Awesome
What's this
This project is mainly used to collect the commonly used exp of Windows platform and give the relevant repair scheme. On the one hand, it is helpful for security researchers to quickly complete the right raising in the process of penetration testing, on the other hand, it is also helpful for the project party to find the unmatched vulnerability patches according to the list to strengthen the security of the system.
Information
CVE ID | MS ID | KB | Operating System |
---|---|---|---|
CVE-2003-0352 | MS03-026 | KB823980 | Windows 2003/XP/2000/NT 4.0/Server 2003 |
CVE-2005-1983 | MS05-039 | KB899588 | Windows 2000/XP SP1/Server 2003 |
CVE-2006-3439 | MS06-040 | KB921883 | Windows 2000/XP/Server 2003 |
CVE-2008-1084 | MS08-025 | KB941693 | Windows 2000/XP/Server 2003/Vista SP1/Server 2008 |
CVE-2008-3464 | MS08-066 | KB910723 | Windows XP/Server 2003 |
CVE-2008-4037 | MS08-068 | KB887429 | Windows XP/Server 2000/Vista/Server 2008 |
CVE-2008-4250 | MS08-067 | KB958644 | Windows XP/Vista/Server 2000 2003 2008 |
CVE-2009-0079 | MS09-012 | KB956572 | Windows XP/Server 2000 2003 2008/Vista |
CVE-2009-1535 | MS09-020 | KB970483 | Windows XP/Server 2000 2003 |
CVE-2009-2532 | MS09-050 | KB975517 | Windows Vista/Server 2008 |
CVE-2010-0020 | MS10-020 | KB980232 | Windows XP/2000/2003/2008/2008 R2/Vista/7 |
CVE-2010-0232 | MS10-015 | KB977165 | Windows 2000/XP/2003/Vista/2008/7 |
CVE-2010-1887 | MS10-048 | KB2160329 | Windows XP/2003/2008/7/Vista |
CVE-2010-1899 | MS10-065 | KB2271195 | Windows XP/2003/2008/7/Vista |
CVE-2010-2554 | MS10-059 | KB982799 | Window Vista/2008/7 |
CVE-2010-3338 | MS10-092 | KB2305420 | Windows Vista/7/2008 |
CVE-2010-4398 | MS11-011 | KB2393802 | Windows XP/Server 2003/Vsita/2008/7 |
CVE-2011-1249 | MS11-046 | KB2503665 | Windows XP/2003/2008 |
CVE-2011-1974 | MS11-062 | KB2566454 | Windows XP/2003 |
CVE-2011-2005 | MS11-080 | KB2592799 | Windows XP/Server 2003 |
CVE-2012-0002 | MS12-020 | KB2621440 | Winodws XP/2003/2008/Vista/7 |
CVE-2013-0008 | MS13-005 | KB2778930 | Windows Vista/2008/2012/7/8/RT |
CVE-2013-1300 | MS13-053 | KB2850851 | Windows XP/2003/2008/2012/7/8 |
CVE-2013-1332 | MS13-046 | KB2829361 | Windows XP/2003/2008/2012/7/8/RT |
CVE-2013-5065 | MS14-002 | KB2914368 | Windows XP/2003 |
CVE-2014-1767 | MS14-040 | KB2961072 | Windows XP/2003/2008/2012/7/8/RT/Vista |
CVE-2014-2814 | MS14-042 | KB2972621 | Windows Server 2008/2012 |
CVE-2014-4076 | MS14-070 | Windows 2003 | |
CVE-2014-4113 | MS14-058 | KB3000061 | Windows 2003/2008/2012/Vista/7/RT |
CVE-2014-6321 | MS14-066 | Windows server 2003/2008/2012/Vista/7 | |
CVE-2014-6324 | MS14-068 | Windows 2003/2008/2012/Vista/7/8 | |
CVE-2015-0002 | MS15-001 | Windows 7/8/2008/2012/ | |
CVE-2015-0057 | MS15-010 | Windows 2003/2008/2012/vista/7/8/RT | |
CVE-2015-0062 | MS15-015 | Windows 7/8/2008/2012/RT | |
CVE-2015-0097 | MS15-022 | Microsoft Office 2007/2010/2013/RT | |
CVE-2015-1701 | MS15-051 | KB3065979 | WIndows 2003/2008/2012/Vista/7/8 |
CVE-2015-1726 | MS15-061 | WIndows 2003/2008/2012/Vista/7/8 | |
CVE-2015-2370 | MS15-076 | WIndows 2003/2008/2012/Vista/7/8 | |
CVE-2015-2387 | MS15-077 | WIndows 2003/2008/2012/Vista/7/8 | |
CVE-2015-2517 | MS15-097 | KB3081455 | Windows 2003/2008/2012/Vista/RT/7/8/10 |
CVE-2016-0040 | MS16-014 | KB3135174 | Windows 2003/2008/2012/Vista/RT/7/8/10 |
CVE-2016-0051 | MS16-016 | KB3135173 | Windows 2003/2008/2012/Vista/RT/7/8/10 |
CVE-2016-0093 | MS16-034 | KB3140745 | Windows 2003/2008/2012/Vista/RT/7/8/10 |
CVE-2016-0099 | MS16-032 | KB3140768 | Windows 2003/2008/2012/Vista/RT/7/8/10 |
CVE-2016-3225 | MS16-075 | KB3163017 | Windows 2003/2008/2012/Vista/RT/7/8/10 |
CVE-2016-3305 | MS16-111 | KB3185611 | Windows 2008/2012/Vista/RT/7/8/10 |
CVE-2016-3308 | MS16-098 | KB3176492 | Windows 2008/2012/Vista/RT/7/8/10 |
CVE-2016-7214 | MS16-135 | KB3198234 | Windows Vista/2008/2012/2016/7/8 |
CVE-2017-0050 | MS17-017 | KB4011981 | Windows Vista/2008/2012/2016/7/8/10 |
CVE-2017-0143 | MS17-010 | Windows Vista/2008/2012/2016/7/8/10 | |
CVE-2017-0213 | KB4038788 | Windows Vista/2008/2012/2016/7/8/10 | |
CVE-2017-8464 | KB4022727 | Windows Vista/2008/2012/2016/7/8/10 | |
CVE-2018-0833 | KB4074594 | Windows 8/2012 R2/RT | |
CVE-2018-8120 | KB4103718 | Windows 2008/2008 R2/7 | |
CVE-2019-0803 | KB4493471 | Windows Vista/2008/2012/2016/2019/7/8/10 | |
CVE-2019-0863 | KB4494440 | Windows 2008/7/8/10 | |
CVE-2019-1253 | KB4515384 | Windows 10 1903/1709/1803/1703 | |
CVE-2019-1405 | KB4525235 | Windows 2008/2012/2016/2019/7/8/10 | |
CVE-2020-0668 | KB4532693 | Windows 2008/2012/2016/2019/7/8/10 | |
CVE-2020-0683 | KB4532691 | Windows 2008/2012/2016/2019/7/8/10 | |
CVE-2020-0787 | KB4541505 | Windows 2008/2012/2016/2019/7/8/10 | |
CVE-2020-0796 | KB4499165 | Windows 10 1909/1903/ | |
CVE-2020-1054 | KB4556826 | Windows 2008/2012/7/8/10 | |
CVE-2020-1066 | KB4552965 | Microsoft .NET Framework 3.5.1/3.0 | |
CVE-2020-1337 | KB4571694 | Windows 2012/7/10 | |
CVE-2020-1362 | KB4565503 | Windows 10 1903/1809/1607/2004/1709 | |
CVE-2020-1054 | KB4556852 | Windows 2008/2012/2016/2019/7/8/10 | |
CVE-2020-5272 | Druva inSync Windows Client 6.6.3 | ||
CVE-2021-1732 | KB4601315 | Windows 10 1909/1803/Windows Server 2019 | |
CVE-2021-40449 | Windows 7/8.1/10(build 17763)/Server 2008/2012 | ||
CVE-2022-21882 | KB5009543 | Windows 10 GDR-DU | |
CVE-2022-22718 | Windows Print Spooler |