Download
| Alert*
oval:org.secpod.oval:def:24115
The host is installed with Microsoft Windows 8.1 or Windows 2012 R2 and is prone to a denial of service vulnerability. The flaw is present in Hyper-V, which fails to handle a specially crafted application in a virtual machine (VM) session. Successful exploitation could allow remote attackers to caus ... oval:org.secpod.oval:def:24116 The host is missing an important security update according to Microsoft security bulletin, MS15-042. The update is required to fix a denial of service vulnerability. The flaw is present in Hyper-V, which fails to handle a specially crafted application in a virtual machine (VM) session. Successful ex ... oval:org.secpod.oval:def:15997 The host is missing an important security update according to Microsoft security bulletin, MS13-092. The update is required to fix address corruption vulnerability. The flaw is present in the Hyper-V, which is caused when the value of a data structure is not properly verified. Successful exploitatio ... oval:org.secpod.oval:def:15995 Microsoft Windows Hyper-V is installed. oval:org.secpod.oval:def:15996 The host is installed with Windows 8 or Windows 2012 and is prone to an address corruption vulnerability. The flaw is present in Hyper-V, which is caused when the value of a data structure is not properly verified. Successful exploitation could allow denial of service for the Hyper-V host if the att ... oval:org.secpod.oval:def:44640 The host is missing an important security update for KB4073011 oval:org.secpod.oval:def:44642 The host is missing an important security update for KB4088827 oval:org.secpod.oval:def:26532 The host is installed with Microsoft Windows 8.1, 10 or Windows 2012 R2 and is prone to a security feature bypass vulnerability. A flaw is present in Hyper-V, which fails to handle a specially crafted application. Successful exploitation could allow remote attackers to cause Hyper-V to allow uninten ... oval:org.secpod.oval:def:26533 The host is missing an important security update according to Microsoft security bulletin, MS15-105. The update is required to fix a security feature bypass vulnerability. A flaw is present in Hyper-V, which fails to handle a specially crafted application. Successful exploitation could allow remote ... oval:org.secpod.oval:def:33794 The host is installed with Microsoft Windows 8.1, 10 or Windows Server 2012 R2 and is prone to an information disclosure vulnerability. A flaw is present in Hyper-V, which fails to properly validate input from an authenticated user on a guest operating system. Successful exploitation could allow rem ... oval:org.secpod.oval:def:33793 The host is missing an important security update according to Microsoft security bulletin, MS16-045. The update is required to fix multiple vulnerabilities. A flaw is present in Hyper-V, which fails to properly validate input from an authenticated user on a guest operating system. Successful exploit ... oval:org.secpod.oval:def:33796 The host is installed with Microsoft Windows 8.1, 10, Windows Server 2012 or Windows Server 2012 R2 and is prone to a remote code execution vulnerability. A flaw is present in Hyper-V, which fails to properly validate input from an authenticated user on a guest operating system. Successful exploitat ... oval:org.secpod.oval:def:33795 The host is installed with Microsoft Windows 8.1, 10, Windows Server 2012 or Windows Server 2012 R2 and is prone to an information disclosure vulnerability. A flaw is present in Hyper-V, which fails to properly validate input from an authenticated user on a guest operating system. Successful exploit ... oval:org.secpod.oval:def:44618 A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerab ... oval:org.secpod.oval:def:44620 An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that ... |