-CERT-2020-0772
dfn-cert: DFN-CERT-2020-0517
dfn-cert: DFN-CERT-2020-0513
dfn-cert: DFN-CERT-2020-0345
dfn-cert: DFN-CERT-2020-0096
dfn-cert: DFN-CERT-2020-0095
dfn-cert: DFN-CERT-2020-0062
dfn-cert: DFN-CERT-2019-2543
dfn-cert: DFN-CERT-2019-2207
dfn-cert: DFN-CERT-2019-2063
dfn-cert: DFN-CERT-2019-1951
dfn-cert: DFN-CERT-2019-1522
dfn-cert: DFN-CERT-2019-1521
dfn-cert: DFN-CERT-2019-1512
. . . continues on next page . . .
2 RESULTS PER HOST 692
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u231 ([Link]) and earlier.
Vulnerability Insight
Multiple aws are due to errors in components Serialization, JavaFX (libxslt), Networking, Li-
braries and Security.
References
cve: CVE-2019-16168
cve: CVE-2019-13117
cve: CVE-2019-13118
cve: CVE-2020-2585
. . . continues on next page . . .
2 RESULTS PER HOST 693
NVT: Microsoft Windows Network Location Awareness Service Security Bypass Vulnerability
(3022777)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-005.
Impact
Successful exploitation will allow remote attackers to relax the rewall policy and/or congura-
tion of certain services by spoong responses of DNS or LDAP trac via a Man-in-the-Middle
attack.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
The aw is due to an error within the Network Location Awareness (NLA) service when validating
if a domain-connected computer is connected to the domain.
References
cve: CVE-2015-0006
url: [Link]
,→-location-awareness-service-could-allow-security-feature-bypass-january-13-201
,→5-5a2f60a5-f721-4e2c-2a52-c4a8dd4c3b95
url: [Link]
url: [Link]
,→15-005
cert-bund: CB-K15/0038
dfn-cert: DFN-CERT-2015-0036
2 RESULTS PER HOST 695
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-016
Impact
Successful exploitation will allow an attacker to perform cross-site scripting attacks on aected
systems and run script in the security context of the current user. These attacks could allow the
attacker to read content that the attacker is not authorized to read, use the victim's identity to
take actions on behalf of the victim, and inject malicious content in the victim's browser.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2016
Vulnerability Insight
The aw exists due to Microsoft IIS Server fails to properly sanitize a specially crafted request.
References
. . . continues on next page . . .
2 RESULTS PER HOST 696
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation allows an attacker to perform unauthorized modications to data, disclose
information.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 11.0.x through 11.0.27, 8u451 and prior on Windows.
References
cve: CVE-2025-30761
url: [Link]
cert-bund: WID-SEC-2025-1850
cert-bund: WID-SEC-2025-1569
. . . continues on next page . . .
2 RESULTS PER HOST 697
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on integrity.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u291 ([Link]) and earlier, 8u281 ([Link]) and earlier, 11.0.10 and
earlier, 16 on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' component.
References
cve: CVE-2021-2161
cve: CVE-2021-2163
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 698
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability and con-
dentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 699
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 7u311 ([Link]) and earlier, 11.0.12 and
earlier on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'JSSE' component.
References
cve: CVE-2021-35550
cve: CVE-2021-35565
url: [Link]
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-0908
cert-bund: WID-SEC-2022-0871
cert-bund: WID-SEC-2022-0833
cert-bund: WID-SEC-2022-0826
cert-bund: WID-SEC-2022-0809
cert-bund: WID-SEC-2022-0745
cert-bund: WID-SEC-2022-0712
cert-bund: WID-SEC-2022-0677
cert-bund: WID-SEC-2022-0676
cert-bund: WID-SEC-2022-0674
cert-bund: WID-SEC-2022-0515
cert-bund: WID-SEC-2022-0484
cert-bund: WID-SEC-2022-0472
cert-bund: WID-SEC-2022-0447
cert-bund: WID-SEC-2022-0446
cert-bund: WID-SEC-2022-0386
cert-bund: WID-SEC-2022-0300
cert-bund: WID-SEC-2022-0203
cert-bund: WID-SEC-2022-0196
cert-bund: WID-SEC-2022-0024
cert-bund: CB-K22/0675
cert-bund: CB-K22/0239
cert-bund: CB-K21/1082
dfn-cert: DFN-CERT-2023-1197
dfn-cert: DFN-CERT-2022-1721
dfn-cert: DFN-CERT-2022-1571
dfn-cert: DFN-CERT-2022-1456
. . . continues on next page . . .
2 RESULTS PER HOST 700
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability and con-
dentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 7u311 ([Link]) and earlier, 11.0.12 and
earlier on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'JSSE' component.
References
cve: CVE-2021-35550
cve: CVE-2021-35565
url: [Link]
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-0908
cert-bund: WID-SEC-2022-0871
cert-bund: WID-SEC-2022-0833
cert-bund: WID-SEC-2022-0826
cert-bund: WID-SEC-2022-0809
cert-bund: WID-SEC-2022-0745
cert-bund: WID-SEC-2022-0712
cert-bund: WID-SEC-2022-0677
cert-bund: WID-SEC-2022-0676
cert-bund: WID-SEC-2022-0674
cert-bund: WID-SEC-2022-0515
cert-bund: WID-SEC-2022-0484
cert-bund: WID-SEC-2022-0472
cert-bund: WID-SEC-2022-0447
cert-bund: WID-SEC-2022-0446
cert-bund: WID-SEC-2022-0386
cert-bund: WID-SEC-2022-0300
cert-bund: WID-SEC-2022-0203
cert-bund: WID-SEC-2022-0196
cert-bund: WID-SEC-2022-0024
cert-bund: CB-K22/0675
cert-bund: CB-K22/0239
cert-bund: CB-K21/1082
dfn-cert: DFN-CERT-2023-1197
dfn-cert: DFN-CERT-2022-1721
dfn-cert: DFN-CERT-2022-1571
dfn-cert: DFN-CERT-2022-1456
dfn-cert: DFN-CERT-2022-1339
dfn-cert: DFN-CERT-2022-1247
dfn-cert: DFN-CERT-2022-0451
dfn-cert: DFN-CERT-2022-0438
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2022-0106
dfn-cert: DFN-CERT-2021-2530
dfn-cert: DFN-CERT-2021-2438
dfn-cert: DFN-CERT-2021-2310
dfn-cert: DFN-CERT-2021-2195
dfn-cert: DFN-CERT-2021-2194
2 RESULTS PER HOST 702
Summary
Oracle Java SE is prone to remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of networking protocols within the Java SE engine
component in Oracle Java SE.
References
cve: CVE-2023-22043
url: [Link]
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-2681
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-1947
dfn-cert: DFN-CERT-2023-1653
2 RESULTS PER HOST 703
Summary
Oracle Java SE is prone to remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of networking protocols within the Java SE engine
component in Oracle Java SE.
References
cve: CVE-2023-22043
url: [Link]
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-2681
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-1947
dfn-cert: DFN-CERT-2023-1653
2 RESULTS PER HOST 704
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized access to critical data or complete access to all Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u391 and earlier 11.0.21 and earlier on Windows.
Vulnerability Insight
The aw exists due to an unspecied vulnerability in Oracle Java SE which can be exploited by
using APIs in the specied Component.
References
cve: CVE-2024-20926
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0121
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-0500
dfn-cert: DFN-CERT-2024-0494
dfn-cert: DFN-CERT-2024-0422
. . . continues on next page . . .
2 RESULTS PER HOST 705
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation allows an attacker to perform unauthorized modications to data, disclose
information.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 11.0.x through 11.0.27, 8u451 and prior on Windows.
References
cve: CVE-2025-30761
url: [Link]
cert-bund: WID-SEC-2025-1850
cert-bund: WID-SEC-2025-1569
dfn-cert: DFN-CERT-2025-3170
dfn-cert: DFN-CERT-2025-2550
dfn-cert: DFN-CERT-2025-2099
. . . continues on next page . . .
2 RESULTS PER HOST 706
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to modify data, partially access data, cause
partial denial of service conditions.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier and 10.0
through 10.0.1 on Windows
Vulnerability Insight
Multiple aws are due to multiple unspecied errors in components 'Libraries', 'JSSE' and 'Con-
currency'.
References
cve: CVE-2018-2973
cve: CVE-2018-2940
cve: CVE-2018-2952
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 707
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to modify data, partially access data, cause
partial denial of service conditions.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier and 10.0
through 10.0.1 on Windows
Vulnerability Insight
Multiple aws are due to multiple unspecied errors in components 'Libraries', 'JSSE' and 'Con-
currency'.
References
cve: CVE-2018-2973
cve: CVE-2018-2940
cve: CVE-2018-2952
url: [Link]
url: [Link]
cert-bund: WID-SEC-2023-1308
cert-bund: CB-K19/0354
cert-bund: CB-K18/1076
cert-bund: CB-K18/0796
dfn-cert: DFN-CERT-2019-0059
dfn-cert: DFN-CERT-2018-1902
dfn-cert: DFN-CERT-2018-1691
dfn-cert: DFN-CERT-2018-1675
dfn-cert: DFN-CERT-2018-1456
dfn-cert: DFN-CERT-2018-1405
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized access to critical data or complete access to all Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 709
Vulnerability Insight
The aw exists due to an unspecied vulnerability in Oracle Java SE which can be exploited by
using APIs in the specied Component.
References
cve: CVE-2024-20926
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0121
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-0500
dfn-cert: DFN-CERT-2024-0494
dfn-cert: DFN-CERT-2024-0422
dfn-cert: DFN-CERT-2024-0361
dfn-cert: DFN-CERT-2024-0354
dfn-cert: DFN-CERT-2024-0129
dfn-cert: DFN-CERT-2024-0128
Summary
Oracle Java SE is prone to a remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 710
Aected Software/OS
Oracle Java SE version 8u361 and earlier, 11.0.18, 17.0.6 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of networking protocols within the Java SE engine
component in Oracle Java SE.
References
cve: CVE-2023-21954
url: [Link]
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2112
cert-bund: WID-SEC-2023-1011
dfn-cert: DFN-CERT-2023-2493
dfn-cert: DFN-CERT-2023-2249
dfn-cert: DFN-CERT-2023-1955
dfn-cert: DFN-CERT-2023-1909
dfn-cert: DFN-CERT-2023-1879
dfn-cert: DFN-CERT-2023-1418
dfn-cert: DFN-CERT-2023-1336
dfn-cert: DFN-CERT-2023-0897
dfn-cert: DFN-CERT-2023-0896
Summary
Oracle Java SE is prone to a remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u361 and earlier, 11.0.18, 17.0.6 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of networking protocols within the Java SE engine
component in Oracle Java SE.
References
cve: CVE-2023-21954
url: [Link]
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2112
cert-bund: WID-SEC-2023-1011
dfn-cert: DFN-CERT-2023-2493
dfn-cert: DFN-CERT-2023-2249
dfn-cert: DFN-CERT-2023-1955
dfn-cert: DFN-CERT-2023-1909
dfn-cert: DFN-CERT-2023-1879
dfn-cert: DFN-CERT-2023-1418
dfn-cert: DFN-CERT-2023-1336
dfn-cert: DFN-CERT-2023-0897
dfn-cert: DFN-CERT-2023-0896
2 RESULTS PER HOST 712
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on integrity.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u291 ([Link]) and earlier, 8u281 ([Link]) and earlier, 11.0.10 and
earlier, 16 on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' component.
References
cve: CVE-2021-2161
cve: CVE-2021-2163
url: [Link]
cert-bund: WID-SEC-2025-0227
cert-bund: WID-SEC-2023-1125
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1894
cert-bund: WID-SEC-2022-1303
cert-bund: WID-SEC-2022-1261
cert-bund: WID-SEC-2022-1244
. . . continues on next page . . .
2 RESULTS PER HOST 713
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-121.
Impact
Successful exploitation will allow attackers to perform unauthorized actions by conducting a
man-in-the-middle attack and this may lead to other attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 714
Vulnerability Insight
The aw is due to some weakness in the Transport Layer Security (TLS) implementation.
References
cve: CVE-2015-6112
url: [Link]
url: [Link]
cert-bund: CB-K15/1649
dfn-cert: DFN-CERT-2015-1742
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-083.
Impact
Successful exploitation could allow attacker to bypass certain security restrictions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior.
Vulnerability Insight
The aw is due to error in the IP-HTTPS component, which fails to validate the certicates.
This can lead to a revoked certicate being considered as valid.
. . . continues on next page . . .
2 RESULTS PER HOST 715
References
cve: CVE-2012-2549
url: [Link]
url: [Link]
url: [Link]
,→12-083
dfn-cert: DFN-CERT-2012-2231
Summary
This host is missing an important security update according to Microsoft advisory (3123479).
Impact
Successful exploitation will allow attackers to take advantage of weakness of the SHA-1 hashing
algorithm that exposes it to collision attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
. . . continues on next page . . .
2 RESULTS PER HOST 716
Vulnerability Insight
An update is available that aims to warn customers in assessing the risk of certain applications
that use X.509 digital certicates that are signed using the SHA-1 hashing algorithm.
References
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→[Link]
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-006.
Impact
Successful exploitation could allow remote attackers to silently downgrade a SSL version 3 or
TLS connection to SSL version 2, which supports weak encryption cyphers.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 717
Vulnerability Insight
The vulnerability is caused when Windows fails to properly handle SSL/TLS session version
negotiation.
References
cve: CVE-2013-0013
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-0046
NVT: Microsoft Windows Common Log File System Driver Information Disclosure Vulnerability
(3207328)
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-153.
Impact
Successful exploitation will allow an attacker to run a specially crafted application to bypass
security measures on the aected system allowing further exploitation.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
. . . continues on next page . . .
2 RESULTS PER HOST 718
Vulnerability Insight
The aw exists due to the Windows Common Log File System (CLFS) driver improperly handles
objects in memory.
References
cve: CVE-2016-7295
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1959
dfn-cert: DFN-CERT-2016-2066
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-124
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 719
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
Vulnerability Insight
Multiple elevation of privilege vulnerabilities exist in Microsoft Windows when a Windows kernel
API improperly allows a user to access sensitive registry information.
References
cve: CVE-2016-0070
cve: CVE-2016-0073
cve: CVE-2016-0075
cve: CVE-2016-0079
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1582
dfn-cert: DFN-CERT-2016-1672
2 RESULTS PER HOST 720
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-139.
Impact
Successful exploitation will allow an attacker could gain access to information that is not intended
for the user.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
Vulnerability Insight
The aw exists in the way that the Windows Kernel API enforces permissions.
References
cve: CVE-2016-7216
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K16/1747
dfn-cert: DFN-CERT-2016-1852
2 RESULTS PER HOST 721
Summary
This host is missing a critical security update according to Microsoft Bulletin MS13-098.
Impact
Successful exploitation will allow attackers to execute arbitrary code or cause a denial of service
condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
Vulnerability Insight
Flaw is due to WinVerifyTrust function which does not properly handles the Windows Authen-
ticode signature verication for portable executable(PE) les.
References
cve: CVE-2013-3900
cisa: Known Exploited Vulnerability (KEV) catalog
. . . continues on next page . . .
2 RESULTS PER HOST 722
Summary
'[Link]' Graphics Device Interface is prone to an information disclosure vulnerability.
Impact
Successful exploitation will allow an attacker to obtain sensitive information from process heap
memory.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511, 1607 x32/x64
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
Vulnerability Insight
The aw exists due to multiple bugs related to the handling of DIBs (Device Independent
Bitmaps) embedded in EMF records.
References
cve: CVE-2017-0038
url: [Link]
url: [Link]
cert-bund: CB-K17/0443
dfn-cert: DFN-CERT-2017-0451
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-016.
Impact
Successful exploitation will allow attackers to bypass certain security features.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 724
References
cve: CVE-2014-0317
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0296
dfn-cert: DFN-CERT-2014-0300
Summary
OpenSSH is prone to a user enumeration vulnerability.
Impact
Successfully exploitation will allow remote attacker to test whether a certain user exists or not
(username enumeration) on a target OpenSSH server.
Solution:
Solution type: VendorFix
Update to version 7.8 or later.
Vulnerability Insight
The aw is due to not delaying bailout for an invalid authenticating user until after the packet
containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and
auth2-pubkey.c
References
cve: CVE-2018-15473
url: [Link]
url: [Link]
,→1e0
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K20/0041
cert-bund: CB-K18/1031
cert-bund: CB-K18/0873
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2021-2178
dfn-cert: DFN-CERT-2020-2189
dfn-cert: DFN-CERT-2020-0228
dfn-cert: DFN-CERT-2019-2046
dfn-cert: DFN-CERT-2019-0857
dfn-cert: DFN-CERT-2019-0362
dfn-cert: DFN-CERT-2018-2293
dfn-cert: DFN-CERT-2018-2259
dfn-cert: DFN-CERT-2018-2191
dfn-cert: DFN-CERT-2018-1806
dfn-cert: DFN-CERT-2018-1696
2 RESULTS PER HOST 726
Summary
OpenSSH is prone to a user enumeration vulnerability.
Impact
Successfully exploitation will allow remote attacker to test whether a certain user exists or not
(username enumeration) on a target OpenSSH server.
Solution:
Solution type: VendorFix
Update to version 7.8 or later.
Aected Software/OS
OpenSSH versions 7.7 and prior.
Vulnerability Insight
The aw is due to not delaying bailout for an invalid authenticating user until after the packet
containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and
auth2-pubkey.c
References
cve: CVE-2018-15473
url: [Link]
url: [Link]
,→1e0
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K20/0041
cert-bund: CB-K18/1031
cert-bund: CB-K18/0873
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2021-2178
dfn-cert: DFN-CERT-2020-2189
dfn-cert: DFN-CERT-2020-0228
dfn-cert: DFN-CERT-2019-2046
dfn-cert: DFN-CERT-2019-0857
dfn-cert: DFN-CERT-2019-0362
dfn-cert: DFN-CERT-2018-2293
dfn-cert: DFN-CERT-2018-2259
dfn-cert: DFN-CERT-2018-2191
dfn-cert: DFN-CERT-2018-1806
dfn-cert: DFN-CERT-2018-1696
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 728
Aected Software/OS
Oracle Java SE version 7u221([Link]) and earlier, 8u212([Link]) and earlier, 11.0.2 and
earlier, 12.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to errors in 'AWT (libpng)', 'Utilities' and 'Networking' components.
References
cve: CVE-2019-2769
cve: CVE-2019-2762
cve: CVE-2019-2766
cve: CVE-2019-7317
cve: CVE-2019-2816
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: WID-SEC-2023-0122
cert-bund: WID-SEC-2023-0065
cert-bund: WID-SEC-2022-0882
cert-bund: CB-K21/1083
cert-bund: CB-K21/0421
cert-bund: CB-K19/1121
cert-bund: CB-K19/0938
cert-bund: CB-K19/0897
cert-bund: CB-K19/0621
cert-bund: CB-K19/0440
cert-bund: CB-K19/0115
dfn-cert: DFN-CERT-2022-1723
dfn-cert: DFN-CERT-2021-0821
dfn-cert: DFN-CERT-2021-0444
dfn-cert: DFN-CERT-2020-0353
dfn-cert: DFN-CERT-2019-2494
dfn-cert: DFN-CERT-2019-1584
dfn-cert: DFN-CERT-2019-1452
dfn-cert: DFN-CERT-2019-1312
dfn-cert: DFN-CERT-2019-1295
dfn-cert: DFN-CERT-2019-1110
dfn-cert: DFN-CERT-2019-1039
. . . continues on next page . . .
2 RESULTS PER HOST 729
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u221([Link]) and earlier, 8u212([Link]) and earlier, 11.0.2 and
earlier, 12.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to errors in 'AWT (libpng)', 'Utilities' and 'Networking' components.
References
cve: CVE-2019-2769
cve: CVE-2019-2762
cve: CVE-2019-2766
cve: CVE-2019-7317
. . . continues on next page . . .
2 RESULTS PER HOST 730
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 731
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u341 and earlier, 11.x through [Link], 17.x through [Link], 19 on
Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in components 'JNDI', 'Security' and 'JNDI'.
References
cve: CVE-2022-21628
cve: CVE-2022-21619
cve: CVE-2022-21624
url: [Link]
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2023-0809
cert-bund: WID-SEC-2023-0561
cert-bund: WID-SEC-2022-1789
dfn-cert: DFN-CERT-2023-0616
dfn-cert: DFN-CERT-2023-0256
dfn-cert: DFN-CERT-2023-0217
dfn-cert: DFN-CERT-2023-0082
dfn-cert: DFN-CERT-2022-2696
dfn-cert: DFN-CERT-2022-2660
dfn-cert: DFN-CERT-2022-2600
dfn-cert: DFN-CERT-2022-2547
dfn-cert: DFN-CERT-2022-2313
dfn-cert: DFN-CERT-2022-2312
Summary
OpenSSH is prone to a user enumeration vulnerability.
Impact
Successfully exploitation will allow a remote attacker to harvest valid user accounts, which may
aid in brute-force attacks.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
OpenSSH version 5.9 through 7.8.
Vulnerability Insight
The aw exists in the 'auth-gss2.c' source code le of the aected software and is due to in-
sucient validation of an authentication request packet when the Guide Star Server II (GSS2)
component is used on an aected system.
References
cve: CVE-2018-15919
. . . continues on next page . . .
2 RESULTS PER HOST 733
Summary
OpenSSH is prone to a security bypass vulnerability.
Impact
Successfully exploiting this issue allows local users to bypass certain security restrictions and
perform unauthorized actions. This may lead to further attacks.
Solution:
Solution type: VendorFix
Update to version 7.6 or later.
Aected Software/OS
OpenSSH versions prior to 7.6 on Windows.
Vulnerability Insight
The aw exists in the 'process_open' function in sftp-server.c script which does not properly
prevent write operations in readonly mode.
References
cve: CVE-2017-15906
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K20/0041
cert-bund: CB-K18/0137
cert-bund: CB-K17/2126
cert-bund: CB-K17/2014
cert-bund: CB-K17/2002
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2019-0362
dfn-cert: DFN-CERT-2018-2554
dfn-cert: DFN-CERT-2018-2191
dfn-cert: DFN-CERT-2018-2068
dfn-cert: DFN-CERT-2018-1828
dfn-cert: DFN-CERT-2018-1568
dfn-cert: DFN-CERT-2018-0150
dfn-cert: DFN-CERT-2017-2217
dfn-cert: DFN-CERT-2017-2100
dfn-cert: DFN-CERT-2017-2093
Summary
OpenSSH is prone to a user enumeration vulnerability.
Impact
Successfully exploitation will allow a remote attacker to harvest valid user accounts, which may
aid in brute-force attacks.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
OpenSSH version 5.9 through 7.8.
Vulnerability Insight
The aw exists in the 'auth-gss2.c' source code le of the aected software and is due to in-
sucient validation of an authentication request packet when the Guide Star Server II (GSS2)
component is used on an aected system.
References
cve: CVE-2018-15919
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K18/0885
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2018-2293
. . . continues on next page . . .
2 RESULTS PER HOST 736
Summary
OpenSSH is prone to a security bypass vulnerability.
Impact
Successfully exploiting this issue allows local users to bypass certain security restrictions and
perform unauthorized actions. This may lead to further attacks.
Solution:
Solution type: VendorFix
Update to version 7.6 or later.
Aected Software/OS
OpenSSH versions prior to 7.6 on Windows.
Vulnerability Insight
The aw exists in the 'process_open' function in sftp-server.c script which does not properly
prevent write operations in readonly mode.
References
cve: CVE-2017-15906
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1082
cert-bund: CB-K20/0041
cert-bund: CB-K18/0137
cert-bund: CB-K17/2126
cert-bund: CB-K17/2014
cert-bund: CB-K17/2002
dfn-cert: DFN-CERT-2024-1260
dfn-cert: DFN-CERT-2019-0362
dfn-cert: DFN-CERT-2018-2554
dfn-cert: DFN-CERT-2018-2191
dfn-cert: DFN-CERT-2018-2068
dfn-cert: DFN-CERT-2018-1828
dfn-cert: DFN-CERT-2018-1568
dfn-cert: DFN-CERT-2018-0150
dfn-cert: DFN-CERT-2017-2217
dfn-cert: DFN-CERT-2017-2100
dfn-cert: DFN-CERT-2017-2093
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on integrity and availability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 738
Aected Software/OS
Oracle Java SE version 8u341 and earlier, 11.x through [Link], 17.x through [Link], 19 on
Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in components 'JNDI', 'Security' and 'JNDI'.
References
cve: CVE-2022-21628
cve: CVE-2022-21619
cve: CVE-2022-21624
url: [Link]
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2023-0809
cert-bund: WID-SEC-2023-0561
cert-bund: WID-SEC-2022-1789
dfn-cert: DFN-CERT-2023-0616
dfn-cert: DFN-CERT-2023-0256
dfn-cert: DFN-CERT-2023-0217
dfn-cert: DFN-CERT-2023-0082
dfn-cert: DFN-CERT-2022-2696
dfn-cert: DFN-CERT-2022-2660
dfn-cert: DFN-CERT-2022-2600
dfn-cert: DFN-CERT-2022-2547
dfn-cert: DFN-CERT-2022-2313
dfn-cert: DFN-CERT-2022-2312
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability and con-
dentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 7u311 ([Link]) and earlier, 11.0.12 and
earlier and 17.0.0.
Vulnerability Insight
Multiple aws are due to multiple errors in the 'ImageIO', 'Keytool', 'Swing', 'Utility' and 'JSSE'
components.
References
cve: CVE-2021-35586
cve: CVE-2021-35564
cve: CVE-2021-35556
cve: CVE-2021-35559
cve: CVE-2021-35561
cve: CVE-2021-35603
url: [Link]
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-1162
cert-bund: WID-SEC-2022-0987
cert-bund: WID-SEC-2022-0908
cert-bund: WID-SEC-2022-0871
cert-bund: WID-SEC-2022-0833
cert-bund: WID-SEC-2022-0826
cert-bund: WID-SEC-2022-0809
cert-bund: WID-SEC-2022-0745
cert-bund: WID-SEC-2022-0712
. . . continues on next page . . .
2 RESULTS PER HOST 740
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow attackers to cause partial denial of service conditions.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.6.0 to [Link], 1.7.0 to [Link], 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw is due to error in 'Sound' component.
References
cve: CVE-2018-3214
url: [Link]
cert-bund: CB-K19/0175
cert-bund: CB-K18/1010
dfn-cert: DFN-CERT-2019-0413
dfn-cert: DFN-CERT-2019-0076
dfn-cert: DFN-CERT-2019-0059
dfn-cert: DFN-CERT-2018-2107
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u311 ([Link]) and earlier, 7u321 ([Link]) and earlier on Windows.
Vulnerability Insight
The aw is due to an error in '2D' component.
References
cve: CVE-2022-21349
url: [Link]
cert-bund: WID-SEC-2023-1424
cert-bund: WID-SEC-2023-0839
cert-bund: WID-SEC-2023-0838
cert-bund: WID-SEC-2022-1335
cert-bund: WID-SEC-2022-1228
cert-bund: WID-SEC-2022-0812
cert-bund: WID-SEC-2022-0799
cert-bund: WID-SEC-2022-0447
cert-bund: WID-SEC-2022-0432
cert-bund: WID-SEC-2022-0431
cert-bund: WID-SEC-2022-0302
cert-bund: WID-SEC-2022-0100
cert-bund: CB-K22/0078
dfn-cert: DFN-CERT-2022-0438
dfn-cert: DFN-CERT-2022-0111
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 743
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u311 ([Link]) and earlier, 7u321 ([Link]) and earlier on Windows.
Vulnerability Insight
The aw is due to an error in '2D' component.
References
cve: CVE-2022-21349
url: [Link]
cert-bund: WID-SEC-2023-1424
cert-bund: WID-SEC-2023-0839
cert-bund: WID-SEC-2023-0838
cert-bund: WID-SEC-2022-1335
cert-bund: WID-SEC-2022-1228
cert-bund: WID-SEC-2022-0812
cert-bund: WID-SEC-2022-0799
cert-bund: WID-SEC-2022-0447
cert-bund: WID-SEC-2022-0432
cert-bund: WID-SEC-2022-0431
cert-bund: WID-SEC-2022-0302
cert-bund: WID-SEC-2022-0100
cert-bund: CB-K22/0078
dfn-cert: DFN-CERT-2022-0438
. . . continues on next page . . .
2 RESULTS PER HOST 744
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability and con-
dentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 7u311 ([Link]) and earlier, 11.0.12 and
earlier and 17.0.0.
Vulnerability Insight
Multiple aws are due to multiple errors in the 'ImageIO', 'Keytool', 'Swing', 'Utility' and 'JSSE'
components.
References
cve: CVE-2021-35586
cve: CVE-2021-35564
cve: CVE-2021-35556
cve: CVE-2021-35559
cve: CVE-2021-35561
. . . continues on next page . . .
2 RESULTS PER HOST 745
Summary
Oracle Java SE is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability, integrity and
condentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u311 ([Link]) and earlier, 7u321 ([Link]) and earlier, 11.x through
11.0.13 and 17.x through 17.0.1 on Windows.
Vulnerability Insight
Multiple aws are due to multiple unspecied errors in components 'Serialization', 'Libraries',
'JAXP', 'ImageIO' and 'Hotspot'.
References
cve: CVE-2022-21291
cve: CVE-2022-21305
cve: CVE-2022-21360
cve: CVE-2022-21365
cve: CVE-2022-21282
cve: CVE-2022-21296
cve: CVE-2022-21299
cve: CVE-2022-21293
. . . continues on next page . . .
2 RESULTS PER HOST 747
Summary
Oracle Java SE is prone to multiple unspecied vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability, integrity and
condentiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u311 ([Link]) and earlier, 7u321 ([Link]) and earlier, 11.x through
11.0.13 and 17.x through 17.0.1 on Windows.
Vulnerability Insight
Multiple aws are due to multiple unspecied errors in components 'Serialization', 'Libraries',
'JAXP', 'ImageIO' and 'Hotspot'.
References
cve: CVE-2022-21291
cve: CVE-2022-21305
cve: CVE-2022-21360
cve: CVE-2022-21365
cve: CVE-2022-21282
cve: CVE-2022-21296
cve: CVE-2022-21299
cve: CVE-2022-21293
cve: CVE-2022-21294
cve: CVE-2022-21340
cve: CVE-2022-21341
cve: CVE-2022-21248
url: [Link]
cert-bund: WID-SEC-2023-1424
cert-bund: WID-SEC-2023-0839
. . . continues on next page . . .
2 RESULTS PER HOST 749
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u341 and earlier, 11.x through [Link] on Windows.
Vulnerability Insight
The aw exists due to an error in component 'Security'.
References
cve: CVE-2022-21626
url: [Link]
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2023-0809
cert-bund: WID-SEC-2023-0561
cert-bund: WID-SEC-2022-1789
dfn-cert: DFN-CERT-2023-0616
dfn-cert: DFN-CERT-2023-0608
dfn-cert: DFN-CERT-2023-0607
dfn-cert: DFN-CERT-2023-0217
dfn-cert: DFN-CERT-2023-0082
dfn-cert: DFN-CERT-2022-2696
dfn-cert: DFN-CERT-2022-2660
dfn-cert: DFN-CERT-2022-2600
dfn-cert: DFN-CERT-2022-2547
dfn-cert: DFN-CERT-2022-2313
dfn-cert: DFN-CERT-2022-2312
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 751
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u311 ([Link]) and earlier, 7u321 ([Link]) and earlier and 11.x
through 11.0.13 on Windows.
Vulnerability Insight
The aw is due to an error in 'Libraries' component.
References
cve: CVE-2022-21271
url: [Link]
cert-bund: WID-SEC-2022-0432
cert-bund: WID-SEC-2022-0302
cert-bund: WID-SEC-2022-0100
cert-bund: CB-K22/0078
cert-bund: CB-K22/0061
dfn-cert: DFN-CERT-2025-0509
dfn-cert: DFN-CERT-2022-0369
dfn-cert: DFN-CERT-2022-0320
dfn-cert: DFN-CERT-2022-0121
dfn-cert: DFN-CERT-2022-0111
2 RESULTS PER HOST 752
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u311 ([Link]) and earlier, 7u321 ([Link]) and earlier and 11.x
through 11.0.13 on Windows.
Vulnerability Insight
The aw is due to an error in 'Libraries' component.
References
cve: CVE-2022-21271
url: [Link]
cert-bund: WID-SEC-2022-0432
cert-bund: WID-SEC-2022-0302
cert-bund: WID-SEC-2022-0100
cert-bund: CB-K22/0078
cert-bund: CB-K22/0061
dfn-cert: DFN-CERT-2025-0509
dfn-cert: DFN-CERT-2022-0369
dfn-cert: DFN-CERT-2022-0320
. . . continues on next page . . .
2 RESULTS PER HOST 753
Summary
Oracle Java SE is prone to an input validation vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u351 and earlier on Windows.
Vulnerability Insight
The aw is due to an improper input validation within the Serialization component in Oracle
Java SE.
References
cve: CVE-2023-21830
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
. . . continues on next page . . .
2 RESULTS PER HOST 754
Summary
Oracle Java SE is prone to an input validation vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u351 and earlier on Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 755
References
cve: CVE-2023-21830
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2164
cert-bund: WID-SEC-2023-1813
cert-bund: WID-SEC-2023-1424
cert-bund: WID-SEC-2023-0840
cert-bund: WID-SEC-2023-0561
cert-bund: WID-SEC-2023-0128
dfn-cert: DFN-CERT-2024-2151
dfn-cert: DFN-CERT-2023-1425
dfn-cert: DFN-CERT-2023-1174
dfn-cert: DFN-CERT-2023-1139
dfn-cert: DFN-CERT-2023-0846
dfn-cert: DFN-CERT-2023-0717
dfn-cert: DFN-CERT-2023-0605
dfn-cert: DFN-CERT-2023-0372
dfn-cert: DFN-CERT-2023-0125
dfn-cert: DFN-CERT-2023-0124
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE. It can result
in unauthorized update, insert or delete access to some of Oracle Java SE accessible data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u381 and earlier, on Windows.
Vulnerability Insight
The aw exists due to an unspecied vulnerability in Oracle Java SE which can only be exploited
by supplying data to APIs in the specied Component without using Untrusted Java Web Start
applications or Untrusted Java applets.
References
cve: CVE-2023-22067
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-2692
dfn-cert: DFN-CERT-2023-3177
dfn-cert: DFN-CERT-2023-3009
dfn-cert: DFN-CERT-2023-3006
dfn-cert: DFN-CERT-2023-2999
dfn-cert: DFN-CERT-2023-2975
dfn-cert: DFN-CERT-2023-2941
dfn-cert: DFN-CERT-2023-2939
dfn-cert: DFN-CERT-2023-2886
dfn-cert: DFN-CERT-2023-2562
dfn-cert: DFN-CERT-2023-2557
dfn-cert: DFN-CERT-2023-2534
2 RESULTS PER HOST 757
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE. It can result
in unauthorized update, insert or delete access to some of Oracle Java SE accessible data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u381 and earlier, on Windows.
Vulnerability Insight
The aw exists due to an unspecied vulnerability in Oracle Java SE which can only be exploited
by supplying data to APIs in the specied Component without using Untrusted Java Web Start
applications or Untrusted Java applets.
References
cve: CVE-2023-22067
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-2692
dfn-cert: DFN-CERT-2023-3177
. . . continues on next page . . .
2 RESULTS PER HOST 758
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow attackers to cause partial denial of service conditions.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.6.0 to [Link], 1.7.0 to [Link], 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw is due to error in 'Sound' component.
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u341 and earlier, 11.x through [Link] on Windows.
Vulnerability Insight
The aw exists due to an error in component 'Security'.
References
. . . continues on next page . . .
2 RESULTS PER HOST 760
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java
SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u381, 11.0.20, 17.0.8, 20.0.2 on Windows.
References
cve: CVE-2023-22081
url: [Link]
cert-bund: WID-SEC-2024-1653
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2024-0521
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2917
cert-bund: WID-SEC-2023-2692
dfn-cert: DFN-CERT-2024-0169
dfn-cert: DFN-CERT-2023-3177
dfn-cert: DFN-CERT-2023-3009
dfn-cert: DFN-CERT-2023-3006
dfn-cert: DFN-CERT-2023-2999
dfn-cert: DFN-CERT-2023-2975
dfn-cert: DFN-CERT-2023-2939
dfn-cert: DFN-CERT-2023-2886
dfn-cert: DFN-CERT-2023-2562
dfn-cert: DFN-CERT-2023-2561
dfn-cert: DFN-CERT-2023-2560
dfn-cert: DFN-CERT-2023-2559
dfn-cert: DFN-CERT-2023-2558
dfn-cert: DFN-CERT-2023-2557
dfn-cert: DFN-CERT-2023-2535
dfn-cert: DFN-CERT-2023-2534
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-019.
Impact
Successful exploitation will allow an attacker to read sensitive information about the target
system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2016
Vulnerability Insight
The aw exists when Windows Active Directory Federation Services (ADFS) honors XML Ex-
ternal Entities.
References
cve: CVE-2017-0043
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0443
dfn-cert: DFN-CERT-2017-0451
2 RESULTS PER HOST 763
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java
SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u381, 11.0.20, 17.0.8, 20.0.2 on Windows.
Vulnerability Insight
The aw exists due to an unspecied vulnerability in Oracle Java SE.
References
cve: CVE-2023-22081
url: [Link]
cert-bund: WID-SEC-2024-1653
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0769
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2024-0521
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2917
. . . continues on next page . . .
2 RESULTS PER HOST 764
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to aect availability via unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, 10.0 on Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 765
References
cve: CVE-2018-2796
cve: CVE-2018-2799
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-0724
NVT: Microsoft Windows NPS RADIUS Server Denial of Service Vulnerability (3133043)
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-021
Impact
Successful exploitation will allow a remote attacker to send specially crafted username strings to
a Network Policy Server (NPS) causing a denial of service condition for RADIUS authentication
on the NPS.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows server 2008 x32/x64 Edition Service Pack 2
. . . continues on next page . . .
2 RESULTS PER HOST 766
Vulnerability Insight
The aw is due to an improper handling of a Remote Authentication Dial-In User Service (RA-
DIUS) authentication request in Network Policy Server (NPS).
References
cve: CVE-2016-0050
url: [Link]
url: [Link]
cert-bund: CB-K16/0220
dfn-cert: DFN-CERT-2016-0242
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to aect availability via unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, 10.0 on Windows.
References
cve: CVE-2018-2796
cve: CVE-2018-2799
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-0724
Summary
Oracle Java SE is prone to remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 768
Vulnerability Insight
The aw is due to improper application of hotspot module within the Java SE engine component
in Oracle Java SE.
References
cve: CVE-2023-22041
url: [Link]
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2023-1814
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-1972
dfn-cert: DFN-CERT-2023-1909
dfn-cert: DFN-CERT-2023-1657
dfn-cert: DFN-CERT-2023-1653
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow attackers to have an impact on condentiality.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 769
Aected Software/OS
Oracle Java SE version 1.7.0 to [Link], 1.8.0 to [Link] and 11.0 to 11.0.3 on Windows.
Vulnerability Insight
The aw exists due to error in 'Security' component.
References
cve: CVE-2019-2745
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: CB-K19/0621
dfn-cert: DFN-CERT-2019-1452
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow attackers to have an impact on condentiality.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 770
Vulnerability Insight
The aw exists due to error in 'Security' component.
References
cve: CVE-2019-2745
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: CB-K19/0621
dfn-cert: DFN-CERT-2019-1452
Summary
Oracle Java SE is prone to remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier, 11.0.19, 17.0.7, 20.0.1 and earlier on Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 771
References
cve: CVE-2023-22041
url: [Link]
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2023-1814
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-1972
dfn-cert: DFN-CERT-2023-1909
dfn-cert: DFN-CERT-2023-1657
dfn-cert: DFN-CERT-2023-1653
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-053.
Impact
Successful exploitation will allow attackers to cause a denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4.0, 4.5, 4.5.1 and 4.5.2.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 772
References
cve: CVE-2014-4072
url: [Link]
url: [Link]
cert-bund: CB-K14/1121
dfn-cert: DFN-CERT-2014-1175
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-075.
Impact
Successful exploitation will allow attackers to bypass security protections on aected systems.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 773
Vulnerability Insight
The aw is due to Microsoft Windows incorrectly handles OLE objects in documents.
References
cve: CVE-2015-2416
cve: CVE-2015-2417
url: [Link]
url: [Link]
cert-bund: CB-K15/1013
dfn-cert: DFN-CERT-2015-1060
Summary
This host is missing a defense-in-depth update according to Microsoft KB4474419
Impact
Successful exploitation will allow an attacker to bypass defense-in-depth measures and perform
exploitation.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1 and
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
References
url: [Link]
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-069.
Impact
Successful exploitation could allow authenticated attackers to cause a denial of service condition
on the aected system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 Service Pack 1 and prior
- Microsoft Windows 2008 R2 Service Pack 1 and prior
Vulnerability Insight
The aw is present due to an error in Kerberos implementation which fails to properly handle a
specially crafted session.
References
cve: CVE-2012-2551
url: [Link]
url: [Link]
url: [Link]
,→12-069
dfn-cert: DFN-CERT-2012-1933
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-055.
Impact
Successful exploitation will allow remote attacker to gain access to potentially sensitive informa-
tion.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
Vulnerability Insight
The aw is due to the use of a weak Die-Hellman ephemeral (DFE) key length of 512 bits in
an encrypted TLS session.
References
cve: CVE-2015-1716
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0668
dfn-cert: DFN-CERT-2015-0689
Summary
This host is missing an important security update according to Microsoft KB3177467.
Impact
Successful exploitation will allow an attacker to bypass a security control or take advantage of a
vulnerability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Vulnerability Insight
Microsoft has released latest servicing stack updates that provides enhanced security as a defense
in depth measure.
References
url: [Link]
url: [Link]
,→1
Summary
This host is missing an important security update according to Microsoft Bulletin MS16-082
Impact
Successful exploitation will allow an attacker to potentially escalate permissions or perform ad-
ditional privileged actions on the target machine.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows 10 x32/x64
- Microsoft Windows 10 Version 1511 x32/x64
Vulnerability Insight
The aw is due to the search component fails to properly handle certain objects in memory.
References
cve: CVE-2016-3230
url: [Link]
url: [Link]
cert-bund: CB-K16/0914
dfn-cert: DFN-CERT-2016-0969
NVT: Microsoft Internet Explorer PDF Information Disclosure Vulnerability (Nov 2009)
Summary
Internet Explorer is prone to an information disclosure vulnerability.
Impact
Successful attacks which may leads to the exposure of system information on the aected system.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
Microsoft Internet Explorer version 6/7/8.
Vulnerability Insight
The weakness is due to an Internet Explorer including the rst 63 bytes of the le path in the
'Title' property when converting local HTML or MHT les to PDF using a PDF printer. This
can lead to the exposure of certain system information e.g. the user name.
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-095.
Impact
Successful exploitation will allow attackers to cause a denial of service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
Vulnerability Insight
Flaw is caused when Microsoft Windows improperly handles web-service request containing a
crafted X.509 certicate.
References
cve: CVE-2013-3869
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/0909
dfn-cert: DFN-CERT-2013-1921
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-031.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode
privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
cve: CVE-2013-1284
cve: CVE-2013-1294
url: [Link]
url: [Link]
url: [Link]
url: [Link]
dfn-cert: DFN-CERT-2013-0755
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-093
Impact
Successful exploitation will allow disclosure of potentially sensitive information if an attacker
logs on to a user's system and runs a specially crafted application.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x64 Edition Service Pack 2 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 782
Vulnerability Insight
The aw is due an error in Ancillary Function Driver (AFD) which does not properly copies data
from kernel memory to user memory.
References
cve: CVE-2013-3887
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K13/0909
dfn-cert: DFN-CERT-2013-1921
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-122.
Impact
Successful exploitation will allow local attackers to bypass certain security restrictions and per-
form unauthorized actions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
. . . continues on next page . . .
2 RESULTS PER HOST 783
Vulnerability Insight
The aw is due to Kerberos fails to check the password change of a user signing into a workstation.
References
cve: CVE-2015-6095
url: [Link]
url: [Link]
cert-bund: CB-K15/1649
dfn-cert: DFN-CERT-2015-1742
Summary
This host is missing an important security update according to Microsoft Bulletin MS13-016.
Impact
Successful exploitation will allow remote attackers to a specially crafted program to exploit race
conditions in '[Link]' and gain System level privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
The aws due to an error in '[Link]' when handling kernel-mode driver objects in memory.
References
cve: CVE-2013-1248
cve: CVE-2013-1249
cve: CVE-2013-1250
cve: CVE-2013-1264
cve: CVE-2013-1251
cve: CVE-2013-1265
cve: CVE-2013-1252
cve: CVE-2013-1266
cve: CVE-2013-1253
cve: CVE-2013-1267
cve: CVE-2013-1254
cve: CVE-2013-1255
cve: CVE-2013-1256
cve: CVE-2013-1257
cve: CVE-2013-1258
cve: CVE-2013-1259
cve: CVE-2013-1260
cve: CVE-2013-1261
cve: CVE-2013-1262
cve: CVE-2013-1263
cve: CVE-2013-1268
cve: CVE-2013-1269
cve: CVE-2013-1270
cve: CVE-2013-1271
cve: CVE-2013-1272
cve: CVE-2013-1273
cve: CVE-2013-1274
cve: CVE-2013-1275
. . . continues on next page . . .
2 RESULTS PER HOST 785
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to disclose information and cause partial denial of
service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u421 and prior, 17.0.x through 17.0.12, 11.0.x through 11.0.24, 21.0.x
through 21.0.4 and 23 on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21235: An error in the Hotspot component of Oracle Java SE.
- CVE-2024-21210: An error in the Hotspot component of Oracle Java SE.
- CVE-2024-21208: An error in the Networking component of Oracle Java SE.
- CVE-2024-21217: An error in the Serialization component of Oracle Java SE.
References
cve: CVE-2024-21235
cve: CVE-2024-21210
cve: CVE-2024-21208
cve: CVE-2024-21217
url: [Link]
cert-bund: WID-SEC-2025-0794
cert-bund: WID-SEC-2025-0580
cert-bund: WID-SEC-2024-3206
cert-bund: WID-SEC-2024-3189
dfn-cert: DFN-CERT-2025-2802
dfn-cert: DFN-CERT-2025-1788
dfn-cert: DFN-CERT-2025-1662
. . . continues on next page . . .
2 RESULTS PER HOST 787
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful attacks of this vulnerability can result in unauthorized update, insert or delete access
to some accessible data as well as unauthorized read access to a subset of accessible data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u251 ([Link]) and earlier, 11.0.7 and earlier, 14.0.1 and earlier on
Windows.
Vulnerability Insight
Multiple aws exist due to errors in the components 'Libraries' and '2D'.
References
cve: CVE-2020-14556
cve: CVE-2020-14581
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1522
cert-bund: CB-K20/1075
cert-bund: CB-K20/0715
dfn-cert: DFN-CERT-2020-1762
dfn-cert: DFN-CERT-2020-1531
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to disclose information and cause partial denial of
service attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u421 and prior, 17.0.x through 17.0.12, 11.0.x through 11.0.24, 21.0.x
through 21.0.4 and 23 on Windows.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 789
References
cve: CVE-2024-21235
cve: CVE-2024-21210
cve: CVE-2024-21208
cve: CVE-2024-21217
url: [Link]
cert-bund: WID-SEC-2025-0794
cert-bund: WID-SEC-2025-0580
cert-bund: WID-SEC-2024-3206
cert-bund: WID-SEC-2024-3189
dfn-cert: DFN-CERT-2025-2802
dfn-cert: DFN-CERT-2025-1788
dfn-cert: DFN-CERT-2025-1662
dfn-cert: DFN-CERT-2025-1645
dfn-cert: DFN-CERT-2025-1071
dfn-cert: DFN-CERT-2025-0933
dfn-cert: DFN-CERT-2025-0927
dfn-cert: DFN-CERT-2025-0835
dfn-cert: DFN-CERT-2025-0619
dfn-cert: DFN-CERT-2024-3323
dfn-cert: DFN-CERT-2024-3259
dfn-cert: DFN-CERT-2024-3247
dfn-cert: DFN-CERT-2024-3219
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-2760
dfn-cert: DFN-CERT-2024-2739
dfn-cert: DFN-CERT-2024-2738
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 790
Impact
Successful exploitation will allow remote attacker to have an impact on integrity and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u221 ([Link]) and earlier, 11.0.4 and earlier, 13 on Windows.
Vulnerability Insight
The aw exists due to an error in 'Scripting' component.
References
cve: CVE-2019-2975
url: [Link]
,→l
cert-bund: WID-SEC-2023-0524
cert-bund: CB-K20/0139
cert-bund: CB-K19/0910
dfn-cert: DFN-CERT-2020-1276
dfn-cert: DFN-CERT-2020-0338
dfn-cert: DFN-CERT-2019-2161
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 791
Impact
Successful exploitation will allow remote attacker to have an impact on integrity and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u221 ([Link]) and earlier, 11.0.4 and earlier, 13 on Windows.
Vulnerability Insight
The aw exists due to an error in 'Scripting' component.
References
cve: CVE-2019-2975
url: [Link]
,→l
cert-bund: WID-SEC-2023-0524
cert-bund: CB-K20/0139
cert-bund: CB-K19/0910
dfn-cert: DFN-CERT-2020-1276
dfn-cert: DFN-CERT-2020-0338
dfn-cert: DFN-CERT-2019-2161
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 792
Impact
Successful attacks of this vulnerability can result in unauthorized update, insert or delete access
to some accessible data as well as unauthorized read access to a subset of accessible data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u251 ([Link]) and earlier, 11.0.7 and earlier, 14.0.1 and earlier on
Windows.
Vulnerability Insight
Multiple aws exist due to errors in the components 'Libraries' and '2D'.
References
cve: CVE-2020-14556
cve: CVE-2020-14581
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1522
cert-bund: CB-K20/1075
cert-bund: CB-K20/0715
dfn-cert: DFN-CERT-2020-1762
dfn-cert: DFN-CERT-2020-1531
2 RESULTS PER HOST 793
Summary
This host is missing an important security update according to Microsoft Bulletin MS12-049.
Impact
Successful exploitation could allow an attacker to gain access to sensitive information that may
aid in further attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Microsoft Windows contains a aw related to the Transport Layer Security (TLS) Handshake
Protocol when the Cipher-block chaining (CBC) mode of operation is used. This aw may allow
a remote attacker to gain access to decrypted trac.
References
cve: CVE-2012-1870
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→12-049
. . . continues on next page . . .
2 RESULTS PER HOST 794
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-029.
Impact
Successful exploitation will allow remote attackers to gain access to potentially sensitive infor-
mation in memory.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Flaw exists due to error in the Photo decoder that is triggered as the program fails to handle
uninitialized memory when parsing a specially crafted JPEG XR image
References
cve: CVE-2015-0076
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 795
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-071.
Impact
Successful exploitation could allow an attacker to execute arbitrary scripts with elevated privi-
leges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
The aw is due to an error within the Windows Audio Service.
References
cve: CVE-2014-6322
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 796
NVT: Microsoft Windows Remote Desktop Protocol Security Feature Bypass Vulnerability
(3003743)
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-074.
Impact
Successful exploitation will allow an attacker to bypass the audit logon security feature.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
The aw is due to the Remote Desktop Protocol (RDP) not properly logging failed logon at-
tempts.
References
. . . continues on next page . . .
2 RESULTS PER HOST 797
NVT: Microsoft Windows XML Core Services Information Disclosure Vulnerability (3080129)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-084.
Impact
Successful exploitation will allow remote attackers to conduct man-in-the-middle (MiTM) attack
and gain access to sensitive data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012 R2
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
Vulnerability Insight
Flaw exists due to:
- An error in Microsoft XML Core Services which allows forceful use of Secure Sockets Layer
(SSL) 2.0.
- An error in Microsoft XML Core Services which exposes memory addresses not intended for
public disclosure.
References
cve: CVE-2015-2434
cve: CVE-2015-2471
cve: CVE-2015-2440
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1174
dfn-cert: DFN-CERT-2015-1236
Summary
This host is missing a security update according to Oracle.
Impact
Successful exploitation will allow remote attacker to have an impact on integrity and conden-
tiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 799
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' and 'Networking' components.
References
cve: CVE-2021-2341
cve: CVE-2021-2369
url: [Link]
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-0464
cert-bund: WID-SEC-2022-0024
cert-bund: CB-K22/0675
cert-bund: CB-K22/0239
cert-bund: CB-K21/0981
cert-bund: CB-K21/0783
dfn-cert: DFN-CERT-2022-1247
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2022-0106
dfn-cert: DFN-CERT-2022-0074
dfn-cert: DFN-CERT-2021-2310
dfn-cert: DFN-CERT-2021-1825
dfn-cert: DFN-CERT-2021-1728
dfn-cert: DFN-CERT-2021-1534
dfn-cert: DFN-CERT-2021-1533
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-031.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
Vulnerability Insight
The aw is due to an error in schannel which does not properly restrict TLS state transitions.
References
cve: CVE-2015-1637
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0319
cert-bund: CB-K15/0290
dfn-cert: DFN-CERT-2015-0324
dfn-cert: DFN-CERT-2015-0300
Summary
This host is missing a security update according to Oracle.
Impact
Successful exploitation will allow remote attacker to have an impact on integrity and conden-
tiality.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u301 ([Link]) and earlier, 8u291 ([Link]) and earlier, 11.0.11 and
earlier, 16.0.1 and earlier on Windows.
Vulnerability Insight
Multiple aws are due to multiple errors in 'Libraries' and 'Networking' components.
References
cve: CVE-2021-2341
cve: CVE-2021-2369
url: [Link]
cert-bund: WID-SEC-2023-0063
cert-bund: WID-SEC-2022-0464
cert-bund: WID-SEC-2022-0024
cert-bund: CB-K22/0675
cert-bund: CB-K22/0239
cert-bund: CB-K21/0981
cert-bund: CB-K21/0783
dfn-cert: DFN-CERT-2022-1247
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2022-0106
dfn-cert: DFN-CERT-2022-0074
dfn-cert: DFN-CERT-2021-2310
. . . continues on next page . . .
2 RESULTS PER HOST 802
NVT: Microsoft Windows XML Core Services Security Feature Bypass Vulnerability (3046482)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-039.
Impact
Successful exploitation will allow remote attackers to bypass security restrictions and gain access
to sensitive user information.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2
- Microsoft Windows Vista x32/x64 Edition Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2
Vulnerability Insight
Flaw exists due to some unspecied error in XML Core services that may allow a context-
dependent attacker to bypass the same-origin policy.
References
cve: CVE-2015-1646
. . . continues on next page . . .
2 RESULTS PER HOST 803
Summary
This host is missing a critical security update according to Microsoft Bulletin MS15-024.
Impact
Successful exploitation will allow remote attacker to access sensitive information that could be
used to launch additional attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 x32 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x64 Service Pack 2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/2012R2
Vulnerability Insight
The aw is due to improper memory operations performed by the aected software when handling
crafted content
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-027.
Impact
Successful exploitation will allow remote man-in-the-middle attacker to conduct SMB relay at-
tacks on domain environments utilizing SMB Signing enforcement, and decrypt SMB3 commu-
nications intercepted.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012/R2
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
Flaw is due to Netlogon service improperly establishes a secure communications channel belong-
ing to a dierent machine with a spoofed computer name.
Summary
This host is missing an important security update according to Microsoft Bulletin MS14-046.
Impact
Successful exploitation could allow an attacker to execute of arbitrary code and bypass certain
security mechanism.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 2.0 Service Pack 2, 3.0 Service Pack 2, 3.5, 3.5.1.
Vulnerability Insight
Flaw is triggered when handling specially crafted website content due to the Address Space
Layout Randomization (ASLR) security feature.
References
cve: CVE-2014-4062
url: [Link]
url: [Link]
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 806
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-118.
Impact
Successful exploitation will allow an attacker to gain read access to local les, bypass the security
feature and then load additional malicious code, inject client-side script into a users browser and
ultimately modify or spoof content, conduct phishing activities, disclose information, or perform
any action on the vulnerable website that the target user has permission to perform.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft .NET Framework 2.0 Service Pack 2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4
- Microsoft .NET Framework 4.5, 4.5.1, and 4.5.2
- Microsoft .NET Framework 4.6, 4.6 RC
Vulnerability Insight
Multiple aws exist due to:
- An error in the .NET Framework DTD parsing of certain specially crafted XML les.
- [Link] improperly validates values in HTTP requests.
- An error in the .NET Framework component which does not properly implement the Address
Space Layout Randomization (ASLR) security feature.
References
cve: CVE-2015-6096
cve: CVE-2015-6099
cve: CVE-2015-6115
url: [Link]
url: [Link]
cert-bund: CB-K15/1656
dfn-cert: DFN-CERT-2015-1740
NVT: Microsoft Windows Minimum Certicate Key Length Spoong Vulnerability (2661254)
Summary
Microsoft Windows operating system is prone to digital certicate key length spoong vulnera-
bility.
Impact
Successful exploitation will allow remote attackers to spoof content, perform phishing attacks or
perform man-in-the-middle attacks.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
- Microsoft Windows XP x32 Edition Service Pack 3 and prior
- Microsoft Windows XP x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 808
References
url: [Link]
url: [Link]
,→661254
url: [Link]
,→[Link]
Summary
Microsoft Windows operating system is prone to a digital certicates spoong vulnerability.
Impact
Successful exploitation will allow remote attackers to spoof content, perform phishing attacks or
perform man-in-the-middle attacks.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
- Microsoft Windows 7 Service Pack 1 and prior
- Microsoft Windows XP Service Pack 3 and prior
- Microsoft Windows Vista Service Pack 2 and prior
- Microsoft Windows Server 2003 Service Pack 2 and prior
- Microsoft Windows Server 2008 Service Pack 2 and prior
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 809
References
url: [Link]
url: [Link]
url: [Link]
,→718704
url: [Link]
Summary
This host is missing an important security update according to Microsoft advisory (3042058).
Impact
Successful exploitation will allow attackers to break certain authentication scenarios.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012 R2
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
. . . continues on next page . . .
2 RESULTS PER HOST 810
Vulnerability Insight
An update is available that improves eectiveness of encryption in Windows operating systems
by adding cipher suites to the default list on aected systems and thus improving cipher suite
priority ordering.
References
url: [Link]
url: [Link]
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-088.
Impact
Successful exploitation will allow a local attacker to obtain sensitive information that may aid
in further attacks.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
. . . continues on next page . . .
2 RESULTS PER HOST 811
Vulnerability Insight
The aw is due to an improper security restrictions on les stored on an aected system.
References
cve: CVE-2015-2423
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1174
cert-bund: CB-K15/1172
cert-bund: CB-K15/1169
dfn-cert: DFN-CERT-2015-1236
dfn-cert: DFN-CERT-2015-1235
dfn-cert: DFN-CERT-2015-1231
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-016.
Impact
Successful exploitation will allow remote attackers to disclose certain sensitive information.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 812
Aected Software/OS
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
Flaw is due to improper handling uninitialized memory when parsing certain, specially crafted
TIFF image format les.
References
cve: CVE-2015-0061
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0171
dfn-cert: DFN-CERT-2015-0175
NVT: Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability
(2475792)
Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-009.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 813
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
The aw is caused by a memory corruption error in the JScript and VBScript scripting engines
when processing scripts in Web pages.
References
cve: CVE-2011-0031
url: [Link]
url: [Link]
url: [Link]
,→11-009
dfn-cert: DFN-CERT-2011-0161
Summary
This host is missing an important security update according to Microsoft advisory (3057154).
Impact
Successful exploitation will allow attackers to break certain authentication scenarios.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 814
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
Vulnerability Insight
An update is available that provides enhanced user protection in environments where DES is
still enabled for application compatibility reasons.
References
url: [Link]
url: [Link]
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 815
Aected Software/OS
Oracle Java SE version 7u271 ([Link]) and earlier, 8u261 ([Link]) and earlier, 11.0.8 and
earlier, 15.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Hotspot, Serialization and JNDI.
References
cve: CVE-2020-14792
cve: CVE-2020-14781
cve: CVE-2020-14782
cve: CVE-2020-14797
cve: CVE-2020-14779
cve: CVE-2020-14796
cve: CVE-2020-14798
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-2242
cert-bund: WID-SEC-2022-1285
cert-bund: CB-K21/0927
cert-bund: CB-K21/0279
cert-bund: CB-K20/1014
dfn-cert: DFN-CERT-2021-1839
dfn-cert: DFN-CERT-2021-1798
dfn-cert: DFN-CERT-2021-0862
dfn-cert: DFN-CERT-2021-0543
dfn-cert: DFN-CERT-2021-0352
dfn-cert: DFN-CERT-2021-0332
dfn-cert: DFN-CERT-2020-2682
dfn-cert: DFN-CERT-2020-2290
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 816
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality, integrity
and availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u271 ([Link]) and earlier, 8u261 ([Link]) and earlier, 11.0.8 and
earlier, 15.
Vulnerability Insight
Multiple aws are due to errors in components Libraries, JSSE, Hotspot, Serialization and JNDI.
References
cve: CVE-2020-14792
cve: CVE-2020-14781
cve: CVE-2020-14782
cve: CVE-2020-14797
cve: CVE-2020-14779
cve: CVE-2020-14796
cve: CVE-2020-14798
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-2242
cert-bund: WID-SEC-2022-1285
cert-bund: CB-K21/0927
cert-bund: CB-K21/0279
cert-bund: CB-K20/1014
. . . continues on next page . . .
2 RESULTS PER HOST 817
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attackers to aect condentiality and integrity via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier on Win-
dows.
Vulnerability Insight
The aw is due to an unspecied error in 'RMI' component of Java SE.
Summary
Oracle Java SE is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow remote attackers to aect condentiality and integrity via
unknown vectors.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version [Link] and earlier, [Link] and earlier, [Link] and earlier on Win-
dows.
Vulnerability Insight
The aw is due to an unspecied error in 'RMI' component of Java SE.
References
cve: CVE-2018-2800
url: [Link]
cert-bund: WID-SEC-2023-1375
cert-bund: CB-K18/0808
cert-bund: CB-K18/0732
cert-bund: CB-K18/0600
dfn-cert: DFN-CERT-2018-1145
dfn-cert: DFN-CERT-2018-0724
Summary
This host is missing an important security update according to Microsoft advisory (3097966).
Impact
Successful exploitation will allow attackers to conduct spoong attack.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012 R2
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 820
References
url: [Link]
url: [Link]
NVT: Microsoft Internet Explorer Information Disclosure and Web Site Spoong Vulnerabilities
Summary
Microsoft Internet Explorer is prone to information disclosure and web site spoong vulnerabil-
ities.
Impact
Successful exploitation allows attackers to disclose the sensitive information and view the contents
of spoofed site or carry out phishing attacks.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
Microsoft Internet Explorer versions 8 and 9.
Vulnerability Insight
The proxy settings conguration has same proxy address and value for HTTP and HTTPS,
- TCP session to proxy server will not properly be reused. This allows remote attackers to steal
cookie information via crafted HTML document.
. . . continues on next page . . .
2 RESULTS PER HOST 821
References
cve: CVE-2013-1450
cve: CVE-2013-1451
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
NVT: Microsoft Windows Active Directory Service Denial of Service Vulnerability (3072595)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-096.
Impact
Successful exploitation will allow an the attacker to cause the service to become non-responsive,
resulting in denial-of-service conditions.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012R2
. . . continues on next page . . .
2 RESULTS PER HOST 822
Vulnerability Insight
The aw is due to improper resource management by the aected software while creating multiple
machine accounts.
References
cve: CVE-2015-2535
url: [Link]
url: [Link]
cert-bund: CB-K15/1321
dfn-cert: DFN-CERT-2015-1385
[ return to [Link] ]
Summary
Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC ser-
vices running on the remote host can be enumerated by connecting on port 135 and doing the
appropriate queries.
Impact
An attacker may use this fact to gain more knowledge about the remote host.
Solution:
Solution type: Mitigation
Filter incoming trac to this ports.
[ return to [Link] ]
Summary
The service is using an SSL/TLS certicate from a known untrusted and/or dangerous certicate
authority (CA).
Impact
An attacker could use this for man-in-the-middle (MITM) attacks, accessing sensible data and
other attacks.
Solution:
Solution type: Mitigation
Replace the SSL/TLS certicate with one signed by a trusted CA.
Summary
The remote SSL/TLS service is prone to a denial of service (DoS) vulnerability.
Impact
The aw might make it easier for remote attackers to cause a DoS (CPU consumption) by
performing many renegotiations within a single connection.
Solution:
Solution type: VendorFix
Users should contact their vendors for specic patch information.
A general solution is to remove/disable renegotiation capabilities altogether from/in the aected
SSL/TLS service.
Aected Software/OS
Every SSL/TLS service which does not properly restrict client-initiated renegotiation.
Vulnerability Insight
The aw exists because the remote SSL/TLS service does not properly restrict client-initiated
renegotiation within the SSL and TLS protocols.
Note: The referenced CVEs are aecting OpenSSL and Mozilla Network Security Services (NSS)
but both are in a DISPUTED state with the following rationale:
> It can also be argued that it is the responsibility of server deployments, not a security library,
to prevent or limit renegotiation when it is inappropriate within a specic environment.
Both CVEs are still kept in this VT as a reference to the origin of this aw.
References
cve: CVE-2011-1473
cve: CVE-2011-5094
url: [Link]
,→tiation-dos/
url: [Link]
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0796
cert-bund: WID-SEC-2023-1435
. . . continues on next page . . .
2 RESULTS PER HOST 827
Summary
The remote server's SSL/TLS certicate has already expired.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 828
Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.
Summary
It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this
system.
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Aected Software/OS
- All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols
- CVE-2023-41928: Kiloview P1 4G and P2 4G Video Encoder
- CVE-2024-41270: Gorush v1.18.4
- CVE-2025-3200: Multiple products from Wiesemann & Theis
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
cve: CVE-2023-41928
cve: CVE-2024-41270
cve: CVE-2025-3200
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
. . . continues on next page . . .
2 RESULTS PER HOST 830
Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).
Impact
An attacker might be able to decrypt the SSL/TLS communication oine.
Solution:
Solution type: Workaround
- Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger
Die-Hellman group. Please see the references for more resources supporting you with this task.
- For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.
Aected Software/OS
All services providing an encrypted communication using Die-Hellman groups with insucient
strength.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 833
References
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
[ return to [Link] ]
Summary
Elastic Elasticsearch is prone to a remote code execution (RCE) vulnerability.
Impact
An attacker can exploit this issue to execute arbitrary code.
Solution:
Solution type: VendorFix
Update to version 1.2 or later which disables 'dynamic scripting' by default. If the system was
already updated make sure that this option is kept disabled.
Aected Software/OS
Elastic Elasticsearch versions prior to 1.2.
Vulnerability Insight
Elastic Elasticsearch has a aw in its default conguration which makes it possible for any
webpage to execute arbitrary code on visitors with Elasticsearch installed.
References
cve: CVE-2014-3120
url: [Link]
url: [Link]
,→-developing-with-elasticsearch
url: [Link]
cisa: Known Exploited Vulnerability (KEV) catalog
cert-bund: CB-K14/1131
dfn-cert: DFN-CERT-2014-1188
NVT: Elastic Elasticsearch < 6.8.12, 7.x < 7.9.0 Information Disclosure Vulnerability - Windows
Summary
Elasticsearch is prone to a eld disclosure vulnerability.
Impact
An attacker could gain additional permissions against a restricted index.
Solution:
Solution type: VendorFix
Update to version 6.8.12, 7.9.1 or later.
Aected Software/OS
Elasticsearch prior to version 6.8.12 and 7.9.0.
Vulnerability Insight
A eld disclosure aw was found in Elasticsearch when running a scrolling search with Field
Level Security. If a user runs the same query another more privileged user recently ran, the
scrolling search can leak elds that should be hidden.
References
cve: CVE-2020-7019
url: [Link]
,→/245456
Summary
Elasticsearch is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 6.8.17, 7.13.3 or later.
Aected Software/OS
Elasticsearch prior to version 6.8.17 and 7.x prior to 7.13.3.
Vulnerability Insight
An uncontrolled recursion vulnerability that could lead to a denial of service attack was iden-
tied in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to
Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.
References
cve: CVE-2021-22144
url: [Link]
,→e/278100
cert-bund: WID-SEC-2022-1777
dfn-cert: DFN-CERT-2025-0933
dfn-cert: DFN-CERT-2022-2315
NVT: Elastic Elasticsearch < 6.8.2, 7.x < 7.2.1 Information Disclosure Vulnerability (ESA-2019-
07) - Windows
Summary
Elasticsearch is prone to an information disclosure vulnerability.
Solution:
Solution type: VendorFix
Update to version 6.8.2 or 7.2.1 respectively.
Aected Software/OS
Elasticsearch through version 6.8.1 and version 7.0.0 through 7.2.0.
Vulnerability Insight
A race condition aw was found in the response headers Elasticsearch returns to a request.
References
cve: CVE-2019-7614
url: [Link]
,→192963
url: [Link]
cert-bund: WID-SEC-2024-3184
Summary
Elasticsearch is prone to multiple vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 838
Solution:
Solution type: VendorFix
Update to version 6.8.15, 7.12.0 or later.
Aected Software/OS
Elasticsearch versions prior to versions 6.8.15 or 7.12.0.
Vulnerability Insight
The following vulnerabilities exist:
- CVE-2021-22135: Suggester & Prole API information disclosure aw
- CVE-2021-22137: Field disclosure aw
References
cve: CVE-2021-22135
cve: CVE-2021-22137
url: [Link]
,→e/268125
cert-bund: WID-SEC-2022-0720
dfn-cert: DFN-CERT-2025-0933
Summary
Elasticsearch is prone to an information disclosure vulnerability.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 839
Solution:
Solution type: VendorFix
Update to version 6.8.14, 7.10.0 or later.
Aected Software/OS
Elasticsearch versions prior to 6.8.14 and 7.0.0 prior to 7.10.0.
Vulnerability Insight
Elasticsearch has an information disclosure issue when audit logging and the emit_request_body
option is enabled. The Elasticsearch audit log could contain sensitive information such as pass-
word hashes or authentication tokens.
References
cve: CVE-2020-7021
url: [Link]
,→e/263915
url: [Link]
dfn-cert: DFN-CERT-2025-0933
Summary
Elasticsearch is prone to a cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow remote attackers to inject arbitrary web script or HTML.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 840
Aected Software/OS
Elasticsearch version 1.3.x and prior on Windows.
Vulnerability Insight
The Flaw is due to an error in the CORS functionality.
References
cve: CVE-2014-6439
url: [Link]
url: [Link]
url: [Link]
[ return to [Link] ]
Summary
ManageEngine Desktop Central is prone to multiple cross-site scripting (XSS) vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary script code in the browser of
an unsuspecting user in the context of the aected site. This may allow the attacker to steal
cookie-based authentication credentials and to launch other attacks.
Aected Software/OS
ManageEngine Desktop Central version 9.1.099 and prior.
Vulnerability Insight
The aw allows to inject client-side script into Desktop Centrals web page.
References
cve: CVE-2018-8722
url: [Link]
,→[Link]
url: [Link]
Summary
The host / application transmits sensitive information (username, passwords) in cleartext via
HTTP.
Impact
An attacker could use this situation to compromise or eavesdrop on the HTTP communication
between the client and the server using a man-in-the-middle attack to get access to sensitive data
like usernames or passwords.
Solution:
Solution type: Workaround
. . . continues on next page . . .
2 RESULTS PER HOST 842
Aected Software/OS
Hosts / applications which doesn't enforce the transmission of sensitive data via an encrypted
SSL/TLS connection.
References
url: [Link]
,→ssion_Management
url: [Link]
url: [Link]
Summary
ManageEngine Desktop Central is prone to a reected cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow attacker to cause cross site scripting and steal the cookie of
other active sessions.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 843
Aected Software/OS
ManageEngine Desktop Central version 9.1.099 and prior.
Vulnerability Insight
The aw exists as input passed via 'To' parameter of 'Specify Delivery Format' is not validated
properly.
References
url: [Link]
[ return to [Link] ]
Summary
ManageEngine Desktop Central is prone to multiple cross-site scripting (XSS) vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary script code in the browser of
an unsuspecting user in the context of the aected site. This may allow the attacker to steal
cookie-based authentication credentials and to launch other attacks.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 844
Aected Software/OS
ManageEngine Desktop Central version 9.1.099 and prior.
Vulnerability Insight
The aw allows to inject client-side script into Desktop Centrals web page.
References
cve: CVE-2018-8722
url: [Link]
,→[Link]
url: [Link]
NVT: SSL/TLS: Server Certicate / Certicate in Chain with RSA keys less than 2048 bits
Summary
The remote SSL/TLS server certicate and/or any of the certicates in the certicate chain is
using a RSA key with less than 2048 bits.
Impact
Using certicates with weak RSA key size can lead to unauthorized exposure of sensitive infor-
mation.
Solution:
Solution type: Mitigation
Replace the certicate with a stronger key and reissue the certicates it signed.
. . . continues on next page . . .
2 RESULTS PER HOST 845
Vulnerability Insight
SSL/TLS certicates using RSA keys with less than 2048 bits are considered unsafe.
References
url: [Link]
Summary
Various application or web servers / products are prone to an information disclosure vulnerability.
Impact
Based on the information provided in this le an attacker might be able to gather additional info
and / or sensitive data about the application / the application / web server.
Solution:
Solution type: VendorFix
Please contact the vendor for more information on possible xes.
Aected Software/OS
The following products are known to be aected:
- Caucho Resin version 2.1.12 on Apache HTTP server version 1.3.29
Other products and versions might be aected as well.
Vulnerability Insight
The servlet specication prohibits servlet containers from serving resources in the '/WEB-INF'
and '/META-INF' directories of a web application archive directly to clients.
This means that URLs like:
[Link]
. . . continues on next page . . .
2 RESULTS PER HOST 847
References
cve: CVE-2004-0281
url: [Link]
url: [Link]
Summary
Various application or web servers / products are prone to an information disclosure vulnerability.
Impact
Based on the information provided in this le an attacker might be able to gather additional info
and / or sensitive data about the application / the application / web server.
Solution:
Solution type: VendorFix
Please contact the vendor for more information on possible xes.
Aected Software/OS
The following products are known to be aected:
- A miscongured reverse proxy.
Other products might be aected as well.
Vulnerability Insight
The servlet specication prohibits servlet containers from serving resources in the '/WEB-INF'
and '/META-INF' directories of a web application archive directly to clients.
. . . continues on next page . . .
2 RESULTS PER HOST 849
References
url: [Link]
Summary
The remote server's SSL/TLS certicate has already expired.
Solution:
Solution type: Mitigation
Replace the SSL/TLS certicate by a new one.
Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.
Summary
ManageEngine Desktop Central is prone to a reected cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow attacker to cause cross site scripting and steal the cookie of
other active sessions.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 851
Aected Software/OS
ManageEngine Desktop Central version 9.1.099 and prior.
Vulnerability Insight
The aw exists as input passed via 'To' parameter of 'Specify Delivery Format' is not validated
properly.
References
url: [Link]
Summary
It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this
system.
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
. . . continues on next page . . .
2 RESULTS PER HOST 852
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated TLSv1.0 and/or TLSv1.1 protocols in favor of the
TLSv1.2+ protocols.
Please see the references for more resources supporting you with this task.
Aected Software/OS
- All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols
- CVE-2023-41928: Kiloview P1 4G and P2 4G Video Encoder
- CVE-2024-41270: Gorush v1.18.4
- CVE-2025-3200: Multiple products from Wiesemann & Theis
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
cve: CVE-2023-41928
cve: CVE-2024-41270
cve: CVE-2025-3200
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
. . . continues on next page . . .
2 RESULTS PER HOST 853
Summary
The remote service is using a SSL/TLS certicate in the certicate chain that has been signed
using a cryptographically weak hashing algorithm.
Solution:
Solution type: Mitigation
Servers that use SSL/TLS certicates signed with a weak SHA-1, MD5, MD4 or MD2 hashing
algorithm will need to obtain new SHA-2 signed SSL/TLS certicates to avoid web browser
SSL/TLS certicate warnings.
Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certicates are considered crypto-
graphically weak and not secure enough for ongoing use:
. . . continues on next page . . .
2 RESULTS PER HOST 856
References
url: [Link]
,→sha-1-based-signature-algorithms/
Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).
Impact
An attacker might be able to decrypt the SSL/TLS communication oine.
Solution:
Solution type: Workaround
- Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger
Die-Hellman group. Please see the references for more resources supporting you with this task.
- For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.
. . . continues on next page . . .
2 RESULTS PER HOST 857
Aected Software/OS
All services providing an encrypted communication using Die-Hellman groups with insucient
strength.
Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.
References
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→ines/TG02102/[Link]
url: [Link]
,→TLS-Protokoll/TLS-Protokoll_node.html
url: [Link]
,→eRichtlinien/TR03116/[Link]
url: [Link]
,→tstandard_BSI_TLS_Version_2_4.html
url: [Link]
url: [Link]
,→-report-2014
url: [Link]
[ return to [Link] ]
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 858
Impact
This information could theoretically be used to exploit weak time-based random number gener-
ators in other services.
Solution:
Solution type: Mitigation
Various mitigations are possible:
- Disable the support for ICMP timestamp on the remote host completely
- Protect the remote host by a rewall, and block ICMP packets passing through the rewall in
either direction (either completely or only for untrusted networks)
Vulnerability Insight
The Timestamp Reply is an ICMP message which replies to a Timestamp message. It consists
of the originating timestamp sent by the sender of the Timestamp as well as a receive timestamp
and a transmit timestamp.
References
cve: CVE-1999-0524
url: [Link]
url: [Link]
cert-bund: CB-K15/1514
cert-bund: CB-K14/0632
dfn-cert: DFN-CERT-2014-0658
[ return to [Link] ]
Summary
The remote SSH server is congured to allow / support weak MAC algorithm(s).
Solution:
Solution type: Mitigation
Disable the reported weak MAC algorithm(s).
References
url: [Link]
url: [Link]
[ return to [Link] ]
NVT: Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.10 Security Update (cpu-
jul2016) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow a remote attacker to aect condentiality via unknown vectors.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.10.
Vulnerability Insight
An unspecied error exists in the 'MySQL Server' component via unknown vectors related to
the 'Security Encryption' sub-component.
. . . continues on next page . . .
2 RESULTS PER HOST 861
References
cve: CVE-2016-3452
url: [Link]
url: [Link]
advisory-id: cpujul2016
cert-bund: CB-K16/1122
cert-bund: CB-K16/1100
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-1169
NVT: Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpu-
jul2016) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.11.
Vulnerability Insight
An unspecied error exists in the 'MySQL Server' component via unknown vectors related to
'Connection' sub-component.
References
cve: CVE-2016-5444
url: [Link]
url: [Link]
advisory-id: cpujul2016
cert-bund: CB-K16/1122
cert-bund: CB-K16/1100
dfn-cert: DFN-CERT-2016-1192
dfn-cert: DFN-CERT-2016-1169
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an authenticated remote attacker to aect integrity via unknown
vectors.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.43 and earlier, and 5.6.24 and earlier on windows
Vulnerability Insight
Unspecied error exists in the MySQL Server component via unknown vectors related to Server.
References
cve: CVE-2015-4864
url: [Link]
url: [Link]
cert-bund: WID-SEC-2024-1483
cert-bund: CB-K16/0245
cert-bund: CB-K15/1844
. . . continues on next page . . .
2 RESULTS PER HOST 864
Summary
Oracle MySQL is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an authenticated remote attacker to cause denial of service
attack.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier on Windows.
Vulnerability Insight
Unspecied error exists in the MySQL Server component via unknown vectors related to Server
: Optimizer.
References
cve: CVE-2015-4757
url: [Link]
url: [Link]
cert-bund: CB-K15/1202
cert-bund: CB-K15/1193
cert-bund: CB-K15/1045
cert-bund: CB-K15/1020
dfn-cert: DFN-CERT-2015-1272
dfn-cert: DFN-CERT-2015-1264
dfn-cert: DFN-CERT-2015-1096
dfn-cert: DFN-CERT-2015-1071
Summary
Oracle MySQL server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow an attacker to disclose potentially sensitive information and
manipulate certain data.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 866
Aected Software/OS
Oracle MySQL version 5.5.x to 5.5.25 on Windows.
Vulnerability Insight
The aw is due to unspecied error in MySQL server component vectors server.
References
cve: CVE-2012-3156
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
Summary
Oracle MySQL is prone to multiple unspecied vulnerabilities.
Solution:
Solution type: VendorFix
Apply the patch from the referenced advisory.
Aected Software/OS
Oracle MySQL version 5.5.34 and earlier, and 5.6.14 and earlier on Windows.
Vulnerability Insight
Unspecied errors in the MySQL Server component via unknown vectors related to Replication.
References
cve: CVE-2014-0420
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K14/0710
cert-bund: CB-K14/0187
cert-bund: CB-K14/0082
cert-bund: CB-K14/0074
cert-bund: CB-K14/0055
dfn-cert: DFN-CERT-2014-0742
dfn-cert: DFN-CERT-2014-0190
dfn-cert: DFN-CERT-2014-0085
dfn-cert: DFN-CERT-2014-0074
dfn-cert: DFN-CERT-2014-0048
2 RESULTS PER HOST 868
NVT: Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpuapr2023) - Windows
Summary
Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.7.41, 8.0.32 or later.
Aected Software/OS
Oracle MySQL Server version 5.7.40 and prior and 8.x through 8.0.31.
References
cve: CVE-2023-21963
url: [Link]
advisory-id: cpuapr2023
cert-bund: WID-SEC-2024-1591
. . . continues on next page . . .
2 RESULTS PER HOST 869
NVT: Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.18 Security Update (cpujul2019) - Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Solution:
Solution type: VendorFix
Update to version 5.6.45, 5.7.19 or later.
Aected Software/OS
Oracle MySQL Server versions 5.6.44 and prior and 5.7 through 5.7.18.
References
. . . continues on next page . . .
2 RESULTS PER HOST 870
NVT: Oracle MySQL Server 5.5 <= 5.5.30 / 5.6 <= 5.6.9 Security Update (cpuapr2013) -
Windows
Summary
Oracle MySQL Server is prone to an unspecied vulnerability.
Impact
Successful exploitation will allow local users to aect availability.
Solution:
Solution type: VendorFix
Update to version 5.5.31, 5.6.10 or later.
Aected Software/OS
Oracle MySQL Server versions 5.5 through 5.5.30 and 5.6 through 5.6.9.
Vulnerability Insight
An unspecied error exists in the MySQL Server component via unknown vectors related to
Server Partition.
References
cve: CVE-2013-1502
url: [Link]
url: [Link]
advisory-id: cpuapr2013
dfn-cert: DFN-CERT-2013-0882
dfn-cert: DFN-CERT-2013-0798
[ return to [Link] ]
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful attacks of these vulnerabilities can result in unauthorized ability to cause a partial
denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
. . . continues on next page . . .
2 RESULTS PER HOST 872
Aected Software/OS
Oracle Java SE version 7u261 ([Link]) and earlier, 8u251 ([Link]) and earlier on Windows.
Vulnerability Insight
The aws exist due to errors in the 'Libraries' component.
References
cve: CVE-2020-14578
cve: CVE-2020-14579
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1522
cert-bund: WID-SEC-2022-1285
cert-bund: CB-K20/1075
cert-bund: CB-K20/0715
dfn-cert: DFN-CERT-2021-0949
dfn-cert: DFN-CERT-2020-2571
dfn-cert: DFN-CERT-2020-1762
dfn-cert: DFN-CERT-2020-1531
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 873
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u401 and prior, 17.0.x through 17.0.10, 11.0.x through 11.0.22, 21.0.x
through 21.0.2 and 22.0 on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21011: An error in the Hotspot component of Oracle Java SE.
- CVE-2024-21094: An error in the Hotspot component of Oracle Java SE.
References
cve: CVE-2024-21011
cve: CVE-2024-21094
url: [Link]
cert-bund: WID-SEC-2024-1248
cert-bund: WID-SEC-2024-1226
cert-bund: WID-SEC-2024-0895
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-2795
dfn-cert: DFN-CERT-2024-2789
dfn-cert: DFN-CERT-2024-2788
dfn-cert: DFN-CERT-2024-1436
dfn-cert: DFN-CERT-2024-1272
dfn-cert: DFN-CERT-2024-1251
dfn-cert: DFN-CERT-2024-1032
dfn-cert: DFN-CERT-2024-1005
dfn-cert: DFN-CERT-2024-1004
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 874
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier, 11.0.19, 20.0.1 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of hotspot module within the Java SE engine component
in Oracle Java SE.
References
cve: CVE-2023-22044
url: [Link]
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-1972
dfn-cert: DFN-CERT-2023-1657
dfn-cert: DFN-CERT-2023-1653
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 875
Impact
Successful attacks of these vulnerabilities can result in unauthorized ability to cause a partial
denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u261 ([Link]) and earlier, 8u251 ([Link]) and earlier on Windows.
Vulnerability Insight
The aws exist due to errors in the 'Libraries' component.
References
cve: CVE-2020-14578
cve: CVE-2020-14579
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1522
cert-bund: WID-SEC-2022-1285
cert-bund: CB-K20/1075
cert-bund: CB-K20/0715
dfn-cert: DFN-CERT-2021-0949
dfn-cert: DFN-CERT-2020-2571
dfn-cert: DFN-CERT-2020-1762
dfn-cert: DFN-CERT-2020-1531
2 RESULTS PER HOST 876
Summary
Oracle Java SE is prone to remote code execution (RCE) vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier, 11.0.19, 20.0.1 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of hotspot module within the Java SE engine component
in Oracle Java SE.
References
cve: CVE-2023-22044
url: [Link]
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-1972
dfn-cert: DFN-CERT-2023-1657
dfn-cert: DFN-CERT-2023-1653
2 RESULTS PER HOST 877
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to compromise Oracle Java SE, which can result in
unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u401 and prior, 17.0.x through 17.0.10, 11.0.x through 11.0.22, 21.0.x
through 21.0.2 and 22.0 on Windows.
Vulnerability Insight
These vulnerabilities exist:
- CVE-2024-21011: An error in the Hotspot component of Oracle Java SE.
- CVE-2024-21094: An error in the Hotspot component of Oracle Java SE.
References
cve: CVE-2024-21011
cve: CVE-2024-21094
url: [Link]
cert-bund: WID-SEC-2024-1248
cert-bund: WID-SEC-2024-1226
cert-bund: WID-SEC-2024-0895
dfn-cert: DFN-CERT-2024-2971
. . . continues on next page . . .
2 RESULTS PER HOST 878
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation allows an attacker to cause a partial denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u411 and prior, 11.0.x through 11.0.23 on Windows.
Vulnerability Insight
The aw exists due to an error in the Concurrency component of Oracle Java SE.
References
. . . continues on next page . . .
2 RESULTS PER HOST 879
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality and avail-
ability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u241 ([Link]) and earlier, 11.0.6 and earlier, 14.
Vulnerability Insight
Multiple aws are due to multiple errors in Scripting component.
References
cve: CVE-2020-2755
cve: CVE-2020-2754
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K20/0319
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-0771
Summary
Oracle Java SE is prone to multiple security vulnerabilities.
Impact
Successful exploitation will allow remote attacker to have an impact on condentiality and avail-
ability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u241 ([Link]) and earlier, 11.0.6 and earlier, 14.
Vulnerability Insight
Multiple aws are due to multiple errors in Scripting component.
References
cve: CVE-2020-2755
cve: CVE-2020-2754
url: [Link]
cert-bund: WID-SEC-2023-0016
cert-bund: WID-SEC-2022-1639
cert-bund: CB-K20/0319
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-1685
dfn-cert: DFN-CERT-2020-0771
Summary
Oracle Java SE is prone to an input validation vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u351 and earlier, 11.0.17, 17.0.5, 19.0.1 and earlier on Windows.
Vulnerability Insight
The aw is due to an improper input validation within the Sound component in Oracle Java SE.
References
cve: CVE-2023-21843
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2164
cert-bund: WID-SEC-2023-1424
cert-bund: WID-SEC-2023-0561
cert-bund: WID-SEC-2023-0128
dfn-cert: DFN-CERT-2024-2151
dfn-cert: DFN-CERT-2023-1174
dfn-cert: DFN-CERT-2023-1139
dfn-cert: DFN-CERT-2023-0846
dfn-cert: DFN-CERT-2023-0717
dfn-cert: DFN-CERT-2023-0605
dfn-cert: DFN-CERT-2023-0256
dfn-cert: DFN-CERT-2023-0217
dfn-cert: DFN-CERT-2023-0125
dfn-cert: DFN-CERT-2023-0124
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 883
Aected Software/OS
Oracle Java SE version 7u241 ([Link]) and earlier, 8u231 ([Link]) and earlier.
Vulnerability Insight
The aw is due to error in component Networking.
References
cve: CVE-2020-2659
url: [Link]
cert-bund: WID-SEC-2023-0234
cert-bund: CB-K20/0139
cert-bund: CB-K20/0039
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-1276
dfn-cert: DFN-CERT-2020-0338
dfn-cert: DFN-CERT-2020-0283
dfn-cert: DFN-CERT-2020-0095
Summary
Oracle Java SE is prone to an input validation vulnerability.
Impact
Successful exploitation will allow remote attacker to manipulate data.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 884
Aected Software/OS
Oracle Java SE version 8u351 and earlier, 11.0.17, 17.0.5, 19.0.1 and earlier on Windows.
Vulnerability Insight
The aw is due to an improper input validation within the Sound component in Oracle Java SE.
References
cve: CVE-2023-21843
url: [Link]
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0794
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2625
cert-bund: WID-SEC-2023-2164
cert-bund: WID-SEC-2023-1424
cert-bund: WID-SEC-2023-0561
cert-bund: WID-SEC-2023-0128
dfn-cert: DFN-CERT-2024-2151
dfn-cert: DFN-CERT-2023-1174
dfn-cert: DFN-CERT-2023-1139
dfn-cert: DFN-CERT-2023-0846
dfn-cert: DFN-CERT-2023-0717
dfn-cert: DFN-CERT-2023-0605
dfn-cert: DFN-CERT-2023-0256
dfn-cert: DFN-CERT-2023-0217
dfn-cert: DFN-CERT-2023-0125
dfn-cert: DFN-CERT-2023-0124
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 7u241 ([Link]) and earlier, 8u231 ([Link]) and earlier.
Vulnerability Insight
The aw is due to error in component Networking.
References
cve: CVE-2020-2659
url: [Link]
cert-bund: WID-SEC-2023-0234
cert-bund: CB-K20/0139
cert-bund: CB-K20/0039
dfn-cert: DFN-CERT-2021-0095
dfn-cert: DFN-CERT-2020-1276
dfn-cert: DFN-CERT-2020-0338
dfn-cert: DFN-CERT-2020-0283
dfn-cert: DFN-CERT-2020-0095
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 886
Impact
Successful exploitation allows an attacker to cause a partial denial of service (partial DOS)
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE 8u401 and prior and 11.0.x through 11.0.22 on Windows.
Vulnerability Insight
The aw exists due to a NativeUnpack class did not properly validate the memory size when
allocating a buer.
References
cve: CVE-2024-21085
url: [Link]
cert-bund: WID-SEC-2024-1248
cert-bund: WID-SEC-2024-1226
cert-bund: WID-SEC-2024-0895
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-2795
dfn-cert: DFN-CERT-2024-2789
dfn-cert: DFN-CERT-2024-2788
dfn-cert: DFN-CERT-2024-1436
dfn-cert: DFN-CERT-2024-1251
dfn-cert: DFN-CERT-2024-1032
dfn-cert: DFN-CERT-2024-1005
dfn-cert: DFN-CERT-2024-1004
2 RESULTS PER HOST 887
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow attackers to conduct a denial-of-service condition.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw exists due to error in 'JCE' component.
References
cve: CVE-2019-2842
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: CB-K19/0621
dfn-cert: DFN-CERT-2019-1452
2 RESULTS PER HOST 888
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation allows an attacker to cause a partial denial of service.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u411 and prior, 11.0.x through 11.0.23 on Windows.
Vulnerability Insight
The aw exists due to an error in the Concurrency component of Oracle Java SE.
References
cve: CVE-2024-21144
url: [Link]
cert-bund: WID-SEC-2024-1658
cert-bund: WID-SEC-2024-1648
cert-bund: WID-SEC-2024-1647
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-2789
dfn-cert: DFN-CERT-2024-2788
dfn-cert: DFN-CERT-2024-2140
dfn-cert: DFN-CERT-2024-2119
dfn-cert: DFN-CERT-2024-1860
. . . continues on next page . . .
2 RESULTS PER HOST 889
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow attackers to conduct a denial-of-service condition.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw exists due to error in 'JCE' component.
References
cve: CVE-2019-2842
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: CB-K19/0621
dfn-cert: DFN-CERT-2019-1452
2 RESULTS PER HOST 890
Summary
Oracle Java SE is prone to a denial of service vulnerability.
Impact
Successful exploitation allows an attacker to cause a partial denial of service (partial DOS)
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE 8u401 and prior and 11.0.x through 11.0.22 on Windows.
Vulnerability Insight
The aw exists due to a NativeUnpack class did not properly validate the memory size when
allocating a buer.
References
cve: CVE-2024-21085
url: [Link]
cert-bund: WID-SEC-2024-1248
cert-bund: WID-SEC-2024-1226
cert-bund: WID-SEC-2024-0895
dfn-cert: DFN-CERT-2024-2971
dfn-cert: DFN-CERT-2024-2795
dfn-cert: DFN-CERT-2024-2789
dfn-cert: DFN-CERT-2024-2788
dfn-cert: DFN-CERT-2024-1436
. . . continues on next page . . .
2 RESULTS PER HOST 891
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier, 11.0.19, 17.0.7, 20.0.1 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of hotspot module and libraries within the Java SE
engine component in Oracle Java SE.
References
cve: CVE-2023-22045
cve: CVE-2023-22049
url: [Link]
cert-bund: WID-SEC-2024-0064
. . . continues on next page . . .
2 RESULTS PER HOST 892
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to manipulate data and execute arbitrary code.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u371 and earlier, 11.0.19, 17.0.7, 20.0.1 and earlier on Windows.
Vulnerability Insight
The aw is due to improper application of hotspot module and libraries within the Java SE
engine component in Oracle Java SE.
References
cve: CVE-2023-22045
cve: CVE-2023-22049
url: [Link]
cert-bund: WID-SEC-2024-0064
cert-bund: WID-SEC-2023-2031
cert-bund: WID-SEC-2023-1814
cert-bund: WID-SEC-2023-1796
dfn-cert: DFN-CERT-2023-3167
dfn-cert: DFN-CERT-2023-2179
dfn-cert: DFN-CERT-2023-2042
dfn-cert: DFN-CERT-2023-2031
dfn-cert: DFN-CERT-2023-1990
dfn-cert: DFN-CERT-2023-1972
dfn-cert: DFN-CERT-2023-1935
dfn-cert: DFN-CERT-2023-1909
dfn-cert: DFN-CERT-2023-1657
dfn-cert: DFN-CERT-2023-1653
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow an attacker to have an impact on condentiality.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Vulnerability Insight
The aw exists due to error in 'Security' component.
References
cve: CVE-2019-2786
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: CB-K19/0897
cert-bund: CB-K19/0621
dfn-cert: DFN-CERT-2019-1584
dfn-cert: DFN-CERT-2019-1452
Summary
Oracle Java SE is prone to a security vulnerability.
Impact
Successful exploitation will allow an attacker to have an impact on condentiality.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Vulnerability Insight
The aw exists due to error in 'Security' component.
References
cve: CVE-2019-2786
url: [Link]
,→l
cert-bund: WID-SEC-2025-0149
cert-bund: CB-K19/0897
cert-bund: CB-K19/0621
dfn-cert: DFN-CERT-2019-1584
dfn-cert: DFN-CERT-2019-1452
NVT: Microsoft Windows Group Policy Security Feature Bypass Vulnerability (3004361)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-014.
Impact
Successful exploitation could allow remote attackers to modify domain controller responses to
client requests and revert the Group Policy settings on a system back to default.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
. . . continues on next page . . .
2 RESULTS PER HOST 896
Vulnerability Insight
The aw is due to an error in the Group Policy application of Security Conguration policies.
References
cve: CVE-2015-0009
url: [Link]
url: [Link]
url: [Link]
url: [Link]
,→[Link]
cert-bund: CB-K15/0171
dfn-cert: DFN-CERT-2015-0175
Summary
7zip is prone to multiple vulnerabilities.
Impact
Successful exploitation allows an attacker to conduct denial of service attacks.
Solution:
. . . continues on next page . . .
2 RESULTS PER HOST 897
Aected Software/OS
7zip version 22.01 and prior on Windows.
References
cve: CVE-2022-47111
cve: CVE-2022-47112
url: [Link]
Summary
This host is missing an important security update according to Microsoft KB5013870
Impact
Successful exploitation will allow an attacker to cause a denial of service condition.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Microsoft .NET Framework 3.5.1, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Microsoft Windows 7
SP1 and Microsoft Windows Server 2008 R2 SP1.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 898
References
cve: CVE-2022-30130
url: [Link]
cert-bund: WID-SEC-2022-1251
cert-bund: WID-SEC-2022-0539
cert-bund: CB-K22/0588
dfn-cert: DFN-CERT-2022-1039
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-071.
Impact
Successful exploitation will allow remote man-in-the-middle attacker to conduct SMB relay at-
tacks on domain environments utilizing SMB Signing enforcement, and decrypt SMB3 commu-
nications intercepted.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows Server 2012/R2
- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior
- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior
- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 899
References
cve: CVE-2015-2374
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/1013
dfn-cert: DFN-CERT-2015-1060
Summary
This host is missing an important security update according to Microsoft Bulletin MS17-021.
Impact
Successful exploitation will allow an attacker to obtain information to further compromise a
target system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012/2012R2
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
. . . continues on next page . . .
2 RESULTS PER HOST 900
Vulnerability Insight
The aw exists when windows DirectShow handles objects in memory.
References
cve: CVE-2017-0042
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K17/0443
dfn-cert: DFN-CERT-2017-0451
Summary
Oracle Java SE is prone to a denial of service vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Vulnerability Insight
The aw is due to an error in 'Hotspot' component.
References
cve: CVE-2021-35588
url: [Link]
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-0809
cert-bund: WID-SEC-2022-0676
cert-bund: WID-SEC-2022-0196
cert-bund: CB-K21/1082
dfn-cert: DFN-CERT-2022-1571
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2022-0106
dfn-cert: DFN-CERT-2021-2530
dfn-cert: DFN-CERT-2021-2195
dfn-cert: DFN-CERT-2021-2194
Summary
Oracle Java SE is prone to a denial of service vulnerability.
Impact
Successful exploitation will allow remote attacker to have an impact on availability.
Aected Software/OS
Oracle Java SE version 8u301 ([Link]) and earlier, 7u311 ([Link]) and earlier on Windows.
Vulnerability Insight
The aw is due to an error in 'Hotspot' component.
References
cve: CVE-2021-35588
url: [Link]
cert-bund: WID-SEC-2022-1375
cert-bund: WID-SEC-2022-0809
cert-bund: WID-SEC-2022-0676
cert-bund: WID-SEC-2022-0196
cert-bund: CB-K21/1082
dfn-cert: DFN-CERT-2022-1571
dfn-cert: DFN-CERT-2022-0366
dfn-cert: DFN-CERT-2022-0107
dfn-cert: DFN-CERT-2022-0106
dfn-cert: DFN-CERT-2021-2530
dfn-cert: DFN-CERT-2021-2195
dfn-cert: DFN-CERT-2021-2194
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow remote attackers to cause denial of service.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw exists due to an error in the 'Deployment' component.
References
cve: CVE-2019-2449
url: [Link]
,→l
cert-bund: CB-K19/0334
cert-bund: CB-K19/0051
dfn-cert: DFN-CERT-2019-1944
dfn-cert: DFN-CERT-2019-0478
dfn-cert: DFN-CERT-2019-0473
dfn-cert: DFN-CERT-2019-0106
Summary
Oracle Java SE is prone to a denial of service (DoS) vulnerability.
Impact
Successful exploitation will allow remote attackers to cause denial of service.
Solution:
Solution type: VendorFix
Apply the appropriate patch from the vendor. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 1.8.0 to [Link] on Windows.
Vulnerability Insight
The aw exists due to an error in the 'Deployment' component.
References
cve: CVE-2019-2449
url: [Link]
,→l
cert-bund: CB-K19/0334
cert-bund: CB-K19/0051
dfn-cert: DFN-CERT-2019-1944
dfn-cert: DFN-CERT-2019-0478
dfn-cert: DFN-CERT-2019-0473
dfn-cert: DFN-CERT-2019-0106
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u391 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in the multiple components.
References
cve: CVE-2024-20923
cve: CVE-2024-20925
cve: CVE-2024-20922
url: [Link]
cert-bund: WID-SEC-2024-0121
dfn-cert: DFN-CERT-2024-0129
dfn-cert: DFN-CERT-2024-0128
Summary
Oracle Java SE is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to compromise Oracle Java SE, which can
result in unauthorized update, insert or delete access to some of Oracle Java SE.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
Oracle Java SE version 8u391 and earlier on Windows.
Vulnerability Insight
Multiple aws exist due to multiple errors in the multiple components.
References
cve: CVE-2024-20923
cve: CVE-2024-20925
cve: CVE-2024-20922
url: [Link]
cert-bund: WID-SEC-2024-0121
dfn-cert: DFN-CERT-2024-0129
dfn-cert: DFN-CERT-2024-0128
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-041.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 907
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft .NET Framework 4
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 2.0
- Microsoft .NET Framework 1.1
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4.5, 4.5.1, and 4.5.2
Vulnerability Insight
The aw exists when [Link] improperly handles certain requests on systems that have custom
error messages disabled.
References
cve: CVE-2015-1648
url: [Link]
url: [Link]
cert-bund: CB-K15/0527
dfn-cert: DFN-CERT-2015-0545
Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Impact
A side eect of this feature is that the uptime of the remote host can sometimes be computed.
Solution:
Solution type: Mitigation
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
/etc/[Link]. Execute 'sysctl -p' to apply the settings at runtime.
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options
when initiating TCP connections, but use them if the TCP peer that is initiating communication
includes them in their synchronize (SYN) segment.
See the references for more information.
Aected Software/OS
TCP implementations that implement RFC1323/RFC7323.
Vulnerability Insight
The remote host implements TCP timestamps, as dened by RFC1323/RFC7323.
References
url: [Link]
url: [Link]
url: [Link]
,→ownload/[Link]?id=9152
url: [Link]
NVT: Microsoft Windows Task Scheduler security Feature Bypass Vulnerability (3030377)
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-028.
Impact
Successful exploitation will allow local attacker to gain elevated privileges.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
- Microsoft Windows 8 x32/x64
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012/R2
Vulnerability Insight
Flaw exists as Windows Task Scheduler fails to properly validate and enforce impersonation
levels.
References
cve: CVE-2015-0084
url: [Link]
url: [Link]
cert-bund: CB-K15/0319
dfn-cert: DFN-CERT-2015-0324
Summary
This host is missing an important security update according to Microsoft Bulletin MS15-051.
Impact
Successful exploitation will allow remote attackers to gain access to kernel memory contents that
contain sensitive information about the system.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 8 x32/x64
- Microsoft Windows Server 2012/R2
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior
- Microsoft Windows Vista x32/x64 Service Pack 2 and prior
- Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
- Microsoft Windows 7 x32/x64 Service Pack 1 and prior
- Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior
Vulnerability Insight
The aw is due to the kernel-mode driver leaking private address information during a function
call
References
cve: CVE-2015-1676
cve: CVE-2015-1677
cve: CVE-2015-1678
cve: CVE-2015-1679
cve: CVE-2015-1680
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
url: [Link]
cert-bund: CB-K15/0668
dfn-cert: DFN-CERT-2015-0689
2 RESULTS PER HOST 911
Summary
7zip is prone to an arbitrary le write vulnerability.
Impact
Successful exploitation allows an attacker to perform arbitrary le writes on target systems.
Solution:
Solution type: VendorFix
Update to version 25.01 or later.
Aected Software/OS
7zip prior to version 25.01 on Windows.
References
cve: CVE-2025-55188
url: [Link]
url: [Link]
cert-bund: WID-SEC-2025-1750
[ return to [Link] ]
Summary
Elasticsearch is prone to an information disclosure vulnerability.
Impact
This could result in the search disclosing the existence of documents the attacker should not be
able to view. This could result in an attacker gaining additional insight into potentially sensitive
indices.
Solution:
Solution type: VendorFix
Update to version 6.8.13, 7.9.2 or later.
Aected Software/OS
Elasticsearch versions before 6.8.13 and 7.x before 7.9.2.
Vulnerability Insight
A document disclosure aw was found in Elasticsearch when Document or Field Level Security
is used. Search queries do not properly preserve security permissions when executing certain
complex queries.
References
cve: CVE-2020-7020
url: [Link]
,→/253033
url: [Link]
cert-bund: WID-SEC-2022-0607
dfn-cert: DFN-CERT-2025-0933
dfn-cert: DFN-CERT-2022-1530
2 RESULTS PER HOST 913
[ return to [Link] ]