Microsoft Windows continues to have more documented vulnerabilities than any other vendor, including open source products. www.cvedetails.com lists over 7,000 distinct Windows operating system vulnerabilities. These can be organized into 10 general categories, as summarized in the following table, which lists these vulnerabilities from most prevalent to least prevalent.
Category | Description |
Remote code execution | Any condition that allows the attacker to execute arbitrary code. |
Buffer or heap overflow | A programming error that allows the attacker to overwrite allocated memory addresses with malicious code. |
Denial of service | Any condition that allows the attacker to consume resources (network, CPU, RAM, disk, allowed connections, etc.) so that the process can no longer service legitimate requests. |
Memory corruption | A programming error that allows the attacker to hijack the normal execution flow of a program by corrupting the application's memory space. |
Privilege escalation | Any condition that allows the attacker to gain elevated access after a system has been compromised. |
Information disclosure | Any condition that allows the attacker to gain access to protected information. |
Security feature bypass | A software weakness that allows an attacker to bypass policies, filters, validation, or other security safeguards. |
Cross-site scripting (XSS) | A vulnerability in which a malicious script is injected into a trusted website and then downloaded and executed by the browser of a different end user. |
Directory traversal | Any condition that allows an attacker to access restricted directories. |
Cross-site request forgery (XSRF) | A vulnerability that allows unauthorized commands to be transmitted from a user to a trusting web application. |
Note: Data obtained from https://www.cvedetails.com/top-50-products.php