Download
| Alert*
oval:org.secpod.oval:def:20805
Microsoft SQL Server 2012 SP1 is installed oval:org.secpod.oval:def:25410 The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take co ... oval:org.secpod.oval:def:25405 The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly casts pointers to an incorrect class. Successful exploitation could allow attackers to gain elevated privileges ... oval:org.secpod.oval:def:25409 The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take co ... oval:org.secpod.oval:def:20809 The host is missing an important security update according to Microsoft security bulletin, MS14-044. The update is required to fix multiple elevation of privilege vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attack ... oval:org.secpod.oval:def:20807 The host is installed with Microsoft SQL Server 2012 on x64 bit systems or 2014 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to spoof content or disclose sensitive informa ... oval:org.secpod.oval:def:20808 The host is installed with Microsoft SQL Server 2008, 2008 R2 or 2012 and is prone to a stack overrun vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated. oval:org.secpod.oval:def:25411 The host is missing an Important security update according to Microsoft security bulletin, MS15-058. The update is required to fix a multiple vulnerabilities. The flaws are present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation ... |